Case Study 3
Case Study 3
By:
Barsobia Angelika V.
Lipang Benjoy D.
Miculob Richard M.
Obsid Yzrah Hushneah P.
Sabote Chrisjun S.
BSIT– 3A
Background
records, became a prime target for cyber threats due to inadequate security
measures.
gaps. Weak password practices among students, such as the use of "123456" or
students with fraudulent emails directing them to fake enrollment portals, further
and regular security audits exacerbated these risks. Research indicates that
Overview
globally recognized security standards (ISO, 2013). The first phase focuses on
(NIST, 2020). Building on these findings, the second phase involves formulating
Layer Security (TLS 1.3) encrypts data during transmission, while Advanced
the fourth phase establishes an incident response protocol outlining roles for
time monitoring tools like Security Information and Event Management (SIEM),
solutions, the study underscores the critical role of the human factor in
and adopting secure password practices, fostering a culture of vigilance (Smith &
Initial Assessment
Security Landscape
vulnerable to brute-force attacks. Compounding this risk was the lack of real-
access, data breaches, and credential theft could occur unchecked, jeopardizing
Existing Threats
undermine its integrity and user trust. A significant vulnerability stems from the
access. Compounding this issue are repeated failed login attempts recorded in
comprehensive training programs for both students and staff, leaving them
where unauthorized access, data breaches, and credential theft are not only
possible but likely, threatening both institutional security and user privacy.
Key Initiatives
mitigating risks and safeguarding sensitive data. Central to these efforts is the
that students, staff, and external actors interact with the system only within
Authentication Systems
To bolster the security of the Online Enrollment System, the institution has
password logins. Under this system, users are required to confirm their identity
through a secondary method, such as a one-time password (OTP) sent via SMS or
practices, ensuring that only legitimate users can access sensitive academic and
financial data. The universal application of MFA across all user roles—students,
digital interactions.
Vulnerability Assessment
To proactively identify and address security weaknesses within the Online
vulnerabilities, the initiative ensures that potential entry points for attackers are
access. This ongoing cycle of testing and remediation not only strengthens the
system’s defenses but also aligns with industry best practices, fostering a
proactive security posture that adapts to emerging threats and safeguards the
system logs to identify suspicious activity, such as rapid sequences of failed login
locking them, thereby preventing further unauthorized access and halting the
before resuming normal operations. This phased approach not only mitigates the
immediate impact of breaches but also reinforces the system’s resilience against
management.
Progress Evaluation
Monitoring
tools, which continuously collect and analyze real-time data from network
correlate events across the system, enabling rapid detection of anomalies such
initiative, firewall logging has been activated to meticulously track all inbound
attempts. This granular logging not only highlights potential intrusion vectors but
into the network’s security posture, ensuring timely threat mitigation and
sophisticated cyberattacks.
Access Control
the institution has prioritized tightening access controls across user roles.
Administrative accounts, which hold elevated privileges to manage sensitive
academic and financial data, are now required to use Multi-Factor Authentication
(MFA) for all logins. This ensures that even if administrative credentials are
registration, tuition fee payments, and academic record viewing, while blocking
the potential damage from compromised student accounts and ensuring that
these measures create a layered defense strategy that balances usability with
Conclusion
Summary
College’s Online Enrollment System underscore the urgent need for proactive
(Brown et al., 2022). Additionally, the adoption of end-to-end encryption for data
transmission and storage ensures compliance with the Data Privacy Act of 2012
pivotal role in rebuilding stakeholder trust, as students and staff now have clarity
the system’s reliability. By harmonizing these initiatives, CPSC not only mitigates
immediate risks but also sets a precedent for secure digitization in Philippine
References
Brown, T., Miller, R., & Davis, K. (2022). Cybersecurity Threats in Higher
15(3), 45-60.
Lee, S., & Patel, M. (2020). Phishing Attacks Targeting Universities: A Case
Republic Act No. 10173. (2012). Data Privacy Act of 2012. Philippines.
Smith, A., & Johnson, B. (2021). The Impact of Weak Passwords on