Class discussion about PESTLE Analysis were continued so other groups can share the industry they chose to analyze. Still other groups did not have the opportunity to share their work at that time since we also had seminar about Cyber Security Framework.
I learned this kind of frameworks before when I was still working at Hewlett-Packard (HP) in McKinley, Taguig City. Our technical lead provide us PDFs and manuals that we can read while doing the tasks assigned to us since I was deployed there as a Web Security Consultant.
While the speaker on which he is known as a Brigade General of Philippine Air Force (PAF), share his experienced and knowledge about the topic, I realized that Philippines can also be on top of this technology. From CRT computers to most enhance flat screen and modern CCTVs. Each places that have CCTVs installed can monitor their place 24/7 with the aid of this security enhancements. Though there are still crime occurred, this can be lessen and provide protection to community. Also, the world of IT become wide and more Filipinos who will be in this field can have the opportunity to be in demand.
Cybersecurity Framework based on National Institute of Standards and Technology (NIST) is a cycle that composed of Identity, Protect, Detect, Respond and Recover. There are also different kind of activities on this cyber sectors like,
- Cyber peace activities consists of information sharing.
- Cyber crisis activities on which the target are end-users, traffic capacity and network controls.
- Cyber war activities which are engage military cyber ware forces, cyber espionage and cyber sabotage.
In the Philippines, there is cyber security already implemented and soon to be announced like,
- Cybercrime Investigation and Coordinating Council (CICC)
- Cybercrime Computer Emergency Response Team (CERT)
- EO 189 (Recently signed last September 2015)
I had a previous post here that also discussed rules obtaining to Cybercrime Law of the Philippines.
Still lot of cyber-attacks occurred in and out of the country and we need to be more vigilant and observant with our surroundings not only outside but also inside the World Wide Web (i.e., source code edit, penetration testing, etc.). Lot of information and data are now online and we cannot make sure if these are safe or not.