Skip to main content

Advocacy, Profession, and Association - Safe and Secure Cyber World

Did you know that there is a worldwide association focused on inspiring a safe and secure cyber world?

Safe and Secure Cyber World - Body of Knowledge

The association is (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. It also develops & maintain the Critical Body of Knowledges (CBK®):

(ISC)² develops and maintains the (ISC)² CBK, a compendium of information security topics. The CBK is a critical body of knowledge that defines global industry standards, serving as a common framework of terms and principles that our credentials are based upon and allows professionals worldwide to discuss, debate, and resolve matters pertaining to the field. Subject matter experts continually review and update the CBK.

If you are interested in deeper study about information security and become a professional in the field, we suggest that you head to https://www.isc2.org (their website) and learn as much you from there.

It would also help a great many of Filipinos if you succeed in understanding or gaining information security knowledge and is able to advocate a safer and secure cyber world. Don't forget to post a thought or two about your interest down in the comments section below.

Comments

Popular Posts

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.

Attack Example - Phishing - SMS Based - Smishing

What exactly is Phishing? It smells fishy, sounds like fishing, and it is exactly fishing. Knowing how social Filipinos are, almost everyone doesn't like being late in knowing who's an item in the office or who likes who, or what successful neighbors are doing to be successful. And so, we non-chalantly fish for information about it. That is exactly the core function of Phishing. It is to gather Personally Identifiable Information (PII) or information which can be used to identify individuals.