[Audio] cyber security in Political technology By: Jessie R. Añar Student No: 12386529.
[Audio] Introduction Cybersecurity is an important emerging technology to address the increasing threats from cyber-attacks. The Republic Act 10173 Data Privacy Act of 2012 was established to protect the fundamental human rights of privacy in the government and private sector. [1] Sample Footer Text.
[Audio] emerging political technologies User identity and access management [4] Artificial technology & machine learning [2] Cloud technology [3] Every user have distinct digital identity with permission based on their roles, level of responsibilities and permissions. Greater control over user access, which reduces risk of data breaches. Security responsibilities is shared by both provider and customers. Protect cloud-based application, and data against unauthorized access and online attacks. Example: Google Cloud Analyses large amount of data, learn from patterns and predictions about potential threats. Experts can identify and responds to threats faster and more accurate..
[Audio] Challenges Sophisticated cyber threats meaning constant challenges posed by expert and skilled hackers. Unknown flaws in the software or hardware are exploited. Rapid technological advancement introduces new vulnerabilities and flaws. Threats are not limited to locally but also globally..
[Audio] Summary Requires a holistic and proactive approach to cybersecurity, combining technology, education, policy development, and collaboration between stakeholders. Government and organizations need to continuously evolve their cybersecurity strategies to reinforce policies and to stay ahead of emerging threats and protect their digital assets. 2/7/20XX.
[Audio] Thank you References: [1] National Privacy Commission (2012) Republic Act 10173 Data Privacy Act of 2012. Available at: Republic Act 10173 - Data Privacy Act of 2012 - National Privacy CommissionNational Privacy Commission (Accessed by: February 10, 2024) [2] Xin, Y. et al. (2018) Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access Available at: Machine Learning and Deep Learning Methods for Cybersecurity | IEEE Journals & Magazine | IEEE Xplore (Access by: February 10, 2024) [3] Singh, A ., Chatterjee, K. (2017) Cloud security issues and challenges: A Survey. Journal. Available at: Cloud security issues and challenges: A survey – ScienceDirect (Accessed by: February 10, 2024) [4] Tanwar, S., Tyagi, S., Kumar, N., (2019) Security and Privacy: Concept, Paradigms and Solutions. The institution of Engineering Technology (London). Available at: researchgate.net/profile/U-Hariharan/publication/342215946_Safety_measures_for_EHR_systems/links/626a208105d79a3968a769c4/Safety-measures-for-EHR-systems.pdf#page=84 (Accessed by: February 10, 2024).
[Audio] Explain each point through Threats are not limited to locally but also globally. Cyber threats don’t have geographical boundaries meaning threats can originate globally, which makes international cooperation and information sharing is challenging. 2/7/20XX Sample Footer Text.