0% found this document useful (0 votes)
120 views8 pages

Professional Ethics in Seminar

1. The document summarizes a student's report on a one day webinar on professional ethics. 2. The first speaker was En. Jazannul Azriq from CyberSecurity Malaysia, who discussed cyber security and highlighted that cyber crimes occur every 39 seconds. 3. Key advice included avoiding public WiFi, not saving payment details in browsers, and being wary of suspicious emails and websites. Ransomware was identified as a major threat. 4. The report included blanks for additional speakers and their topics, as well as sections for participant questions and the student's overall opinion, which were not filled in.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views8 pages

Professional Ethics in Seminar

1. The document summarizes a student's report on a one day webinar on professional ethics. 2. The first speaker was En. Jazannul Azriq from CyberSecurity Malaysia, who discussed cyber security and highlighted that cyber crimes occur every 39 seconds. 3. Key advice included avoiding public WiFi, not saving payment details in browsers, and being wary of suspicious emails and websites. Ransomware was identified as a major threat. 4. The report included blanks for additional speakers and their topics, as well as sections for participant questions and the student's overall opinion, which were not filled in.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Student Name/ Student Id SYED MUHAMMAD ABDUL KHOLIQ BIN SYED

MAT DAUD/2018276504
Lecturer Name Baljit Singh a/l Bhathal Singh (Ir. Ts. Dr.)
Group No EMD7M5A
Seminar Name One Day Webinar Engineers in Society
Date and Time 6 NOV 2021 (Saturday) & 8.30 am-6.00 pm

Professional Ethics in Seminar

Listen to the talk attentively and summarize the important contents of the talk.
(Please complete the report in English)

1. Speaker Name & En. Jazannul Azriq, Senior Executive, CyberSecurity


brief biodata Malaysia
2. Topic: Cyber Security (Cyber Security Malaysia)

3. Key points from


speaker -many apps can acces our contact detail
-cyber security occur every 39 second
-34 percent have been bullied last year
-Type of cyber crime,online
scam,cyberstalking,identity theft,flood attacks
-aware of data leakage and loss
-don’t let your browser remember your card detail
-avoid using public wifi
-beware with suspicious email and website
-public wifi not save to log in any account.
-Rasomware is the most threat in cyber
-it will lock your data and ask for money
-two type of ransomware,crypto ransomware and
locker ransomware
-use firewall to prevent ransomware
-practice safe browsing habbit
-backup your data
-Don’t share with anyone your privacy
-crypto can hack our data
-crypto can track all the transaction
-Don’t share any fake news
-need to confirm the news received before it is
disseminated
-don’t use public wifi and log in to any account
specially in bank account
4. Learning or
knowledge
acquired
5. Questions from 1) public wifi mcm kat mcd, starbucks semua tu
participant bahaya ke?
Briefly answer
from speaker (key Avoid using the public wifi.
point) -the still can use our account if logout

If no question from 2) How to avoid leakage of personal data dari third


participant, write party and vpn elok ke to be safe from digital
your potential criminals?
question. -don’t put detail on your social media
-social media is the place easy to see detail
information of someone
- mostly term of service allows to share our
information to third parties.
-vpn can cover our infra

3) adakah actual vpn yang berbayar diiktiraf selamat


-
4) Can I know what CyberSecurity Malaysia did for
the alleged JPN database leak?
-help find the cause of information leakage
-help the government

5) Is it possible that this cybercrime is being


committed by a member of the cybersecurity?
- there are possibilities but there is a team to deal
with all the threats that occur.

6) Dr, does VPN actually allows us to surf into the


Internet in incognito. Can they be tracked in any way?
It can be track using ip adress

7) What is the worst cyber security threat in


Malaysia?
-Ransomware attacks but is not spread to public to
save reputation.
-Cyber flirting among the malaysian.
-Leak video in social media

8) Dr,window defender cukup ke untuk elakkan


serangan ransomware dekat komputer?
-belum cukup,

9) cracked antivirus reliable x Dr?


-not reliable

10) is dark web and deep web real? is black market


consider dark web?
Is real,black market is operate in dark web because it
cannot be trace\

11) Dr, is deep fake is real? and how to prevent it?


Its real. It's hard to avoid deep fake.

6. Your opinion about


invited speaker
and topic
1. Speaker Name & Ir. Mohd Kholel Manaf, General Manager, Fleet
brief biodata Maintenance & Engineering, KTMB
2. Topic: Sharing the Working Experience & Professionalism

3. Key points from -business aviation under civil


speaker -general avaiaton unchedule flight
-
4. Learning or
knowledge
acquired
5. Questions from
participant
Briefly answer
from speaker (key
point)

If no question from
participant, write
your potential
question.

6. Your opinion about


invited speaker
and topic
1. Speaker Name & Ir. Asmadena Bt. Md. Halimi, Managing Director,
brief biodata MMSB Consult Sdn Bhd
2. Topic: Sharing the Working Experience & Professionalism

3. Key points from


speaker
4. Learning or
knowledge
acquired
5. Questions from
participant
Briefly answer
from speaker (key
point)

If no question from
participant, write
your potential
question.

6. Your opinion about


invited speaker
and topic
1. Speaker Name & Mr. Hariss Abdullah, General Manager, Subang
brief biodata Skypark
2. Topic: Industry

3. Key points from


speaker
4. Learning or
knowledge
acquired
5. Questions from
participant
Briefly answer
from speaker (key
point)

If no question from
participant, write
your potential
question.

6. Your opinion about


invited speaker
and topic
1. Speaker Name &
brief biodata
2. Topic:

3. Key points from


speaker
4. Learning or
knowledge
acquired
5. Questions from
participant
Briefly answer
from speaker (key
point)

If no question from
participant, write
your potential
question.

6. Your opinion about


invited speaker
and topic
1. Speaker Name &
brief biodata
2. Topic:

3. Key points from


speaker
4. Learning or
knowledge
acquired
5. Questions from
participant
Briefly answer
from speaker (key
point)

If no question from
participant, write
your potential
question.

6. Your opinion about


invited speaker
and topic

You might also like