Posts

Showing posts from July, 2017

Ethics: Policy and Behavior

Deadline will always be a deadline. In its simplest way of saying it, You're Late!   To all bloggers and readers who take time to read my blog. I thank you! And also, I am thanking the man of he hour, Sir Justin Pineda who always find time to read every blog of all of his students. I know Sir, I am out of the deadline that this blog should have been posted before 28th of  July. Deadline that I should meet is the main subject of this blog and I failed to make it before the deadline.  This lead me to go back from two meetings we had discussed in Information Security class. A business ethics that all company meet to satisfy each and every workers and their loyal customers. The word "Ethics" which makes me realized that as of now being a third year student, it tells me that I should be aware of my behavior in class. One example is the deadline of this 4th blog post that should been posted on or before the 28th of July.  Business Ethics is a term used for the co

Privacy: Protecting ones Identity

For you, what is Privacy? A different perspective must not always the same as the other. Maybe your answer will different thing from your friend's answer. The question that lead me to extract my inner cognitive skills and to find out more what is really a PRIVACY? Some might say, -A Privacy is a something that you own it and you need to secure it, others will defined it as "Securing ones personal information." All answers are definitely related to one term, Privacy. But it will not just end to it. Privacy is a broad topic, a concept that links to another issue to make it as another idea. Constitutional Laws, some implentation of the companies' rules and regulations and  many more. These were just some part of it, Privacy itself is not just limited to it.  On my perspective, Privacy is a thing that people will usually do and that is to protect ones identity. For the last two weeks, we have learned on our subject, Information Security all the basis and the concept

Security has own Model too

Image
Another three weeks had passed. New topics, new activities and other stuff to do. Having a role model to society is a big factor to say that this country still needs you. And like me as a student, I have roles too. For the three weeks in our Information Security class, I am able to get familiarize with all the models presented in the class by Sir Justin Pineda. Organizing Security models is one topic we all been aware of. Sir Pineda was able to discussed three models. Bell-LaPadula model, Biba  and Clark-Wilson model. Bell-LaPadula model is describing to the access of internet and having the controls which can be labeled on any objects. An access control to all objects having the permission or a clearance to the said objects before you can actually access it. The model have a so-called Security labels which divided to its range. "Top Secret" is the priority. "Public" on the other hand is the least priority. Bell-LaPadula model is a kind of Security model where prot