0% found this document useful (0 votes)
59 views

Bari - Webinar5 - Cybersecurity - Reflection - CPE4-1

The document summarizes a webinar about cybersecurity and securing your online presence. It discusses the webinar overview, reaction to the guest speaker's presentation on topics like phishing and scam detection, and a reflection on increasing internet connectivity creating more opportunities for cyber attacks. It also comments on the effective coordination of the webinar by dividing roles among the student organizers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

Bari - Webinar5 - Cybersecurity - Reflection - CPE4-1

The document summarizes a webinar about cybersecurity and securing your online presence. It discusses the webinar overview, reaction to the guest speaker's presentation on topics like phishing and scam detection, and a reflection on increasing internet connectivity creating more opportunities for cyber attacks. It also comments on the effective coordination of the webinar by dividing roles among the student organizers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CAVITE STATE UNIVERSITY

Don Severino Delas Alas Campus


Indang, Cavite
College of Engineering and Information Technology
Department of Computer and Electronics Engineering

EMERGING TECHNOLOGIES in CPE

CYBERSECURITY
#MARKEDSAFE: A Webinar on Securing your
Cyberspace

Submitted by:
Bari, Sheina Marie S. 201910661
BSCpE 4-1 November 25, 2022

Submitted to:
Mr. Bienvenido Sarmiento
Instructor
Emerging Technologies Webinar
CYBERSECURITY
#MARKEDSAFE: A Webinar on Securing
your Cyberspace
November 25, 2022 | via ZOOM

Webinar Coordinators:
Aguinaldo, Justine John
Bari, Sheina Marie S.
Bautista, Auzeilyne
Borbon, John Mark
Catibayan, Russel Rose
Cole, Ladi Kyla
Turan, Girlie Mae

Guess Speaker:
Engr. Joshua Salazar

I. Webinar Overview

The webinar's main topic—which many of us currently struggle with—is


maintaining your internet privacy. The speakers explore scam-detection techniques
using short message services and email infrastructure. He has given us the
information we need to comprehend and appreciate the significance of these
technologies. He also shared tips with us on how to protect our identity from
criminals.
The webinar is simple to understand and navigate. Before the speaker began
speaking, there was an introductory ceremony that included a game to break the ice
and the awarding of diplomas. The game that was presented had a connection to
what the speaker had said. The coordinators successfully led an educational
webinar.

Webinar speaker together with the Coordinators, Audience and Instructor


II. Reaction Towards the Resource Speaker’s Talk

The speaker's understanding on how to protect yourself online is evident as


he communicates his knowledge. He gave us a lot of information to take in and did
an excellent job of presenting his topics, despite the fact that his PowerPoint
presentation only had photographs and a small amount of writing. He also had an
interesting PowerPoint presentation. He had excellent communication skills because
he made us pay attention to what he said, which is crucial. He gave us ample
opportunity to ask questions, and he graciously addressed each one, which I
appreciated.

My favorite part of his talk is the technical description of fraud. It gave a


thorough explanation of the scamming process, which improved our understanding
of it. These days, because scammers are so common, this kind of subject is crucial.
I learned about the safeguards I can use to avoid getting into this situation.

Engr. Joshua Salazar during the webinar


III. Reflection

The increased connectivity of people to the Internet and to one another has
created a worldwide attack surface that is constantly growing. As a result, the most
dynamic and aggressive threat to the entire planet now comes from cyberspace.
Hackers are aware of the vulnerabilities that influence businesses and
organizations; thus, cybersquatting professionals must remain vigilant at all times.
People's ability to access the internet has risen thanks to technological
improvements, but this has also raised the danger of contributory infringement for
businesses. One of the largest barriers to cyber security is phishing attacks.

Using email or SMS conversations, scammers try to obtain your passwords,


account numbers, or Social Security numbers. If they possess that information, they
could be able to log into your accounts. They could even sell your information to
other con artists. Scammers make thousands of these kinds of phishing attempts
each day. To keep up with the most recent developments, they continually modify
their tactics. A narrative is frequently used in phishing emails and messages to
persuade you to click a link or open an attachment. It's possible to get an unexpected
email or text message purporting to be from an organization you know and trust,
such a bank, energy company, or credit card company.

Scams involving phishing can be avoided if precautions are taken to reduce


phishing attempts. Never give out personal information to individuals or
organizations without their consent. Users should generally refrain from clicking links
or downloading files, even if they seem to come from "trusted" sources. It's also
critical to pay attention to any unanticipated information in the message's text. Any
mention of operating systems or software that users do not frequently use can be
used to identify phishing attempts. Phishing attempts are a common way for
attackers to gain access to systems, but it is also possible to lessen the chances
that these attempts will be successful and the overall harm they cause.

The speaker explained the Phishing Concept.


The speaker discussed the difference between Vishing and Smishing.

The speaker explained the Tell-tale Signs.

The speaker explained the Practices that can prevent and minimize mobile phishing
attacks.
IV. Reaction to the Webinar Coordination

I'm one of the people who organized this webinar. I and another member of
my group were given specific responsibility for the Master of the Ceremony. I
commend the performance and diligence of the coordinators of my colleagues. Each
of us had a unique set of abilities that we combined to use to make the event
successful. We are given a variety of jobs, including making visuals and editing the
material, as well as serving as the intermission number, contact for our guest
speaker, and technical expert for the actual webinar. We also had everything ready
in advance at the same time.

Certificate of Participation in Block Chain Technology Webinar.

You might also like