This document discusses cybersecurity and its importance in the modern, internet-connected world. It first introduces cybersecurity and some of the key areas where it is used, such as critical infrastructure, electronic government services, healthcare, and more. It then examines common cyber attacks like ransomware, phishing, and denial of service attacks. The document defines cybersecurity and outlines several types, including network, application, information, cloud, mobile, and endpoint security. It also looks at cybersecurity laws and agencies in the Philippines. Finally, it poses questions about why cybersecurity is needed and how it can help individuals.
This document discusses cybersecurity and its importance in the modern, internet-connected world. It first introduces cybersecurity and some of the key areas where it is used, such as critical infrastructure, electronic government services, healthcare, and more. It then examines common cyber attacks like ransomware, phishing, and denial of service attacks. The document defines cybersecurity and outlines several types, including network, application, information, cloud, mobile, and endpoint security. It also looks at cybersecurity laws and agencies in the Philippines. Finally, it poses questions about why cybersecurity is needed and how it can help individuals.
This document discusses cybersecurity and its importance in the modern, internet-connected world. It first introduces cybersecurity and some of the key areas where it is used, such as critical infrastructure, electronic government services, healthcare, and more. It then examines common cyber attacks like ransomware, phishing, and denial of service attacks. The document defines cybersecurity and outlines several types, including network, application, information, cloud, mobile, and endpoint security. It also looks at cybersecurity laws and agencies in the Philippines. Finally, it poses questions about why cybersecurity is needed and how it can help individuals.
a. Situationer b. Global Age/ Internet c. Need for Cybersecurity II. Use of Cybersecurity (Maam Ereza) a. Critical Infrastructure b. Electronic Government (Banking and Finance) c. Healthcare Mngt d. Energy and Water Resources Mngt e. Transportation f. National ID System g. Education h. Working from Home *Ice Breaker III. Common Cyber Attacks (Maam Reena) a. Ransomware b. Phishing c. Malware d. Denial-of-Service Attacks e. Man in the Middle IV. Definition and Types of Cybersecurity (Maam Carmela/Neri) a. General Definition b. Types i. Network Security ii. Application Security iii. Information and Data Security iv. Cloud Security v. Mobile Security vi. End Point Security vii. Critical Infrastructure Security viii. Internet of Things Security (IoT) *Ice Breaker V. Cybersecurity in the Philippines (Maam Marie Flor) a. RA No. 10175 Cybercrime Prevention Act of 2012 b. Government Agencies in charge of cybercrime in the Philippines VI. Other IT Technologies (Sir Ney/Jerome) VII. Interaction (Sir Ney/Jerome) a. Why do we need cybersecurity? b. How can cybersecurity be helpful to you personally?
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML><HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>ERROR: The requested URL could not be retrieved</TITLE>
<STYLE type="text/css"><!--BODY{background-color:#ffffff;font-family:verdana,sans-serif}PRE{font-family:sans-serif}--></STYLE>
</HEAD><BODY>
<H1>ERROR</H1>
<H2>The requested URL could not be retrieved</H2>
<HR noshade size="1px">
<P>
While trying to process the request:
<PRE>
TEXT http://www.scribd.com/titlecleaner?title=CyberCrime+Report.docx HTTP/1.1
Host: www.scribd.com
Proxy-Connection: keep-alive
Accept: */*
Origin: http://www.scribd.com
X-CSRF-Token: ea5b3d74fc35283c15ef440947b36a61b715cffd
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31
X-Requested-With: XMLHttpRequest
Referer: http://www.scribd.com/upload-document
Accept-Encoding: gzip,defl