0% found this document useful (0 votes)
5 views3 pages

Finals

The document outlines various types of cybersecurity including application security, information security, network security, disaster recovery, operational security, and end-user training. It also discusses the Comeleak cyberattack in the Philippines, emphasizing the need for robust information security policies to prevent similar incidents. Additionally, it explains the concept of Learning Management Systems (LMS), the distinction between the Internet and the World Wide Web, and provides an overview of Google Workspace as a productivity tool.

Uploaded by

connie batucan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views3 pages

Finals

The document outlines various types of cybersecurity including application security, information security, network security, disaster recovery, operational security, and end-user training. It also discusses the Comeleak cyberattack in the Philippines, emphasizing the need for robust information security policies to prevent similar incidents. Additionally, it explains the concept of Learning Management Systems (LMS), the distinction between the Internet and the World Wide Web, and provides an overview of Google Workspace as a productivity tool.

Uploaded by

connie batucan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1. What are the types of Cybersecurity?

Cybersecurity encompasses The various types of Cybersecurity:

1. Application Security: It is the process of making apps more secure by finding, and enhancing the
security of apps. It's Focusing on the security of software applications to prevent vulnerabilities and
unauthorized access. This includes secure coding practices, application testing, and the use of web
application firewalls.

2.Information Security: It is a set of strategies for managing the processes, tools and policies necessary
to prevent, detect, document and counter threats to both digital and non-digital information. Protecting
sensitive information, data, and intellectual property from unauthorized access and breaches.

3.Network Security: This involves securing a computer network infrastructure and its traffic against
unauthorized access, attacks, or disruptions. It includes technologies like firewalls, intrusion detection
and prevention systems, and virtual private networks (VPNs).

4. Disaster recovery and Business Continuity Planning: are essential to safeguard an organization's ability
to withstand and recover from disruptions, whether they are caused by natural disasters, cyberattacks,
or other emergencies. A well-thought-out and regularly tested plan can help minimize downtime and
the associated financial and reputational losses.

5. Operational Security: It focuses on safeguarding an organization's day-to-day operations, sensitive


information, and critical assets from various threats, both internal and external. The primary goal of
operational security is to maintain the confidentiality, integrity, and availability of these assets.

6. End-User Training: It will protect individual devices such as computers, smartphones, and tablets from
threats like malware and phishing.

Give one cyberattack in the Philippines and what type of Cybersecurity would be implemented to
prevent that situation to happen.

answer: One significant cyberattack in the Philippines was the "Comeleak" incident in 2016. In this
attack, a group of hackers breached the Commission on Elections (COMELEC) database, resulting in the
leak of sensitive voter information, including names, addresses, and biometric data of millions of Filipino
voters. This breach was a severe data privacy and security incident. To prevent a similar situation from
happening, one cybersecurity type could be implemented:

Information Security Policies and Procedures: They must establish and enforce information security
policies and procedures that guide employees in secure data handling and best practices.

By implementing these cybersecurity measures, organizations can reduce the risk of a data breach or
cyberattack similar to the Comeleak incident and better protect sensitive information and systems.
Additionally, a proactive and vigilant approach to cybersecurity is essential in identifying and mitigating
threats before they result in a breach.
2. What is Learning Management System?

answer: Learning Management System (LMS) is a software platform or application designed to facilitate
the management, delivery, tracking, and administration of educational courses and training programs.
LMS are commonly used in educational institutions, not only educational institutions but also for
businesses, and organizations in order to deliver and manage various types of learning and training,
including online courses, employee training, and professional development.

The three commonly used Learning Management Systems (LMS) are Moodle, Canvas, and Blackboard.
Here are the advantages and disadvantages of using these LMS platforms in the classroom:

1. Moodle: The advantage of Moodle is it is open-source software, which means it's free to use, and
users have the flexibility to modify and adapt it to their specific needs without licensing costs. While the
disadvantage of Moodle is like setting up and maintaining Moodle may require technical expertise,
which could be challenging for educators who are not familiar with server administration.

2. Canvas: The advantage of Canvas is it is known for being user-friendly interface, making it easy for
both instructors and students to navigate and use. While the disadvantage of Canvas when it comes
with licensing fees. This can be a barrier for smaller educational institutions with limited budgets.

3. Blackboard Learn: The advantage of Blackboard Learn when it comes Technical Support, Blackboard
provides robust technical support and consulting services to help institutions use the platform
effectively. While the disadvantage of Blackboard Learn it is Costly, Blackboard can be expensive, with
licensing fees and ongoing maintenance costs. This cost may be a barrier for smaller educational
institutions.

3. The terms "Internet" and "World Wide Web" (WWW) are often used interchangeably, but they
represent distinct concepts. The Internet is a vast, global network of interconnected computer
networks. It is the physical infrastructure that enables communication and data exchange between
computers and devices around the world. And it encompasses a multitude of services and technologies,
not limited to the Web. These services include email, instant messaging, file transfer (FTP), and more. It
is essentially a network of networks, made up of servers, routers, switches, and data centers, connected
by various types of communication links, such as fiber optic cables and satellite connections. Lastly it
acts as the underlying foundation that supports various services and protocols, including the World
Wide Web.

While the World Wide Web (WWW) on the other hand is often referred to as the Web, it is a specific
information system that operates over the Internet. It's a wide collection of interconnected documents
and resources that are accessed through web addresses (URLs) and displayed in web browsers. It is also
a subset of the Internet, providing a user-friendly interface for accessing and interacting with
information and resources on the Internet.

The Web is just one of the many services available on the Internet, alongside email, online gaming,
streaming media, and many more.
The benefits of the Internet: It can The allows us to connect and communicate with others worldwide
through email, social media, instant messaging, and video conferencing, fostering international
collaboration and knowledge sharing. While the benefits of the World Wide Web, it a wide repository of
information, making it easy to share knowledge, news, and research globally.

4. Google Workspace, formerly known as G Suite, it is a cloud-based suite of productivity and


collaboration tools developed by Google. Like It includes a wide range of applications and services
designed for business and educational use, providing tools for communication, document creation, file
storage, collaboration, and more. The google apps that I mostly used is the Gmail, the advantage of
using it is accessible on various devices, including smartphones and tablets, through dedicated mobile
apps. This enables users to manage their email on the go.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy