Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

All warfare is cyber – Manila Bulletin

admin by admin
Dec 24, 2022
in Cyber Warfare
A A
0

NIGHT OWL

Anna Mae Lamentillo

As technology evolves and expands, so does cyber security threats — ranging from spam and phishing, data breaches, online privacy violations, distributed denial of service (DDoS) attacks, among many others, as well as cyber-attacks on critical infrastructure that can affect national security and economic activity.
In fact, even warfare is now cyber. Conflicts between nations can now involve cyberattacks aimed at hurting critical infrastructure connected to basic services and economic sectors.

In the US, 93 percent of American consumers fear of other countries launching cyber warfare against the US, according to an April 2022 consumer survey released by internet security firm NordVPN.

Here in the Philippines, while there have been many instances of cyberattacks in the past — cybersecurity threats became more pronounced during the pandemic, when most of us were compelled to shift from physical activities to online, including business, purchasing and payments, and banking.

The Bangko Sentral ng Pilipinas (BSP) reported receiving 42,000 complaints related to online transactions in 2020-2021, amounting to ₱540 million.

Moreover, in Kaspersky’s 2021 global ranking of countries most targeted by web threats, the Philippines ranked fourth.

With the sudden pivot to digitalization of almost every aspect of our life and our society, there is a stronger need to invest more on cybersecurity, not only in terms of ensuring a secured cyberspace but also in promoting digital literacy or cyber hygiene so that citizens are aware of cyber threats and are able to avert them.

Cybersecurity is one of the areas that Department of Information and Communications Technology (DICT) Secretary Ivan John Uy wants to improve on.

The DICT’s Cybersecurity Bureau—tasked to implement the National Cybersecurity Plan (NCSP) and extend immediate assistance to all stakeholders for the suppression of real-time commission of cybersecurity offenses—has been actively raising public awareness campaigns against the development and circulation of false websites, infographics, and social media posts, and also educated different stakeholders on the importance of personal data and how to protect it.

The department, through the National Computer Emergency Response Team (CERT), which handles cybersecurity matters, helps protect government agencies against cyber threats through incident response and handling and capacity building. It evaluates the security of government-operated systems through Vulnerability Assessment and Penetration Testing; conducts regular cyber threat monitoring, and information sharing; and actively monitors cyber threats through the Security Operations Center (SOC).
To protect critical infostructure and implement cyber security standards, the DICT conducts capacity-building activities for critical infostructures, facilitates the establishment of organizational CERTs, and conducts Cybersecurity Advocacy and Awareness Campaigns.

Moreover, we are also collaborating with fellow governments to strengthen cybersecurity and advance our digitalization efforts.

Our Memorandum of Understanding with Singapore involves the exchange of knowledge, technical expertise, and best practices in the field of cyber security; and cooperating to organize training courses and technical programs through the ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE) to develop and enhance skills related to cybersecurity.

We are currently engaging with several other nations to further cooperation on our mutual goal of having a safer cyberspace for all.

In this day and age, the line between the online and physical world is almost non-existent. Cyberspace has become an integral part of our lives. We heavily rely on digital technologies. We can no longer resist this change, we just need to harness the benefits we can gain from it and be vigilant against the dangers that it poses not only on our personal lives, but even on our security and sovereignty as a nation.

 

SIGN UP TO DAILY NEWSLETTER

CLICK HERE TO SIGN-UP

 

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.