“TechTIPS 022: Hack-Proofing Your Digital World”
Santos, Churt Noel
BSCS 4A
CS Seminars and Educational Trips
BLOG REPORT:
“TechTIPS 022: Hack-Proofing Your Digital World”
“TechTIPS 022: Hack-Proofing Your Digital World”
I attended a webinar on August 30, 2024, titled "Hack-Proofing Your Digital World," organized by the Department of Science and Technology (DOST) Tarlac via Zoom. The session was led by Ms. Mary Joyce Manalo, a Project Development Officer from the Department of Information and Communications Technology (DICT) – Tarlac, and focused on improving cybersecurity awareness and safeguarding digital identities. To ensure inclusivity, the event also featured a sign language interpreter, Ms. Roxane Joy S. Monolato, who assisted participants throughout the webinar.
I decided to attend this event because of my strong interest in cybersecurity and my goal of pursuing a career in this field after graduation. As a student preparing to enter the cybersecurity industry, I see this event as a valuable opportunity to deepen my understanding of current trends, best practices, and emerging threats in the field. Engaging with experts and peers will not only enhance my knowledge but also help me build connections and gain insights that are crucial for my future career. This event aligns perfectly with my personal and professional aspirations, making it an essential step in my journey towards becoming a cybersecurity professional.
Key Takeaways
- This is the key takeaways I have during the webinar:
- Importance of cybersecurity.
- Safe online practices.
- Types of risks discussed (e.g., malware, phishing, social engineering, etc.).
- Real-world examples such as the "ph1ns" hacking incident in the Philippines.
Cybersecurity is a critical field dedicated to protecting sensitive data and systems from cyber threats and attacks. In today’s digital age, where data has become as essential as oil—fueling industries and driving innovation—ensuring its security is paramount. The increasing frequency and sophistication of cyber threats highlight the need for robust defenses and proactive strategies to safeguard information. As a student with a keen interest in pursuing a career in cybersecurity, I recognize the importance of staying informed about the latest advancements and best practices in this ever-evolving domain.
PHISHING
As a student delving into the field of cybersecurity, one of the key takeaways for me has been understanding phishing. Phishing is a deceptive cyber attack where attackers pose as trustworthy entities to trick individuals into revealing sensitive information, such as login credentials or financial details. This type of attack often involves fraudulent emails, messages, or websites that appear legitimate, exploiting social engineering techniques to manipulate victims. Learning about phishing has highlighted the importance of vigilance and skepticism when interacting with digital communications. Recognizing the signs of phishing is crucial for safeguarding both personal and professional data and is an essential skill in the broader context of cybersecurity.
MALWARE
Understanding malware has shown me how malicious software can compromise systems and data. Malware, which includes viruses, worms, and ransomware, can damage files, steal information, or disrupt operations. Recognizing and defending against malware is essential for maintaining system integrity and data security.
SOCIAL ENGINEERING
Social engineering is a tactic where attackers manipulate people into divulging confidential information or performing actions that compromise security. This can involve psychological manipulation, creating a false sense of urgency, or leveraging personal information to gain trust. It's a reminder of the human element in cybersecurity and the importance of vigilance.
HACKING and HOW DOES IT WORK?
Learning about hacking has provided insight into how attackers exploit vulnerabilities in systems to gain unauthorized access. Hacking involves various methods, including exploiting software flaws, using brute force attacks, or leveraging stolen credentials. Understanding these techniques is crucial for developing effective defenses and improving overall security.
So, how does hacking works?
Hacking involves exploiting vulnerabilities in computer systems or networks to gain unauthorized access or control. The process typically begins with reconnaissance, where hackers gather information about the target. They then scan for vulnerabilities using various tools and techniques. Once a weakness is identified, hackers exploit it to gain access, often installing backdoors to maintain control and avoid detection. To evade security measures, they cover their tracks by deleting logs or obscuring their activities. The final goal can vary from stealing sensitive data to disrupting services, emphasizing the need for robust cybersecurity defenses to protect against such attacks.
IDENTITY THEFT
Lastly, I’ve explored identity theft, where attackers steal personal information to commit fraud or other criminal activities. This can involve using stolen data to open accounts, make unauthorized transactions, or impersonate the victim. Awareness of identity theft is vital for implementing preventative measures and protecting personal and financial information.
SAFE ONLINE ETIQUETTES WE SHOULD LEARN!
- Add only people you know.
- Keep a low profile.
- Be mindful of what you share online. Avoid disclosing personal and sensitive information.
- Respect other people's privacy.
- Use respectful language when engaging online.
In conclusion, understanding the complexities of hacking and related cybersecurity threats is crucial not only for those pursuing a career in cybersecurity but also for everyone navigating the digital world. This knowledge serves as a reminder to practice good online etiquette, remain vigilant, and be cautious of suspicious content and links. By being aware of threats such as phishing, malware, and identity theft, individuals can better protect themselves and their information. Staying informed and proactive helps ensure a safer online experience and highlights the importance of cybersecurity awareness in our increasingly digital lives.
Comments
Post a Comment