National Cybersecurity_Presentation DepEd DSC.ppt

Eugene132889 16 views 18 slides Mar 09, 2025
Slide 1
Slide 1 of 18
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18

About This Presentation

• Use some advanced capabilities of Microsoft Word commonly used to increase productivity and efficiency;
• Efficiency use these features to help improve the productivity of an organization through maximizing the potential of Microsoft Word;
• Create form letters or documents for distribution ...


Slide Content

Where are we
now?
Tools based
Reactive / Manual
How do we get
there?
Crafting of the National CyberSecurity
Strategy, Policies, Plans and Programs
Establishment of NCERT and Implementation
of other Programs defined in the National
Cybersecurity Plan
What do we want to
achieve?Cyber Resilient
Philippines

Making
Critical
Infostructure
(CII) Trusted
and Secure
Making
Government
Information
Environment
Secure
Making
Businesses
and Supply
Chains
more
Secure
Making
Individual
s Aware
and
Secure
#CyberResilientPH
#CyberToughPH
#CyberAssurancePH
#CyberSafePH
National Targets:

To
systematically
harden CII for
Resiliency
To prepare and secure
government ICT
Infostructure
(Public
and Military)
To raise awareness of cyber risk
and use of security measures
among businesses to prevent and
protect, respond and recover from attacks
To raise awareness on
cyber
risks among users as
they are
the weakest links, they
need to
adopt the right norms in
CyberSecurity

Key Strategic Imperatives
Protection
of Critical
Infostructur
e (CII)
Protection
of
Governme
nt
Networks
(Public and
Military)
Protection
of
Businesses
and Supply
Chains
Protection
of
Individuals
Public Networks thru
establishment of CERTs
Military Networks thru
establishment of Cyber Defense
Centers (DND, NSC, AFP)
CyberSecurity
Assessment and
Compliance
Programs
National Common
Criteria Evaluation
and Certification
Program
Cybersecurity
Education
Campaign Program

#CyberSafePH | #PRInT
Protection of Individuals
CyberSecurity Education Campaign
Program
**Educate, Empower and Encourage (3Es)**
Training of Trainers Project (ToT)
Cybersecurity Outreach Project (#PRInT)
•Use of Paper, Radio, Internet and Television (PRInT)
National Cybersecurity Awareness Month
Integration of Cybersecurity in the education sector

Establishment of Cyber Training facilities
and Certification Programs
Promote National Cybersecurity R&D
Program to attract and cultivate
Cyber Experts
Trainings to Develop Cybersecurity
Specialist
Promote Communities of Practice (COP)
Increase
the Pool of
Cybersecurity
Experts

Integrating Cybersecurity Curriculum in
the Philippine Education System

Table of Contents
Theme 1: Cyberspace and the Fundamentals of
Cybersecurity
Organizations, Policies and Standards
Theme 2: Risk Vectors
Theme 3: International Cybersecurity
Theme 4: Cybersecurity Management In The National
Context

Block T1 – B1
Cybersecurity and Cyberspace – An
Introduction
Block T1 – B2Information Security and Risk
Block T1 – B3
The Structures of Cyberspace:
The Internet Backbone and National
Infrastructures
Block T1 – B4Protocols and Platforms
Block T1 – B5
Security Architecture and Security
Management
THEME 1
Cyberspace and the
Fundamentals of
Cybersecurity

The object of this theme is to lay the knowledge foundations for all of
the instruction that follows by identifying the structural components of
cyberspace.
describe what is meant by cyberspace and cybersecurity;
outline some basic vulnerabilities of developed states to cyber
threats;
describe the basic topology of cyberspace, including its
physical structures and how it is governed by protocols and
procedures; and
outline the basic considerations for appropriate security
architecture.
GOAL
LEARNING OUTCOMES

Cyberspace and the
Fundamentals
of CybersecurityT
H
E
M
E

1
:

Block T2 – B1Supply Chains/Vendors
Block T2 – B2
Remote-and-Proximity-access
Attacks
Block T2 – B3
Insider Access (Local-access
Attacks)
Block T2 – B4
Mobility Risks, BYOD and
Emerging Trends
THEME 2
Risk
Vectors

This theme offers an introductory survey of the vulnerabilities
inherent to cyberspace and the ways and means to exploit those
vulnerabilities through various attack chains or vectors.
understand the significance and possible impact of
exploited supply chain, remote, proximity and insider
access to target cyberspace vulnerabilities and those
associated with facilitating enhanced mobility; and
identify the types of security trade-offs associated with
enhanced mobility and the other risk vectors identified in
this theme area.
GOAL
LEARNING OUTCOMES

Risk
VectorsT
H
E
M
E

2
:

Block T3 – B1
International Cybersecurity
Organizations
Block T3 – B2
International Standards and
Requirements – A Survey of
Bodies and Practices
Block T3 – B3
National Cybersecurity
Frameworks
Block T3 – B4
Cybersecurity in National and
International Law
THEME 3
International
Cybersecurity
Organizations,
Policies and
Standards

The broad objective if this theme is to expose students to international
standards and organizationsand the ways in which these relate to
national contexts.
GOAL

International
Cybersecurity
Organizations, Policies
and Standards
T
H
E
M
E

3
:

Block T4 – B1
National Practices, Policies
and Organizations for Cyber
Resilience
Block T4 – B2
National Cybersecurity
Frameworks
Block T4 – B3Cyber Forensics
Block T4 – B4
National-level Security Audit
and Assessment
THEME 4
Cybersecurity
Management in
the National
Context

The broad objective of this theme is to explore the practice of
managing cybersecurity in the national context.
understand the systems approach to planning for resilience to threats,
attacks and similar events;
be able to situate the practice of employing resilient systems within the
national context;
be able to analyze the utility of frameworks and matrices for planning
and delegation; and
GOAL
LEARNING OUTCOMES

Cybersecurity
Management in the
National ContextT
H
E
M
E

4
:

END OF PRESENTATION
Tags