Professional Documents
Culture Documents
Polytechnic University of The Philippines: Prof. Florante Andres
Polytechnic University of The Philippines: Prof. Florante Andres
WRITTEN REPORT
CYBER SECURITY
-------
GROUP 9
BSA 2-11
2019
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S
Cyber security is the state or process of protecting and recovering networks, devices, and
Other definition: Cyber security refers to the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack, damage, or unauthorized
Brief History
In 1970’s, Robert (Bob) Thomas who was a researcher for BBN Technologies in Cambridge,
Massachusetts created the first computer worm (virus). He realized that it was possible for a
computer program to move across a network, leaving a small trail (series of signs) wherever it
went. He named the program Creeper, and designed it to travel between Tenex terminals on the
early ARPANET, printing the message “I’M THE CREEPER: CATCH ME IF YOU CAN.”
An American computer program named Ray Tomlinson, the inventor of email, was also working for
BBN Technologies at the time. He saw this idea and liked it. He tinkered (an act of attempting to
repair something) with the program and made it self-replicating “the first computer worm.” He
named the program Reaper, the first antivirus software which would found copies of The Creeper
After Creeper and Reaper, cyber-crimes became more powerful. As computer software and
hardware developed, security breaches also increase. With every new development came an
1. Attacks on Confidentiality – personal identifying information and your bank account or credit card
information.
ii
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S
3. Attacks on Availability – to block users from accessing their own data until they pay a fee or
ransom.
ii. APTs (Advanced Persistent Threats: an example of Attack on Integrity) – attacks in which an
unauthorized user infiltrates a network undetected and stays in the network for a long period of
time.
iii. Malware (Attack on Availability) – software that is specifically designed to gain access or
prevent a range of different threats. These prevent a range of different threats. These
include denial of service attacks and other cyber attacks, and data breaches or data theft
situations.
Information Security – designed to protect the confidentiality, integrity, and availability of
computer system data from those with malicious intentions. Confidentiality, integrity, and
exploitation, modification, or denial of the network and network resources. This means that
iii
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S
include a fire or any other case where business is not able to occur under normal
conditions. Businesses need to look at all such potential threats and device BCPs to
References:
https://us.norton.com/internetsecurity-malware-what-is-cybersecurity-what-you-need-to-know.html
https://digitalguardian.com/blog/what-cyber-security
https://www.javatpoint.com/history-of-cyber-security
https://www.techopedia.com/definition/13567/application-security
https://www.techopedia.com/definition/13567/application-security
https://www.techopedia.com/definition/10282/information-security-is
https://www.techopedia.com/definition/24783/network-security
iv
P O LY T E C H N I C U N I V E R S I T Y O F T H E P H I L I P P I N E S
https://www.techopedia.com/definition/3/business-continuity-plan-bcp
https://www.techopedia.com/definition/24144/operations-security-opsec