0% found this document useful (0 votes)
50 views

Quezon City Polytechnic University: Department of Information Technology

This document discusses computer and information security concepts across 7 parts. It covers topics such as security definitions, system hacking, viruses and trojans, cryptography, social engineering, SQL injection, wireless network security, and essential cybersecurity laws in the Philippines. The document is presented by the Department of Information Technology at Quezon City Polytechnic University.

Uploaded by

Frens Britt
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Quezon City Polytechnic University: Department of Information Technology

This document discusses computer and information security concepts across 7 parts. It covers topics such as security definitions, system hacking, viruses and trojans, cryptography, social engineering, SQL injection, wireless network security, and essential cybersecurity laws in the Philippines. The document is presented by the Department of Information Technology at Quezon City Polytechnic University.

Uploaded by

Frens Britt
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

QUEZON CITY POLYTECHNIC UNIVERSITY

PART 1 Introduction to Security Concepts Security Defined Security breaches of everyday technologies Essential Terminologies Computer Security Potential Losses Due to Security Attacks Elements of Security & Fundamental Concepts of Security What makes a System Secure? Benefits of Computer Security Awareness Basic Computer Security Checklist Overview of Ethical Hacking

DEPARTMENT OF INFORMATION TECHNOLOGY

QUEZON CITY POLYTECHNIC UNIVERSITY


PART 2 System Hacking System Foot printing System Vulnerabilities Denial of Service Kinds of Attacks

DEPARTMENT OF INFORMATION TECHNOLOGY

QUEZON CITY POLYTECHNIC UNIVERSITY


PART 3 Trojans and Backdoors & Viruses and Worms Computer Related Crimes Google hacks and internet archive Infection and effects of viruses and Trojans Antivirus Program and how Does Antivirus Software Work?

DEPARTMENT OF INFORMATION TECHNOLOGY

QUEZON CITY POLYTECHNIC UNIVERSITY


PART 4 Cryptography

Common Terminologies What is Encryption? Objectives of Encryption Usage of Encryption Types of Encryption Symmetric vs. Asymmetric Encryption Digital Certificates Digital Signature Cryptography Tools

DEPARTMENT OF INFORMATION TECHNOLOGY

QUEZON CITY POLYTECHNIC UNIVERSITY


PART 5 Social Engineering Social Engineering Examples Human-Based Social Engineering Computer-Based Social Engineering Defense against Social Engineering attacks

DEPARTMENT OF INFORMATION TECHNOLOGY

QUEZON CITY POLYTECHNIC UNIVERSITY


PART 6 SQL Injection Hacking Wireless Networks Securing daily use devices (phones, emails, workstations, etc) Internet Security Understanding Cookies Securing File Downloads Instant Messaging Security Issues Security Practices Specific to Gaming Risks Involved Online Misdirected Searches Stealth Sites and Misleading URLs Unsolicited Emails Mobile Device Security and IMEI Number

DEPARTMENT OF INFORMATION TECHNOLOGY

QUEZON CITY POLYTECHNIC UNIVERSITY


PART 7 Essential Laws Governing Computer Security and Applicable Philippine Laws that penalize cybercrime REPUBLIC ACT 10175 Cybercrime Prevention Law of 2012 Intellectual Property Right E-Commerce Law Optical Law Civil Code Revised Penal Code Special Criminal Law Unfair Competition Act Internet Pornography

DEPARTMENT OF INFORMATION TECHNOLOGY

You might also like