Preview

Reaction Paper Information Security

Good Essays
Open Document
Open Document
897 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reaction Paper Information Security
Name: Tayabas, Anthony Mark G. Date Submitted: March 12, 2015
ITS Section: 58038 Professor’s Name: Dr. Louie Lacatan

REACTION PAPER
TITLE OF THE ACTIVITY : Information Security DATE : February 27, 2015 TIME : 12:00 PM – 5:00 PM VENUE : BA Multimedia Room, ST Building

Right now we are living in a world where information is very abundant and mostly open to everyone because of the internet. Security and privacy are big issues nowadays and someone has to do some actions regarding these issues. People dealing with the security and privacy of information belong to the field of Information Security, and we are lucky to meet someone knowledgeable about this field of work. Last February 27 at BA Multimedia Room of Saint Therese Building, we held a seminar about Information Technology and our speaker was Mr. Ferdinand Samaniego and together with him is a Computer Engineering graduate of Adamson University, Mr. Tet Aguila. Mr. Samaniego is the Lead Penetration Tester of Bitshield. His task is to find possible threats on applications and provide remedy to these threats.

The seminar was delayed for about an hour because Mr. Samaniego and Mr. Aguila were caught in traffic. Most of us lost their enthusiasm about the seminar because of the delay. But when Mr. Samaniego and Mr. Aguila arrived and started the seminar, everyone became very excited and the eagerness to learn came back to us because Mr. Samaniego told that he will tackle issues about hacking. I think it is normal for us Computer Engineering students to get excited whenever the topic is hacking. We had already attended several seminars and whenever the topic is hacking it usually get all our attention throughout the seminar. So as expected, the seminar was very lively and interactive. Students raised their questions and Mr. Samaniego and Mr. Aguila willingly addressed these questions. At the beginning of the seminar, Mr. Samaniego asked us which operating system we are

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Authentication: The assurance that the communicating entity is the one that it claims to be. The problem of authorization is often thought to be identical to that of authentication; many widely adopted standard security protocols, obligatory regulations, and even statutes are based on this assumption.…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Reaction Paper

    • 714 Words
    • 3 Pages

    Elizabeth Bishop’s “The Hanging of the Mouse”, places animals in the roles of humans in reference to an execution. The writer uses animals to replace humans to possibly convey a message or point of view towards the death penalty. In the story, the mouse is being executed for what we believe is some sort of crime. It isn’t clear whether or not the mouse actually committed a crime, but we are led to believe that an act occurred in which caused the mouse to be executed on this particular day.…

    • 714 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hussein, Handbook of Information Security ( I, 38-64). Hoboken, New Jersey: John Wiley & Sons,…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Project

    • 1487 Words
    • 6 Pages

    This project provides you an opportunity to apply the competencies gained in various units of this course to identify security challenges and apply strategies of countermeasures in the information systems environment.…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Option 3) Pick one of the topics we talked about (i.e. physical security, encryption, biometrics, user training, etc.) and write a comprehensive study and analysis of this topic. Include at least some information not only on current applications of the technology, but also historical uses and as much information as you can gather about what direction this particular segment of information security is headed towards in the near future.…

    • 397 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The path for risk management and the security panels consumed by a corporation are offered by information security strategy and architecture, which is very important to any companies and organizations. The security architecture would need to define the way that obligation would be accomplished in the numerous regions of the corporate. Furthermore, the security architecture must report past activities that have affected the company’s information properties. These incidences designate areas that may need larger safekeeping controls. Fresh intimidations may compel differences in the security design and supplementary controls. The safekeeping design must also integrate with the current technology substructure and postulate assistance in inaugurating the appropriate risk controls needed for the corporate to accomplish its business firmly.…

    • 1522 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Reaction Paper

    • 513 Words
    • 3 Pages

    The film was narrated by Steve Wozniak, co-developer of the Apple computer. The movie took off with Steve Jobs talking in a melodramatic way to the audience, it seems but as the angle of the scene shifts, it was shown that he was actually talking to a director and that they were currently in the middle of shooting a commercial which is for the Apple Computer. The scene then changes showing Steve Jobs talking about some sort of alliance formed between Apple Computer and Microsoft with Bill Gates in the screen (details of this scene was showed later on in the film). Then the film featured a flashback on the younger days of Steve Jobs and Steve Wozniak where they are shown to be caught up in a riot between students and police officers and running in the opposite direction of the tide of people. The movie then proceeds to narrate the events that led to the development of the first Apple computer. The film also features the nerd character of Bill Gates who was then a nobody and even got ignored by Steve Jobs in a computer expo. The story then narrates how competition flared between the two leading companies and how they strived to outwit each other and finally, concluding in the scene where Steve Jobs and Bill Gates announced that they are good together.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Reaction Paper

    • 520 Words
    • 3 Pages

    This film is another campaign material of the Department of Health (DOH) to disseminate information on the prevention of HIV and AIDS to our country. Simply, to inform us how these viruses affect our immune system.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Reaction Paper

    • 363 Words
    • 2 Pages

    This paper is in reaction to what we have watched about the beauty of the Eastern Visayas and Northern Mindanao regions... Eastern Visayas encompasses the two large islands of Leyte and Samar, the province of Biliran and several minor islands. This region is the eastern boundary of the Philippines. Northern Mindanao is composed of four provinces: Bukidnon, Misamis Oriental, Misamis Occidental and the island of Camiguin. It has 5 cities: Ozamis, Oroquieta, Tangub, Gingoog and Cagayan do Oro.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Internet Security

    • 1915 Words
    • 8 Pages

    Over the last decade, the Internet has put the rest of the world at reach because of computers. In the same way it also made computers more reachable by the rest of the world as well. The Internet is subject to widespread attacks ranging from worms, hackers, spoofing, spam, and phishing; just to name a few. Every computer device is susceptible and vulnerable to security attacks and those attacks can be just as detrimental to an organization as it is to an individual. Organizations of all sizes want and need to secure their network connectivity to their data and applications because of the need to collaborate both inside and outside the organization. Because of the security risk vulnerability it poses, organizations need requirements established to maintain its integrity for all its valuable data. Not only is information security important to an organization but also its information is valuable to its consumers who information that it must protect.…

    • 1915 Words
    • 8 Pages
    Powerful Essays