Posts

Learning Log No. 6

This will be my last entry in this blog, but it this is not the last time that I would study information security. This subject had a big impact on me, because the world needs so much cyber security students and they offer big salaries. This caught my attention which made me want more of information security, not in ways that I will repeat this subject. Hahahahaha. But I really hope Sir Justin Pineda won't resign, because he is one of my favorite professors in Asia Pacific College. He is very diligent, patient and cool when it comes to teaching. Sadly, this is his last term. I just wish the best for his career. These last weeks, we presented our final project which was Web Application Firewall (WAF), this module can be a lot of help in many aspects because with this, you can filter, monitors, and blocks HTTP Traffic to and from a web application. Thank you sir, for this term. I hope our paths will cross again. Mabuhay ka sir!

Learning Log No. 5

Internet censorship is the control or suppression of what can be viewed or accessed in the internet enacted by regulators. Some people may participate in this kind of measure for moral, religious or business reasons. Essentially, it puts restrictions on what information can be publicized or viewed on the Internet. One of the problems that Internet censorship can bring up, is that it can dramatically reduce innovation and progress. The Internet is a place that is full of ideas, opinions, innovation, technologies and logic. It is basically a breeding ground for great ideas where people can learn anything they imagine. The Internet represents one of the most powerful learning tools out there. When it is censored and controlled, there is an attempt to shape what the person thinks by limiting their access to certain information. This can dramatically reduce innovation and technological progress in the name of safeguarding something deemed more important. Whether this be a patent or a ruling...

Learning Log No. 4

Ethics, Policies and Behavior. These were the topics that we discussed throughout these weeks. Ethics is a set of moral principles. These ethics can help an employee behave well in an office to produce a good work environment. In a company, there is business ethics where employees need to follow to maintain a level of trust between the workers and their customers. As a student, I need to be  aware in this kind of practice, so that in the future, I can be an effective and productive employee to the company I will be working for.

Learning Log No. 3

These weeks, we were already focusing on the topic, privacy. Privacy plays a big part in our daily lives. But what is privacy? Privacy is the state of being apart from other people or being secluded. In information security, privacy has a different meaning where privacy is where a data must be protected for it to be safe. Also, Privacy is a concept to protect one's identity. During these weeks, we had exercises that encouraged us on how to apply privacy in our daily problems. We also had a Packet Tracer Activity. Sir Justin also discussed to us about the laws of privacy which is very important. Privacy is a really broad topic, each subtopic may link to another big topic, so I hope we discuss this all before the end of this term.

Learning Log No. 2

Infosec is my favorite subject. I am always eager to go to class knowing it's Infosec. I love Infosec. We reached the end of the 4th week this term, and so far its the best weeks of my life. But on the serious note, so far we have done so much already on our research paper about 'Fake News'. It's actually really hard to look for articles about the topic because it is so broad. We don't have a specific task to do about fake news but so far we are starting to get used to it and its getting easier. We think that we might produce a really good paper by the end of this term.

Learning Log No. 1

Sir Justin Pineda, has been our beloved professor back in 2016, in the subject Data Networks and Communication (DNETCOM). Now, we crossed paths again, but not in a network class anymore, but a Security class called Information Security (INFOSEC).  At the first meeting, Sir Justin said that Information Security is about Confidentiality, Integrity and Availability. Also, he taught us the layers of the Security Architecture which is composed of Data, Application, Host, Network, Operational and Physical. He also taught us the Types of Authentication which are something you know, something you are and something you have. Before the 1st meeting ended, Sir Justin gave us an exercise which we made a presentation on how we should solve the security problems of case studies that he gave us and he made the other groups report on their assigned case study. Before he ended this week's lecture, he gave us our topics for the Research Paper that we will present on this term's midterm...