JOEBEL O.
BARRETE BSIT-3
OBJECTIVES:
   1. Discuss the importance of creating a secured network design:
   Protection of Sensitive Data:
   Networks often handle and store vast amounts of sensitive information, including personal data,
   financial records, trade secrets, and implements controls to prevent unauthorized access, disclosure,
   or modification of this data, safeguarding privacy and preventing data breaches that can lead to
   significant financial and reputational damage.
   Maintaining Business Continuity:
   Network disruptions caused by security incidents can severely impact business operations. A well-
   secured network design incorporates redundancy, fault tolerance, and robust security measures to
   minimize downtime and ensure business continuity in the face of attacks of failures.
   Preventing Financial Losses:
   Security breaches can result in direct financial losses through theft of funds, fraudulent transactions,
   legal penalties, and recovery costs. A secure network design helps prevent these incidents,
   protecting the organizations financial stability.
   Maintaining Customer Trust and Reputation:
   Security breaches erode customer trust and damage an organizations reputation. A secure design
   demonstrates a commitment to protecting customer data, fostering trust and maintaining a positive
   public image.
   Preventing Unauthorized Access and Use:
   A secure design implements access controls and authentication mechanisms to ensure that only
   authorized users and devices can access network resources, preventing misuse and potential insider
   threats.
   Mitigating Cyberattacks:
   The threat landscape is constantly evolving, with increasingly sophisticated cyberattacks targeted
   networks.
   Protecting Critical Infrastructure:
   For organizations operating critical infrastructure network design is vital to prevent cyberattacks
   that could have severe real-world consequences, including disruptions of essential services and
   potential harm to public safety.
   2. Discuss steps or procedure on securing a network:
   Risk Assessment and Planning:
        Identify Assets : Determine all critical network components, data, and resources.
        Identify threats : Analyze potential threats and vulnerabilities that could impact the
           network.
        Assess Risks : Evaluate the likelihood and impact of identified threats.
        Develop a Security Policy : Create comprehensive security Policies and procedures based
           on the risk assessment.
   Implement Security Controls:
          Firewalls: Deploy and configure firewalls at network perimeters and internal segments
           to control traffic flow based on the risk assessment.
          Intrusion Detection and Prevention Systems: Implement systems to monitor network
           traffic for malicious activity and automatically block or alert on suspicious behavior.
          Access Control Lists: Configure ACLs on routers and switches to control traffics flow
           based on source.
   Authentication And Authorization:
         Strong Passwords: Enforce the use of strong, unique passwords and implement
          passwords complexity requirements.
        Multi-Factor Authentication : Implement MFA for all critical accounts and network
          access points.
        Role-Based Access Control : Grant users access only to the resources they need to
          perform their job functions.
        Regular Accounts and permissions, disabling or removing unnecessary accounts.
3. Write down 10 software security best practices :
   1. Input Validation : Sanitize and validate all users inputs to prevent injection attacks cross-site
      scripting, command injection.
   2. Secure Authentication and Authorization : Implement strong authentication mechanisms
      and enforce strict authorization controls based on the principle of least privilege.
   3. Secure Data Handling : protect sensitive data both in transit and at rest. Avoid storing
      sensitive data unnecessarily.
   4. Error Handling and Logging: Implement proper error handling to avoid revealing sensitive
      information. Log security- relevant events for auditing and incidents response.
   5. Regular Security Testing : Conduct regular static and dynamic application security testing , as
      well as penetration testing, to identify vulnerabilities early in the development lifecycle.
   6. Keep Dependencies Updated : Regularly update all third-party libraries, frameworks, and
      dependencies to patch known security vulnerabilities.
   7. Secure Configuration Management: Properly configure application servers, database, and
      other components with security in mind.
   8. Principle of Least Privilege : Grant only the necessary permissions to users, processes, and
      systems to perform their required tasks.
   9. Secure Sessions Management: Implement secure session management techniques to
      prevent session hijacking and fixation attacks.
         10. Defense in Depth: Implement multiple layers of security controls so that if one layer fails,
             others are in place to provide protection.
         Directions:
         1.    A. host-based firewall
         2.    B. network-based firewall
         3.    C. maintenance of system integrity, availability and confidentiality at all times.
         4.    C. robust
         5.    B. Determine who the user is
         6.    A. biometric
         7.    C. a very long list of random words combined with symbols
         8.    C. your private e-mail account
         9.    B. retina pattern
         10.   A. firewall
         Directions:
{Your Name]
[Your Address]
[Your Phone Number]
[Your Email Address]
[Date]
Hiring Manager Human Resources Department
XYZ Bank
[XYZ Bank Address, if known]
Dear Hiring Manager,
I am writing to express my enthusiastic interest in the Information Security Officer position at
XYZ Bank, as advertised [mention where you saw the advertisement, if applicable]. Having
closely followed XYZ Bank's reputation as the leading bank for high-net-worth individuals, I am
particularly drawn to your commitment to security and trust, and I am confident that my
qualifications and passion for information security align perfectly with your requirements.
As a graduate with a degree in [Your Dream Degree, e.g., Information Security, Cybersecurity,
Computer Science with a focus on Security] and certified by the esteemed certifying bodies
highlighted in Lesson 2 [mention specific certifications if applicable, e.g., CISSP, CISM, CompTIA
Security+], I possess a comprehensive understanding of the principles, practices, and
technologies essential for safeguarding sensitive information and critical infrastructure. My
academic background has provided me with a strong foundation in areas such as risk
assessment and management, security architecture, network security, cryptography, incident
response, and regulatory compliance (including [mention relevant regulations, e.g., GDPR, PCI
DSS, local data privacy laws]).
Beyond my formal education and certifications, I have developed a robust skillset in [mention
specific skills, e.g., vulnerability assessment and penetration testing, security information and
event management (SIEM) systems, intrusion detection and prevention systems (IDPS), data
loss prevention (DLP), and security awareness training]. I am adept at analyzing complex
security challenges, developing and implementing effective security policies and procedures,
and staying abreast of the ever-evolving threat landscape. My experience in [mention any
relevant experiences, even if hypothetical based on your studies, e.g., developing security
protocols for a simulated financial institution, conducting risk assessments for hypothetical
scenarios] has honed my problem-solving and analytical abilities, allowing me to proactively
identify and mitigate potential security risks.
I am particularly excited by the opportunity to contribute to XYZ Bank's continued success in
maintaining the highest levels of security for its discerning clientele. I believe my proactive
approach to security, coupled with my understanding of the unique threats facing financial
institutions, would be invaluable in bolstering your existing security framework. Specifically, I
am eager to leverage my skills in [mention a specific skill again, e.g., threat intelligence analysis]
to proactively identify emerging threats targeting high-value assets and implement preemptive
measures to safeguard them. Furthermore, I am committed to fostering a strong security
culture within the organization through comprehensive training and awareness programs.
Thank you for considering my application. I have attached my resume for your detailed review
and welcome the opportunity to discuss my qualifications further in an interview.
Sincerely, [Your Name]