Professional Documents
Culture Documents
Plant Safety Network
Plant Safety Network
May 4, 2024
Republic of the Philippines
BATANGAS STATE UNIVERSITY
The National Engineering University
Lipa Campus
Introduction
You may start protecting your digital life at home or at work by taking this free
online course, Introduction to Cyber Security: Stay Safe Online, which will help you
understand online security. You'll discover how to identify risks that could endanger your
online safety and preventative measures that you can take.
Since cyber security is a hot topic in the media these days, the course will also put
your online safety in perspective by introducing you to various infections, such as viruses
and trojans, as well as ideas like risk management, network security, cryptography, and
identity theft.
This course has been developed by The Open University with support from the UK
Government's National Cyber Security Programme and can be accessed free of charge.
Objectives
Organizers
Openlearn University
This course is accredited by the CPD Standards Office . It can be used to provide
evidence of continuing professional development and on successful completion of the
course you will be awarded 24 CPD points. Evidence of your CPD achievement is
provided on the free Statement of Participation awarded on completion. Anyone wishing
to provide evidence of their enrolment on this course is able to do so by sharing their
Activity Record on their OpenLearn Profile, which is available before completion of the
course and earning of the Statement of Participation.
Presenters
The presenter isn't afraid to question authority figures. He challenges the audience to
consider these important topics regarding the future of technology and its possible effects
on society. He can talk authoritatively on these subjects because of his extensive
knowledge of digital rights and technology. His arguments and viewpoints are heavy from
this credibility. Speeches are more engaging and memorable when he adds comedy to
them. This humor can serve to keep the audience interested and lighten difficult subjects.
Republic of the Philippines
BATANGAS STATE UNIVERSITY
The National Engineering University
Lipa Campus
Topics Covered
Week 2 Authentication
Week 3 Malware
Week 5 Cryptography
This topic covered the basic cybersecurity threats in the online world which is “Phishing”.
Cory explained it as social engineering focused to get your credentials / account email
and passwords. The size of your company doesn’t matter to criminals whether small or
big. “CIA” appeared in this topic which is already discussed by our instructor in this course.
Nobody should use a computer owned by someone without their permission, not abiding
to do so will lead to criminal activity – Computer Misuse Act 1990.
Week 2 – Authenticaiton
This topic shows us how to create the ideal password. We should create password with
combination of letters, numbers, and symbols to protect ourselves from hackers. The
use of password manager is highly recommended because using different passwords
for your accounts like fb, gmail, windows, and many more could be confusing. It also
emphasized the use of “Two-Factor Authentication” or “2FA” this allow us to be more
secure than using a simple single authentication.
Week 3 – Malware
The topic highlighted two threats to consumers which is Phishing and Malware. Malware
as explained in the training is the collective name for software that has been designed to
disrupt and damage data. To protect ourselves we must know how computer viruses
enters our computer. The most common way for hackers to get in our system is by offering
free paid software and embedding viruses in email links. Spotting a phishing email is
somewhat tricky, attackers disguise themselves as staffs or employee of a company.
Using antivirus software can help a lot to general consumers as it protect as to most
common viruses, installing one wouldn’t hurt. The best way to test out applications that
Republic of the Philippines
BATANGAS STATE UNIVERSITY
The National Engineering University
Lipa Campus
are suspicious is to run it on a sandbox, a virtual machine that can be run on your
computer this allows the user to run a suspicious application without the risks.
The internet is not a single entity with a single owner it comprises a hierarchy of individual
networks that have been connected to one another. These networks range from local
area networks (LANs) that can be found in many businesses and universities to the
telephone and data networks that link cities and countries by fibre optic cables and
satellite links. Data are not sent by a single chunk instead it is made up of small sized
blocks called datagrams which also called as packets. In this topic several type of
wireless security is explained which everyone should know, connecting to a public wifi
can be risky because the owner of that wifi can access incoming and outcoming data from
the users.
Week 5 – Crpytography
Most of the subject in week 6 are about security within our computer which consist of
firewalls and how to configure firewalls. VPNs are a good way to prevent online
Republic of the Philippines
BATANGAS STATE UNIVERSITY
The National Engineering University
Lipa Campus
information theft as it secures your connection. Though using VPN can be risky, we
should use VPN servers that are credible and widely known. Intrusion Detection System
(IDS) support our network firewall it is used to scan any traffic passing through the firewall
for potential attacks.
In this topic it will show you what happens when your defences fails. Identity theft, believe
it or not it’s very easy for hackers to gain your personal information if you’re not protecting
yourself with common security. We must always be cautious, run antivirus program and
keep it up to date and never associate with obvious phishing emails and websites. Stated
in the training, security breaches happens and we cannot prevent the loss dealt by
malicious hackers. When your credentials are stolen the best thing to do is to report it to
the issuer so they can block the transaction and prevent the hackers from viewing your
account regularly.
Keeping backups of important copies of your account should be done regularly. We must
always update our software to prevent hackers getting in our system. Updates are not
just for features it is accompanied by security updates so be sure to get on the latest
version of your software. To keep our information asset protected we must put in to
practice what we learned in the previous topics like setting up firewalls, installing and
running an antivirus and keeping our operating system up to date.
Republic of the Philippines
BATANGAS STATE UNIVERSITY
The National Engineering University
Lipa Campus
Key Learnings
Creating strong, unique passwords for each account and using a password manager for
better management is crucial to prevent unauthorized access. Two-factor authentication
adds an extra layer of security. Nobody like getting their sensitive information stolen this
should be a general knowledge for everyone to know.
Understanding how malware spreads (phishing emails, suspicious software) and using
antivirus software and sandboxes for testing suspicious applications helps to protect
your system. For a person who installs a lot of desktop application like me sandboxes is
a must to test out an application and see if it could damage my computer or not.
Firewalls, VPNs (with caution), and Intrusion Detection Systems (IDS) work together to
form a defense system against network attacks. Anyone who manages a network must
know how to defend and fortify defenses of a computer network.
Personal Reflections
The area which I like to develop my knowledge into is encryption. The training only tells
intermediate level information about cryptography and encryption. If I could delve deeper
into this are I think it would be beneficial for me as I wanted to work in an industry revolving
around technology. The only thing I know currently is how to encrypt files in WinRar by
putting a password to it. I wanted to be in a level where I could decipher encryption and
make money or work with these skills I wanted to develop.
Republic of the Philippines
BATANGAS STATE UNIVERSITY
The National Engineering University
Lipa Campus
Though not stated in the training I think this training is somewhat close to ethical hacking
as the training encompasses a lot of information about security. I’d like to learn more
about these topics to protect sensitive information that should not be disclose to the
public. Most of my time are at home using a computer and I browse the internet in a daily
basis, as a person that is exposed to security threats I want to be knowledgeable and
how to defend myself on this type or threats.
Data protection concepts like cryptography and digital signatures are already being
used in the industry, understanding how data can be secured during its transmission can
help you choose appropriate security measure for your projects and research. Example,
if your research involves collecting or analyzing data online, you need to consider
cybersecurity risk. Knowing how to identify websites that are secure from not secure to
protect your data from potential attacks or viruses.
Security professionals, this training will provide as the foundation for understanding
core cybersecurity principles. You can use this knowledge to develop or implement
security protocols within your organization. It also helps you to identify potential
vulnerability in systems and data. Knowledge of firewalls, VPNs, and network
vulnerabilities can be helpful if I were to manage computer systems.
Republic of the Philippines
BATANGAS STATE UNIVERSITY
The National Engineering University
Lipa Campus
Conclusion