protection through network security...careers in network security in the news… 1. the information...
TRANSCRIPT
![Page 1: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/1.jpg)
PROTECTION THROUGH NETWORK
SECURITY
Justin David G. Pineda, C|EH
Pamanatasan ng Lungsod ng Pasig
February 26, 2015
![Page 2: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/2.jpg)
TOPICS FOR TODAY:
The information security discipline
Network security components
Network security attacks
Careers in network security
![Page 3: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/3.jpg)
IN THE NEWS…
![Page 4: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/4.jpg)
1. THE INFORMATION SECURITY DISCIPLINE
![Page 5: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/5.jpg)
WHAT IS THE DIFFERENCE BETWEEN IT
SECURITY AND INFOSEC?
![Page 6: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/6.jpg)
IT SECURITY
Hardware
Firewalls
Software
Anti-virus
Encryption
![Page 7: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/7.jpg)
INFOSEC
I.T. Security
Physical Security
Personnel Security
Risk Management
Business Continuity
Laws & Regulations
![Page 8: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/8.jpg)
WHAT IS INFORMATION SECURITY?
![Page 9: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/9.jpg)
WHAT IS INFORMATION SECURITY?
(ISAAC & ISAAC, 2003)
Confidentiality – Protection from unauthorized disclosure.
Integrity – Protection of resources from modification.
Availability – Protection from Denial of Service (DoS)
![Page 10: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/10.jpg)
EXAMPLE SITUATIONS
• Use of dogs and gates
• DBA modifies DB contents
• Use of biometrics,
username & password
• Blackout
![Page 11: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/11.jpg)
SECURITY SERVICE AND MECHANISMS
Security Service – how objectives are manifested.
Security Mechanisms – solutions we can implement in the enterprise. Inconvenient Truth:
1.You cannot protect everything from everyone.
2.There are not enough resources and money in the world to totally mitigate all risks.
3.Focus on protecting the most important information first, that which must be protected, and that with the highest risk.
![Page 12: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/12.jpg)
SERVICE & MECHANISM EXAMPLE
Goal: I want to focus on physical security
Security Services: (1)Personnel security; (2)
Access control
Security Mechanisms: (1) Security clearance,
training, rules of behavior; (2) Biometrics,
proximity card, mantraps;
![Page 13: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/13.jpg)
OPERATIONAL MODEL OF SECURITY
(CONKLIN ET AL, 2011)
For many years, the focus was on prevention.
Protection = Prevention
For example: Use of Firewall or Gates
![Page 14: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/14.jpg)
OPERATIONAL MODEL (CONT’D)
But what are the realities of a network
environment?
How about Zero-day attacks?
How about DDoS on port 80?
![Page 15: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/15.jpg)
DEFENSE-IN-DEPTH
![Page 16: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/16.jpg)
2. NETWORK SECURITY COMPONENTS
![Page 17: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/17.jpg)
NETWORK VS. HOST SECURITY
Host Security
Refers to a single device
Network Security
Refers to group of devices connected to a network
![Page 18: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/18.jpg)
3-WAY HANDSHAKE
Photo Credit: http://en.wikipedia.org/wiki/SYN_flood
![Page 19: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/19.jpg)
FIREWALL
Preventive tool
Enforces a security policy (What should be
allowed? What should not be allowed?)
Usually placed at the start of the local area
network (LAN).
Uses Access Control List (ACL) and enforces an
Implicit Deny rule.
![Page 20: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/20.jpg)
Photo Credit: https://dessoiii.wordpress.com
![Page 21: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/21.jpg)
FIREWALL TOPOLOGY
Photo Credit: https://technet.microsoft.com
![Page 22: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/22.jpg)
TYPES OF FIREWALLS
Packet Filtering Firewall
Checks the following information: source and
destination IP address, source and destination port
address, protocols.
Example: If somebody will access the school’s web
server, what port should I allow in the firewall?
![Page 23: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/23.jpg)
LIMITATION
SYN FLOOD
Photo Credit: http://en.wikipedia.org/wiki/SYN_flood
![Page 24: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/24.jpg)
TYPES OF FIREWALLS
Packet Inspection Firewall
Also known as the Stateful firewall
Checks for the session state of the connection
Maintains a state table
![Page 25: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/25.jpg)
HOW IT WORKS
Photo Credit: http://rumyittips.com/what-is-stateful-packet-inspection-firewall/
![Page 26: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/26.jpg)
TYPES OF FIREWALLS
Application Firewall
Also known as the Proxy firewall.
Checks data up to the Application Level.
Photo Credit: http://cookbook.fortinet.com/web-rating-overrides/
![Page 27: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/27.jpg)
WHICH FIREWALL SHOULD BE USED IN YOUR
NETWORK?
![Page 28: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/28.jpg)
INTRUSION DETECTION SYSTEM (IDS)
Detective Control
Usually placed after the firewall
Checks traffic based on signatures
Checks for anomalous traffic
Open source type: Snort
![Page 29: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/29.jpg)
IDS TOPOLOGY
Photo Credit: http://www.digitalundercurrents.com/
![Page 30: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/30.jpg)
IDS ENGINES
Signature-based Engine
Checks for known malicious traffic that won’t be
checked by the firewall.
Photo Credit: http://hackertarget.com/xss-tutorial/
![Page 31: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/31.jpg)
IDS ENGINES
Anomaly-based Engine
Checks for abnormal traffic and unusual behavior
and patterns.
Photo Credit: http://www.stationx.net/firewall-test-agent/
![Page 32: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/32.jpg)
HONEYPOT
Intentionally vulnerable network for hackers to
mislead them into thinking they have gain
unauthorized access into the company network.
![Page 33: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/33.jpg)
HONEYPOTS
Photo Credit: http://www.isaserver.org/articlestutorials/articles/2004multidmzp1.html
![Page 34: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/34.jpg)
USUAL CORPORATE NETWORK TOPOLOGY
Photo Credit: http://imgarcade.com/1/dmz-network-topology/
![Page 35: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/35.jpg)
3. COMMON NETWORK ATTACKS
![Page 36: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/36.jpg)
IF NETWORK SECURITY SOLUTIONS ARE
IMPLEMENTED, ARE WE TOTALLY SECURED?
![Page 37: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/37.jpg)
ZERO-DAY ATTACKS
Attacks that are not known.
![Page 38: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/38.jpg)
HOW DOES A VULNERABILITY GET DISCOVERED
AND FIXED?
![Page 39: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/39.jpg)
IN THE HEADLINES…
![Page 40: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/40.jpg)
SOCIAL ENGINEERING
Humans are the weakest link in the security
chain.
90% success rate in achieving hacking goals.
Uses cognitive biases and psychological
triggers.
Photo credit: http://www.thewindowsclub.com/social-engineering-techniques
![Page 41: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/41.jpg)
EAVESDROPPING
Being able to sniff packets that might contain
critical or sensitive information.
Best Solution: Encryption
![Page 42: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/42.jpg)
DENIAL-OF-SERVICE ATTACKS
Distributed Denial of Service (DDoS) is more
dangerous.
Photo credit: http://ahmedccna.blogspot.com/2012/03/certified-ethical-hacking.html
![Page 43: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/43.jpg)
4. CAREERS IN NETWORK SECURITY
![Page 44: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/44.jpg)
SUGGESTED INITIATIVES FOR SCHOOLS
Include INFOSEC as a subject in CS/IT courses.
INFOSEC is a combination of critical thinking,
software development, server administration,
network engineering etc.
Partner with ISSA and create a student chapter
to be updated with current IT trends and
demands.
![Page 45: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/45.jpg)
JISSA FEATURES
http://issaph.org/jissa/?view=featured
![Page 46: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/46.jpg)
![Page 47: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/47.jpg)
![Page 48: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/48.jpg)
![Page 49: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/49.jpg)
INFOSEC STATUS IN THE PH
Relatively young in the PH
High demand for security professionals
Supply is relatively low compared to other IT
roles.
Security Operations/Information Risk Manager
is starting to become an independent
department.
![Page 50: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/50.jpg)
CS/IT FACTS
CS/IT doesn’t have a board exam.
You need certifications to prove your expertise.
(getting a driver’s license)
You need to practice what you learned.
Certifications are internationally recognized.
Certifications will help you professionally.
Goal: Specialist to Management
![Page 51: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/51.jpg)
![Page 52: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/52.jpg)
SECURITY OR FREEDOM?
![Page 53: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/53.jpg)
PRIVACY ISSUES
Are we being watched?
![Page 54: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/54.jpg)
LAST… MORE REGULATIONS
Explore the cybercrimes
Create meaningful laws that
would “really” benefit the public.
Public, specifically Filipinos,
must be protected when
transacting online.
![Page 55: Protection through Network Security...Careers in network security IN THE NEWS… 1. THE INFORMATION SECURITY DISCIPLINE WHAT IS THE DIFFERENCE BETWEEN IT SECURITY AND INFOSEC? IT SECURITY](https://reader034.vdocument.in/reader034/viewer/2022051901/5ff02740e6ba6b7a1f33ff3a/html5/thumbnails/55.jpg)
Q&A