0% found this document useful (0 votes)
34 views

Cybersecurity:: Protecting Yourself in Cyberspace

This document discusses cybersecurity and provides information about protecting yourself online. It defines cybersecurity as the prevention, protection, and recovery from cyber attacks. It explains that cybersecurity is important for families, schools, businesses, critical infrastructure, and governments. Some common cyber threats include phishing, ransomware, and wiperware. The document advises installing antivirus software, firewalls, and updating programs to help protect computers. It provides contact information for government agencies that can help with cybercrime issues.

Uploaded by

Glenn Marundan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Cybersecurity:: Protecting Yourself in Cyberspace

This document discusses cybersecurity and provides information about protecting yourself online. It defines cybersecurity as the prevention, protection, and recovery from cyber attacks. It explains that cybersecurity is important for families, schools, businesses, critical infrastructure, and governments. Some common cyber threats include phishing, ransomware, and wiperware. The document advises installing antivirus software, firewalls, and updating programs to help protect computers. It provides contact information for government agencies that can help with cybercrime issues.

Uploaded by

Glenn Marundan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

CyberSecurity:

Protecting Yourself in Cyberspace


Engr. ALBERT C. GABRIEL
Information Technology Officer 1
Department of Information and Communications Technology
Overview:
What is CyberSecurity?
Why is CyberSecurity important?
Risk and Threat
What is your role in Cybersecurity
Common Cyber Threats
Who Can Help?
What is
CYBERSECURI
TY?
Department of Information and Communications Technology
CyberSecurity is the prevention of,
protection from, and the restoration from Cyber
Attacks.

According to ITU, it is the collection of tools,


policies, security concepts, security safeguards,
guidelines, risk management approaches, actions,
training, best practices, assurance, and
technologies that can be used to protect the cyber
environment and organization and user’s assets. 
Risk and Threat

Risk (computer) – any event or action that could


cause a loss or damage to computer hardware,
software, data, information, or processing
capability.

Threat – possible danger that might exploit


a vulnerability to breach security and thus,
cause possible harm.
Why is

CYBERSECURI
TY
Department of Information and Communications Technology
CyberSecurity is everyone's concern.

 Families and Parents


 Schools
 Businesses
 Critical infostructure
 Government and military
What is your role in

CYBERSECURI
TY?
Department of Information and Communications Technology
Learning how to protect yourself from cyber
attacks will create a safer online
environment.

Knowing the different types of Cyber threats


and what actions to take is the first step.
Common Cyber Threats

• Phishing – fraudulent practice of sending emails to


induce individuals to reveal personal / financial info

 Do not open messages or attachments from


unknown sources. Use spam filters to prevent
unwanted and dangerous emails.
Common Cyber Threats
• Ransomware – a type of malicious software that
threatens to publish data or perpetually block access to it
unless a ransom is paid.

• Wiperware – a class of malware whose intention is to


wipe the hard drive of the computer it infects.

 Don’t click dubious links


 Always update your computer operating systems and softwares
 Don’t pay ransom
Serious Cyber Threats
• Advanced Persistent Threat or APT (e.g. APT32)
• Targeted Attack
• DoS or DDoS Attack
• Botnet
• Conference Crew
The Issues: CyberSecurity Myths

• Some people may think that having antivirus


software and firewalls installed in their systems
totally secure them from virus attacks
• Some people believe that serious breach comes
from the outside
• Some just don’t care about security because
they do not belong to a security team
Protecting Your Computer

• Install three most important sentinel applications such as


• anti-virus,
• anti-spyware and
• firewall software.
• Update your computer programs especially security
software and block spam emails
• Never open an attachment from unreliable sources
• Do not plug an unknown flashdrive
The ultimate protection of an
individual from cyber threats and
attacks is the individual himself.
Education and awareness on
cybersecurity are vital tools in
preventing cyber attacks and
cybercrimes.
Who can help?
Philippine National Police
Anti-Cybercrime Group
PNP-ACG Operations Center
Camp Crame, Quezon City
Phone: (632)414-1560
Fax: (632)414-2199
E-mail: [email protected]

Who can help?


National Bureau of
Investigation
Cybercrime Division
Taft Avenue, Manila
Phone: (632)523-8231 to 38
local 3454, 3455
E-mail: [email protected]

Who can help?


Department of Justice
Office of Cybercrime
Padre Faura Street
Ermita, Manila
Phone: (+632)521-8345
(+632)524-2230
E-mail: [email protected]

Who can help?


Office of the Assistant Secretary for Cybersecurity and Enabling Technologies
DICT Building, CP Garcia Ave. Diliman, Quezon City

9200101 loc 1002


[email protected]

Who can help?


Cybercrime Investigation and Coordination Center

9200101 loc 1002


[email protected]
fb.com/CICC.PH

Who can help?


Be Web Smart!
#CyberSafePH
END

You might also like