Aranzo Cyber Security of Government Websites of The Philippines
Aranzo Cyber Security of Government Websites of The Philippines
Aranzo Cyber Security of Government Websites of The Philippines
Members:
BSIT-3G
I. INTRODUCTION
This study aims to identify what are the key problems in terms of cybersecurity of the
Philippine government website and how to improve its cybersecurity. Also, conducting
this study will help future events that may happen to Philippine government website to
make a fast countermeasure when facing a system breach and to prevent data leaked,
identity theft, etc.
General Problem: What is the current state of cyber security of the different
government websites of the Philippines?
SPECIFIC PROBLEM
III. OBJECTIVES
MAIN OBJECTIVES
The goal of this study to generate a clear, concise, and declarative statements
that will help us describe the state of the government website cybersecurity here in the
Philippines. It aims to identify what are the key problems in terms of cybersecurity of the
Philippine government website and how to improve its cybersecurity.
SPECIFIC OBJECTIVES
1. Investigate the cause of vulnerabilities from the cybersecurity of
the government website.
2. Investigate the potential risk and threats of cyberattack from the
government website.
3. Identify the causes of data breaches and cyberattack from the
government website.
4. Identify different strong cyber security measures that
government websites are implementing/should be
implementing to reduce the risk of cyber breached.
WEAKNESSES
1. The Philippine has a robust social media savvy population with few
data protection mechanisms which makes the Philippines
extremely vulnerable to cyber-attacks and incidents.
2. One the challenge is a lack of understanding of the cybersecurity
of the Philippine stakeholders.
3. One of the weaknesses of the Philippines, according to Rene
Jaspe of information security consulting company Sinag Solutions,
is the low number of practicing cybersecurity professionals.
4. The Philippines has a number of laws addressing cyberattacks
such as the Cybercrime Prevention Act. However, these laws only
deal with the aftermath of an attack and not so much with
prevention.
5. The Philippine government's budget constraints have often led to
cybersecurity being put in the backburner.
OPPORTUNITIES
1. In 2017, the Philippine Department of Information,
Communications, and Technology launched the National
Cybersecurity Plan 2022 to increase the security and resilience of
critical data infrastructure that could avoid possible economic
losses of $3.5 billion due to cybersecurity threats.
2. The Philippine government can tap the technology sector in the
country to assess vulnerabilities, and design strong IT systems.
3. Better cybersecurity systems are being develop to counteract
different cybersecurity attacks.
4. A possible integration of a Cybersecurity curriculum for the Senior
High School is in the works as the Department of Information and
Communications Technology (DICT) is coordinating with the
Department of Education (DepEd).
THREATS
1. There has been a rise of “cyberattacks against the Philippines"
and are accelerating at full speed.
2. The number of different hacking groups in the Philippines are
increasing, most of them are involved in cyber-attacks against
Filipino banks, and some of them are also participating in
Hacktivism campaigns against official government websites.
3. There are a number of different attack methods that a person or
group can use against an individual or on an organization or on a
goverment and more are still being develop.
FIRST OPTION
PROS
1. The government should provide a better security system and
undergo the software update for their website
2. The government should provide a higher budget of their IT workers
to have other ways to defend computer system and personal
information of their website from the hacker
CONS
SECOND OPTION
Awareness
PROS
1. The foundation of good security is human behavior, Human
beings, workers, can be your greatest vulnerability or they can be
a force multiplier for security in your organization. Train your
employees on strong authentication.
2. Prioritize and be aware how to protect the website or the data from
the hacker.
CONS
1. Lack of budget for their workers and lack of awareness
2. They need to secure the availability of their workers and slow
internet in the Philippines
VI. CONCLUSION
The websites of the Philippine's government is one of the most target of hackers
or attackers. There are three possible reason why the attackers choose the
government's websites: (a) attackers want to voice their concern; (b) attackers want to
destroyed the government; (c) attackers is just having fun to know their limitations in
hacking, and their main target is the government.
Philippines is one of the countries that is prone to cyberattacks. It is due to the fact that
Philippines don't have a higher level of cybersecurity and there are more skilled cyber
hackers than I.T. experts in preventing attackers to send a malware attack. The cyber-
attacks can bring risk, not just in the government but in the whole country. Important
files and information’s could be leak if attackers will succeed in their plan, they could
use it to threat someone or used it to have authority and command instructions that
can't be opposed by the individual.
Government official should implement skilled I.T. personnel’s that are experts in the field
of cybersecurity. This is to prevent attackers to manipulate the systems that are related
to the government. Doing initial actions can save and prevent individuals being harm.
VII. RECOMMENDATION
Firewalls can thwart malicious hackers and stop employees from browsing
inappropriate websites. Install and update firewall systems on every employee
computer, smartphone, and networked device. Include off-site employees, even if you
use a cloud service provider (CSP) or a virtual private network (VPN). You may also
want to install an intrusion detection/prevention system (IDPS) to provide a greater level
of protection.
4. Set up Web & Email Filters
Use email and web browser filters to deter hackers and prevent spam from clogging
employee inboxes. You can also download “blacklist” services to block users from
browsing risky websites that pose malware risks. Caution your employees against
visiting sites that are frequently associated with cybersecurity threats, such as
pornographic websites or social media. This may seem like a no-brainer; but it only
takes one employee to visit the wrong website to inadvertently download malware onto
government websites.
VIII. REFERENCES