0% found this document useful (0 votes)
30 views6 pages

Mgaoat

Uploaded by

decenakhiel9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views6 pages

Mgaoat

Uploaded by

decenakhiel9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

BINAN CITY SENIOR HIGH SCHOOL SAN ANTONIO CAMPUS

HOW SECURE ARE WE? ADDRESSING ICT


VULNERABILITIES
A CONCEPT PAPER PROJECT IN EMPOWERMENT TECHNOLOGY

Submitted by:

Carola, Chen Lee D.

Datay, Janelle T.

Decena, Khiel Christian A.

Fallorina, Justine D.

Marina, Jessa Mae Q.

Marquez, Mary An R.

Marzo, Christopher C.

Submitted to:

Mr, Galang, John Maverick M.

Ms, Rucio, Alexis Joyce C.


How Secure Are We? Addressing ICT Vulnerabilies

INTRODUCTION

When discussing computer security, the most key concern is the safety of
information. In accordance with corporate directives and well recognized industry best
procedures, UNFPA ensures the confidentiality and security of the information kept on,
redirected
via or as a result of its technological resources. In the context of this policy, "user"
identifies consultany workers, interns, retirees, vendors, and full-time and part-time
employees.
and additional third-party users who have access to organizational business
technologies
resources as a result of their work duties. Users are expected by management to
adhere to this and
other relevant laws, rules, and policies. User involvement in relation to their work is
necessary for effective information security. Users are responsible for their conduct,
hence they are in charge of any incidents that take place under their usernames.
Users are accountable for adhering to all network policies and procedures. Systems
that they can communicate with. Information and Communications Technology (ICT)
Staff play a crucial role since they are in charge of policy enforcement, security
infrastructure, and stopping security lapses. Information on the duties of ICT staff is
available in the IT Staff Security Policy.

PURPOSE OF THE STUDY

This concept paper aims to draw attention to the organization's information and
communication technology (ICT) vulnerabilities and stress the significance of adhering
to established security protocols. The goal is to guarantee the security of
organizational data by clearly defining the roles and responsibilities of users and ICT
personnel. In order to avoid data breaches, illegal access, and other security issues,
this concept paper highlights how crucial it is to follow security policies.
Resolving vulnerabilities in information and communications technology (ICT) is crucial
because it keeps hackers from accessing software, networks, and data assets:

• Lower the chance of cyberattacks


Attackers may find it more difficult to access systems if flaws are routinely found and
fixed.

• Fulfill the standards for compliance


Vulnerability evaluations can assist in guaranteeing adherence to rules.

• Boost your security stance


Potential flaws in an organization's security posture can be found with the aid of
vulnerability management.

• Safeguard information
Data protection and system downtime can be reduced by comprehending and
reducing security threats.

DESCRIPTION

The goal is to enhance awareness and understanding of ICT vulnerabilities and


their effects on individuals, organizations, and society, promoting a collective
commitment to improving cybersecurity practices. In an interconnected world,
securing ICT systems is crucial. Addressing these vulnerabilities necessitates a
comprehensive approach that combines technical solutions, human awareness, and
collaborative initiatives. By emphasizing cybersecurity measures and cultivating a
culture of security consciousness, we can work towards establishing a more secure
and resilient digital environment.

ICT Vulnerabilities: A Multifaceted Challenge: The biggest challenge in cybersecurity


today is the ever-changing nature of cyber threats. Cybercriminals are constantly
inventing new techniques and strategies to exploit vulnerabilities in networks and
systems. We have also shared examples of cyber security threats and challenges to
provide you with a better understanding.

1: Security Vulnerability In Cloud Computing Environment. -Many organizations


are increasingly opting to utilize cloud storage and applications due to advantages
such as accessibility and cost-effectiveness. However, this surge in cloud computing
adoption has led to a rise in cloud cyber attacks, which occur when cybercriminals
target cloud service platforms.

2: Ransomware Attacks Are Aiming At Critical Business Functions. -


Ransomware attacks represent a significant cybersecurity threat, disrupting business
operations, causing financial losses, and jeopardizing sensitive information. This
malicious software locks users out of their data or encrypts files, making them
inaccessible and capable of spreading across networks. Attackers usually demand a
ransom, often via anonymous payment methods like cryptocurrency; however, paying
does not ensure data recovery, leaving users at risk of losing both their funds and
information.

3: Growing Trend Of IoT (Internet of Things) Device Usage:

A. Description of the data or evidence that the researcher plans to gather or use; -
The research paper examines ICT security through various analytical
approaches, including statistical, qualitative, and comparative analyses,
alongside risk assessments to understand vulnerabilities and threats. Key
findings may reveal prevalent vulnerabilities, emerging cyber threats, and an
assessment of current security practices. Additionally, this research will explore
the impact of user behavior on security risks. Recommendations for enhancing
ICT security are anticipated to include improved security practices, user
education, new technological solutions, and policy changes tailored to address
identified security challenges. The outcomes are intended to aid organizations,
policymakers, and cybersecurity experts in fortifying ICT systems.
B. A description of how the researcher will analyze these data; -The research titled
"How Secure Are We? Addressing ICT Vulnerabilities" aims to provide a
comprehensive evaluation of ICT security through quantitative and qualitative
methodologies. It involves statistical analysis of vulnerability data from sources
like CVE and NVD, examining attack patterns and existing security practices to
identify gaps. The qualitative aspect focuses on analyzing security breaches via
incident reports to uncover root causes and motivations of attackers, along with
conducting security audits to propose remediation strategies. Additionally, user
behavior concerning security risks will be analyzed. By integrating findings from
both methodologies, the research aims to enhance understanding of the
relationship between vulnerabilities, attacks, and security measures, leading to
risk assessments. The study will identify prevalent vulnerabilities and emerging
threats while evaluating the effectiveness of enacted security practices.
Recommendations will focus on strengthening security measures, improving
user education, exploring technological advancements, and suggesting policy
modifications to bolster ICT security, providing valuable insights for
organizations and cybersecurity professionals.

C. A demonstration of how these data and this analytic method will answer the
research question. -The research aims to synthesize findings from both
quantitative and qualitative analyses to provide a comprehensive understanding
of the security challenges within ICT systems. By employing correlation analysis
to assess relationships among vulnerabilities, attacks, and security practices, as
well as conducting risk assessments to evaluate potential threats, the study
intends to illuminate significant vulnerabilities and areas for improvement. The
conclusions will encompass recommendations for enhanced security practices,
user education, technological solutions, and policy changes, all aimed at
addressing identified security challenges. Ultimately, this analysis will contribute
valuable insights toward bolstering ICT security strategies and answering the
pivotal question, "How Secure Are We? Addressing ICT Vulnerabilities.” Support
The importance of addressing ICT vulnerabilities is highlighted by our growing
reliance on Information and Communication Technology across various sectors,
which makes cybersecurity essential to avoid severe economic and societal
repercussions from cyberattacks. The evolving threat landscape, marked by
increasingly frequent and sophisticated attacks, necessitates continuous
improvements in security measures, as existing vulnerabilities in software and
hardware often outstrip current protections. Additionally, human factors play a
significant role in security breaches, underscoring the critical need for user
education. Governments are implementing regulatory frameworks to enhance
cybersecurity practices, while academic research focuses on innovative
solutions. The societal ramifications of cyberattacks, including threats to
privacy, economic stability, and national security, underscore the urgency of
addressing these vulnerabilities. To effectively tackle these issues, a
comprehensive and proactive approach to ICT security is imperative, supported
by research and strategic analysis.
SUPPORT

We are geateful to Mr, Louise Gabriel Caraw for his assistande in finishing our
concept paper, for reviewing every section of it, and for giving us advice on what we
needed to do. Also, We would especially want to thank our co-member, Ms. Mary An
Marquez for offering to publish our paper.

CONTACT INFORMATION

BIÑAN CITY SENIOR HIGH SCHOOL SAN ANTONIO CAMPUS

Chen Lee Domasig Carola

Contact Number: 09310457388

Address: 3560 Zone 5 Ilaya Malaban Biñan Laguna

Gmail: lee.xrt@gmail.com

Janelle Tolentino Datay

Contact Number: 09203323542

Address: 4647 Zone 3 Ilaya Malaban Biñan Laguna

Gmail: janelledatay07@gmail.com

Khiel Christian Abila Decena

Contact Number: 09519806514

Address: Sv4 Pooc Sta Rosa Laguna

Gmail: khiel12@gmail.com

Justine Ezra Dadis Fallorina

Contact Number: 09930834853

Address: 3032 Sta. Veronica St. Almeda Subdivision Dela Paz Biñan Laguna

Gmail: justin.empowerment@gmail.com

Jessa Mae Quijada Marina

Contact Number: 09369366704


Address: 4372 Sitio Pulo Dela Paz Biñan Laguna

Gmail: marinajessamae@gmail.com

Mary An Rogas Marquez

Contact Number: 09941378813

Address: 4319 Sitio Pulo Dela Paz Biñan Laguna

Gmail: maryanmarquez07@gmail.com

Cristopher Catigbe Marzo

Contact Number: 09304028898

Address: 0726 Zone 7 Wawa Malaban Biñan Laguna

Gmail: marzocristopher9@gmail.com

You might also like