MILLAN - Lesson 10

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Christine Joy Millan BSIT 1-3

UNIT ASSESMENTS
1. What new technology coming out in the next 10 years do you think will disrupt the global IT
industry?
Our current technology has already reached great heights compared to the last 10 years.
Virtual Reality already came into reality, 3D printing and automatic cars too! There’s a lot of
things technology can advance further but I’m looking forward to wireless electricity in the
future.

2. Make an analysis on how cybersecurity is being implemented in the Philippines.


With the growing amount of technology users here in the Philippines, implementing and
upholding the laws against cybercrime should be highly regarded. Cybercrime Prevention Act of
2012 and Data Privacy Act of 2012 are some of the laws that helps to ensure the security and
privacy of internet users here in the Philippines.

3. From recent technology updates, what new devices are being connected to the internet?
There’s already a lot of devices that are capable of being connected to the internet. Our
current technological advances are able to give the devices the ability to connect to the internet
ranging from PCs, mobile phones and even home appliances.

4. How do students apply the concept of cloud computing?


Cloud computing is the use of cloud servers accessible by internet for storing, organizing
ang managing data. For us students, cloud computing has been a very big help especially in our
studies. It gave us the ability to manage our documents and store them in this almost unlimited
storage found in the internet. Cloud computing also allows us to have access to our files and
documents through any device any time and any where as long as we have internet connection. It
even lets us share our documents with our classmates and teachers.

5. Give examples of cybersecurity attacks which became headlines in the past year (Philippines
or abroad)
Was COMELEC hacked? Philippines Commission on Elections casts doubt on data breach
claims (https://portswigger.net/daily-swig/was-comelec-hacked-philippines-commission-on-
elections-casts-doubt-on-data-breach-claims)
Christine Joy Millan BSIT 1-3

Asia-Pacific internet registry APNIC says WHOIS admin passwords were mistakenly exposed
for three months (https://portswigger.net/daily-swig/asia-pacific-internet-registry-apnic-says-
whois-admin-passwords-were-mistakenly-exposed-for-three-months)
Filipino credit app Cashalo suffers data breach (https://portswigger.net/daily-swig/filipino-credit-
app-cashalo-suffers-data-breach)
Ukrainian DDoS Attacks Should Put US on Notice—Researchers
(https://threatpost.com/ukrainian-ddos-attacks-should-put-us-on-notice-researchers/178498/)
TrickBot Ravages Customers of Amazon, Paypal and Other Top Brands
(https://threatpost.com/trickbot-amazon-paypal-top-brands/178483/)

6. Related to question #5, give an example very specific to intrusion of data privacy.
The last example talks about this TrickBot malware that’s targeting the famous brands
like Amazon, American Express, JPMorgan Chase, Microsoft, Navy Federal Credit Union,
PayPal, RBC, Yahoo and others. This malware, originally a banking trojan, has now evolved into
a wide-ranging credential-stealer and initial-access threat, which is often responsible for fetching
second-stage binaries such as ransomware. TrickBot typically spreads via emails, though the
latest campaign adds self-propagation. These types of cybersecurity threats use web-injects
modules that are well-known in the banking-trojan world. It works in a way that they present
targets with overlaid facsimiles of real banking log-in sites that the victim then tried to log in on.
Through this method, they are able to steal credential data.

7. Give examples of data security measure which are being implemented in certain institutions,
e.g. banks, school, offices.
Banks, offices, and other establishments handle and store sensitive information so they
avoid data leaks and breaches with regular system updates, multi-factor authentications, anti-
virus protection and firewalls.

8. Identify and discuss one or two application of Internet of Things that you think might be
useful in this time of health crisis.
During this whole COVID-19 pandemic, the faster and earlier a person can be diagnosed,
the better. The use of IoT devices is applied in this situation as it’s able to speed up the detection
process by capturing information from patients. This can be implemented by capturing body
temperatures using different devices, taking samples from suspicious cases, and so on. IoT
devise can also monitor patients remotely with respect to their treatments and stay at home
orders by the authorities. They can also clean areas without risking other people and without any
human interactions. Examples of these types are the implementation of tracking wearable bands,
disinfecting devices, etc.
Christine Joy Millan BSIT 1-3

9. If you are to create a mobile application, conceptualize an application that might be effective
in this situation of health crisis.
A mobile application that can be helpful in this pandemic is an application that the user
can use whenever their health is at risk. An application that the user can answer and diagnose
themselves if they’re positive or not. The application should also include important hotline
numbers they can dial up in case of emergency, contact tracing and tips.

10. Why do you think access to correct and accurate data is essential these days with respect to
politics, health, world events, and the like?
The internet is a vast world on its own, and a lot of things shouldn’t be taken at face
value. Being able to filter down the information you see is an important skill we all need to
master. Fake news, propagandas from fake data and the likes of this are always around us, we
should be able to know how to venture our way in the internet. Having access to correct and
concise data, especially during in this fast-paced world, is what we all need in order for us to not
be misled. Also, correct and accurate data are essential in making important decisions, especially
in this trying times.

You might also like