Green Modern Simple Cybersecurity Presentation
Green Modern Simple Cybersecurity Presentation
Green Modern Simple Cybersecurity Presentation
GROUP - 7
Lapak, Aban, Racelis
SECURITY
AND LAW
https://cnsc.edu.ph/
02/15
GROUP - 7
https://cnsc.edu.ph/
03/15
GROUP - 7
INTRODUCTION
04/15
GROUP - 7
10 Types of Cybersecurity
04/15
GROUP - 7
1. Application security
2. Cloud security
10 Types of Cybersecurity
05/15
Studio Shodwe
10 Types of Cybersecurity
04/15
GROUP - 7
1. Application security
2. Cloud security
4. Data security
5. Endpoint security
10 Types of Cybersecurity
06/15
GROUP - 7
10 Types of Cybersecurity
04/15
GROUP - 7
1. Application security
2. Cloud security
4. Data security
5. Endpoint security
7. Mobile security
8. Network security
10 Types of Cybersecurity
9. Operational security
07/15
GROUP - 7
Operational security
Operational security covers many types of
cybersecurity processes and technology used
to protect sensitive systems and data by
establishing protocols for access and
monitoring to detect unusual behavior that
could be a sign of malicious activity.
10 Types of Cybersecurity
04/15
GROUP - 7
1. Application security
2. Cloud security
4. Data security
5. Endpoint security
7. Mobile security
8. Network security
10 Types of Cybersecurity
9. Operational security
04/15
GROUP - 7
1. Application security
2. Cloud security
4. Data security
5. Endpoint security
7. Mobile security
8. Network security
10 Types of Cybersecurity
9. Operational security
CYBER LAW
9/15
GROUP - 7
01 02
R.A. 8792 R.A. 9775 (Anti-Child
(E-Commerce Act) Pornography Act of 2009)
An Act Providing For The Guarantee the
Recognition And Use Of
fundamental rights of
Electronic Commercial And
every child from all forms
Non-Commercial Transactions
of neglect, cruelty, and
And Documents, Penalties For
Unlawful Use Thereof And For other conditions
Other Purposes. prejudicial to his/her
development
03 04
R.A. 9995 (Anti-Photo and Video R.A. 10173 (Data Privacy
Voyeurism Act of 2009) Act of 2012)
Prohibits and penalizes the
An Act Protecting Individual
exhibition of photos or video,
Personal Information in Information
whether in. print or broadcast
and Communications Systems in the
through VCD/DVD, internet,
Government and the Private Sector,
cellular phones, or. other
devices are also penalized Creating for this Purpose a National
under this law. Privacy Commission, and for Other
Purposes.
Legal frameworks for cybersecurity are rules or laws that help protect
personal information and ensure that companies handle data responsibly.
Gives Californians control over their personal data, allowing them to request
deletion or prevent companies from selling it.
GROUP - 7
4. Access Devices Regulation Governs the use of access devices, such as cards
Act of 1998 (ADRA): and account numbers, and includes penalties for
access device fraud.
The Cybercrime Prevention Act (CPA) categorizes offenses into three main types:
2. Computer-Related Offenses:
3. Content-Related Offenses:
Requirements:
Adoption of ISO standards.
Computer Emergency Response Teams (CERTs).
Annual assessments by DICT.
Under the Data Privacy Act (DPA), organizations are required to promptly
report data breaches that involve sensitive personal information or may cause
harm to data subjects. Reporting timelines include:
72 Hours to Notify the NPC: Organizations must notify the National Privacy
Commission (NPC) within 72 hours of discovering a breach.
Notification to Data Subjects: Affected individuals must be informed if the
breach poses a risk to their personal information, identity, or privacy.
2.Communications Act of 1934: Protects data shared through common carriers like
cable and satellite services.
3. Computer Fraud and Abuse Act: Criminalizes unauthorized access to protected computers.
5. Video Privacy Protection Act: Protects user privacy related to video rentals and
streaming.
7. Consumer Financial Prevents unfair or deceptive practices in financial
Protection Act: services.
8. Fair Credit Reporting Act: Regulates the collection and use of credit information.
THANK
YOU!