• Use some advanced capabilities of Microsoft Word commonly used to increase productivity and efficiency;
• Efficiency use these features to help improve the productivity of an organization through maximizing the potential of Microsoft Word;
• Create form letters or documents for distribution ...
• Use some advanced capabilities of Microsoft Word commonly used to increase productivity and efficiency;
• Efficiency use these features to help improve the productivity of an organization through maximizing the potential of Microsoft Word;
• Create form letters or documents for distribution to various recipients;
• Create labels and envelops for distribution; and
• Create media-rich documents for printing or publishing
In the professional world, sending out information to convey important information is vital. Because of ICT, things are now sent much faster than the tradition newsletters or postal mail. You can now sent out information you need to share. What if we could still do things much faster an automated way of creating and sending uniform letters with different recipients? Would that not be more convenient?
MAIL MERGE
Is a useful tool that allows you to produce multiple letters, labels, envelopes, name tags, and more using information stored in a list, database, or spreadsheet. When performing a Mail Merge, you will need a Word document (you can start with an existing one or create a new one) and a recipient list, which is typically an Excel workbook.
Two Components of Mail Merge:
1.Form Document
The document that contains the main body of the message we want to convey or send.
2. List or Data File. This is where the individual information or data that needs to be plugged in (merged) to our form document is placed and maintained.
LABEL GENERATION
It creates a blank form document that simulates either a blank label or envelope of pre-defined size and will use the data file that you selected to print the information, typically, individual addresses.
To use Mail Merge:
1.Open an existing Word document, or create a new one.
2. From the Mailings tab, click the Start Mail Merge command and select Step by Step Mail Merge Wizard from the drop-down menu.
Size: 1.84 MB
Language: en
Added: Mar 09, 2025
Slides: 18 pages
Slide Content
Where are we
now?
Tools based
Reactive / Manual
How do we get
there?
Crafting of the National CyberSecurity
Strategy, Policies, Plans and Programs
Establishment of NCERT and Implementation
of other Programs defined in the National
Cybersecurity Plan
What do we want to
achieve?Cyber Resilient
Philippines
Making
Critical
Infostructure
(CII) Trusted
and Secure
Making
Government
Information
Environment
Secure
Making
Businesses
and Supply
Chains
more
Secure
Making
Individual
s Aware
and
Secure
#CyberResilientPH
#CyberToughPH
#CyberAssurancePH
#CyberSafePH
National Targets:
To
systematically
harden CII for
Resiliency
To prepare and secure
government ICT
Infostructure
(Public
and Military)
To raise awareness of cyber risk
and use of security measures
among businesses to prevent and
protect, respond and recover from attacks
To raise awareness on
cyber
risks among users as
they are
the weakest links, they
need to
adopt the right norms in
CyberSecurity
Key Strategic Imperatives
Protection
of Critical
Infostructur
e (CII)
Protection
of
Governme
nt
Networks
(Public and
Military)
Protection
of
Businesses
and Supply
Chains
Protection
of
Individuals
Public Networks thru
establishment of CERTs
Military Networks thru
establishment of Cyber Defense
Centers (DND, NSC, AFP)
CyberSecurity
Assessment and
Compliance
Programs
National Common
Criteria Evaluation
and Certification
Program
Cybersecurity
Education
Campaign Program
#CyberSafePH | #PRInT
Protection of Individuals
CyberSecurity Education Campaign
Program
**Educate, Empower and Encourage (3Es)**
Training of Trainers Project (ToT)
Cybersecurity Outreach Project (#PRInT)
•Use of Paper, Radio, Internet and Television (PRInT)
National Cybersecurity Awareness Month
Integration of Cybersecurity in the education sector
Establishment of Cyber Training facilities
and Certification Programs
Promote National Cybersecurity R&D
Program to attract and cultivate
Cyber Experts
Trainings to Develop Cybersecurity
Specialist
Promote Communities of Practice (COP)
Increase
the Pool of
Cybersecurity
Experts
Integrating Cybersecurity Curriculum in
the Philippine Education System
Table of Contents
Theme 1: Cyberspace and the Fundamentals of
Cybersecurity
Organizations, Policies and Standards
Theme 2: Risk Vectors
Theme 3: International Cybersecurity
Theme 4: Cybersecurity Management In The National
Context
Block T1 – B1
Cybersecurity and Cyberspace – An
Introduction
Block T1 – B2Information Security and Risk
Block T1 – B3
The Structures of Cyberspace:
The Internet Backbone and National
Infrastructures
Block T1 – B4Protocols and Platforms
Block T1 – B5
Security Architecture and Security
Management
THEME 1
Cyberspace and the
Fundamentals of
Cybersecurity
The object of this theme is to lay the knowledge foundations for all of
the instruction that follows by identifying the structural components of
cyberspace.
describe what is meant by cyberspace and cybersecurity;
outline some basic vulnerabilities of developed states to cyber
threats;
describe the basic topology of cyberspace, including its
physical structures and how it is governed by protocols and
procedures; and
outline the basic considerations for appropriate security
architecture.
GOAL
LEARNING OUTCOMES
”
Cyberspace and the
Fundamentals
of CybersecurityT
H
E
M
E
This theme offers an introductory survey of the vulnerabilities
inherent to cyberspace and the ways and means to exploit those
vulnerabilities through various attack chains or vectors.
understand the significance and possible impact of
exploited supply chain, remote, proximity and insider
access to target cyberspace vulnerabilities and those
associated with facilitating enhanced mobility; and
identify the types of security trade-offs associated with
enhanced mobility and the other risk vectors identified in
this theme area.
GOAL
LEARNING OUTCOMES
”
Risk
VectorsT
H
E
M
E
2
:
Block T3 – B1
International Cybersecurity
Organizations
Block T3 – B2
International Standards and
Requirements – A Survey of
Bodies and Practices
Block T3 – B3
National Cybersecurity
Frameworks
Block T3 – B4
Cybersecurity in National and
International Law
THEME 3
International
Cybersecurity
Organizations,
Policies and
Standards
The broad objective if this theme is to expose students to international
standards and organizationsand the ways in which these relate to
national contexts.
GOAL
”
International
Cybersecurity
Organizations, Policies
and Standards
T
H
E
M
E
3
:
Block T4 – B1
National Practices, Policies
and Organizations for Cyber
Resilience
Block T4 – B2
National Cybersecurity
Frameworks
Block T4 – B3Cyber Forensics
Block T4 – B4
National-level Security Audit
and Assessment
THEME 4
Cybersecurity
Management in
the National
Context
The broad objective of this theme is to explore the practice of
managing cybersecurity in the national context.
understand the systems approach to planning for resilience to threats,
attacks and similar events;
be able to situate the practice of employing resilient systems within the
national context;
be able to analyze the utility of frameworks and matrices for planning
and delegation; and
GOAL
LEARNING OUTCOMES
”
Cybersecurity
Management in the
National ContextT
H
E
M
E