National Crime Prevention Week: Cybersecurity Awareness

 

Acar, Lara Jane, Y.

CS Seminars and Educational Trips

BSCS 4A


Cybersecurity Awareness

(Reflection Blog)


     On September 6, 2024, I participated in the "Cybersecurity Awareness" webinar organized by the ICT Literacy and Competency Development Bureau through DICT - CAR, as part of the 30th National Crime Prevention Week, themed "Kabataan Tara Na, sa Crime Prevention Kaisa Ka!" The session, held via Zoom and Facebook Live, featured Mr. Reeve Michael Angelo M. Callejo as the subject matter expert, who provided valuable insights on cybersecurity threats and strategies for online protection.



        The speaker first explained these attacks in detail, outlining how they work and how they can harm both individuals and organizations. Phishing, for example, involves attackers posing as legitimate sources to trick people into revealing sensitive information. Brute force attacks consist of repeatedly trying different password combinations until the correct one is found. MITM attacks occur when hackers intercept communications between two parties, allowing them to steal or manipulate data. The speaker provided steps on how to avoid these attacks, which I will share with you.


To avoid phishing attacks, follow these key steps:

  1. Check if the Website Address is Legitimate: Verify that the website URL is correct and secure (look for HTTPS and a padlock symbol). Be wary of slight misspellings or variations in the domain name.

  2. Check the Sender of Emails: Carefully examine the email address of the sender. Be cautious of unexpected emails from unfamiliar addresses or those that seem suspicious, even if they appear to come from legitimate organizations.

  3. Avoid Entering Credentials: Do not input personal information or credentials on unfamiliar or suspicious websites. Always navigate to websites by typing the URL directly into your browser rather than clicking on links in emails.

  4. Use Two-Factor Authentication (2FA): Enable two-factor authentication for your accounts. This adds an extra layer of security by requiring a second form of verification in addition to your password.

  5. Use Email Platforms with DMARC: Utilize email services that support DMARC (Domain-based Message Authentication, Reporting & Conformance). DMARC helps to prevent email spoofing and phishing by verifying that incoming messages are from authorized sources.

  6. Avoid Clicking Suspicious Links or Images: Do not click on links or images in emails or messages from unknown sources. Hover over links to preview the URL and be cautious of any content that seems unusual or out of context.

Here are some key steps to avoid man-in-the-middle (MITM) attacks:

  1. Use an Updated Browser: Ensure your web browser is always up to date, as updates often include security patches that protect against vulnerabilities exploited in MITM attacks.

  2. Check if the Website is Secured: Verify that the website you're visiting is secured by looking for HTTPS in the URL and a padlock symbol next to it. This indicates that the connection is encrypted.

  3. Use a VPN: Employ a Virtual Private Network (VPN) to encrypt your internet traffic, which adds an additional layer of security and helps protect your data from being intercepted.

  4. Avoid Connecting to Untrusted Public Wi-Fi: Be cautious when connecting to public Wi-Fi networks, as they can be less secure. If you must use public Wi-Fi, use a VPN to help secure your connection.


To avoid brute force attacks, follow these key steps:

  1. Do Not Use Common Passwords: Avoid using easily guessable or commonly used passwords. Opt for unique and complex combinations that are difficult for attackers to guess.

  2. Strengthen Your Password: Create strong passwords that include a mix of uppercase and lowercase letters, numbers, and special characters. The longer and more complex the password, the harder it is to crack.

  3. Do Not Share Your Password: Keep your passwords confidential. Do not share them with others, and be cautious about where you store them to prevent unauthorized access.

  4. Use Anti-Brute Force Measures: Implement security measures such as account lockout policies, which temporarily disable accounts after several failed login attempts, and use multi-factor authentication (MFA) to provide an extra layer of protection.



    By applying the insights from the "Cybersecurity Awareness" webinar, I am now better equipped to protect myself from common cyber threats such as phishing, brute force attacks, and man-in-the-middle (MITM) attacks. One immediate step I will take is to be more vigilant with emails and messages, especially those that request sensitive information. By verifying the source and avoiding suspicious links, I can reduce the risk of falling victim to phishing scams and unauthorized access. Implementing multi-factor authentication (MFA) for all my online accounts will add an extra layer of security. Additionally, I will avoid using public Wi-Fi for sensitive activities or use a Virtual Private Network (VPN) to protect against MITM attacks.



Comments