SlideShare a Scribd company logo
Ezekiel B. Olac BSA- C01
ITAPP
CLOUD INTRODUCTION
CLOUD COMPUTING
 Refers to the delivery of computing services
over the internet
 Allows users to access resources and services
on demands, without the need for physical
infrastructure or local servers
CLOUD COMPUTING (NIST DEFINITION)
 Is a model for enabling convenient, on-
demand network access to a shared pool of
configurable computing resources
 Promotes availability and is composed of five
essential characteristics, thee service models,
and four deployment models
CLOUD COMPUTING (WIKIPEDIA)
 Is internet-based computing, whereby shared
resources, software and information are
provided to computers and other devices on
demand
 Style of computing in which dynamically
scalable and often virtualized resources are
provided as a service over the internet
CLOUD COMPUTING (WHATIS.COM)
 name cloud computing was inspired by the
cloud symbol that's often used to represent
the Internet in flowcharts and diagrams
 is a general term for anything that involves
delivering hosted services over the Internet.
CLOUD COMPUTING (BERKELEY)
 refers to both the applications delivered as
services over the Internet and the hardware
and systems software in the datacenters that
provide those services
 services themselves have long been referred to
as Software as a Service (SaaS), so we use that
term. The datacenter hardware and software
is what we will call a
Cloud.
 When a Cloud is made available
in a pay-as-you-go manner to the
public…… The service being sold is
Utility Computing.
CLOUD COMPUTING (BUYYA)
 a type of parallel and distributed system
consisting of a collection of interconnected
and virtualized computers that are
dynamically provisioned and presented as
one or more unified computing resources
based on service-level agreements established
through negotiation between the service
provider and consumers.
CLOUD COMPUTING
 Is a paradigm of computing, a new way of
thinking about IT industry but not any
specific technology
CENTRAL IDEAS
 Utility Computing
 SOA (Service Oriented Architecture)
 SLA (Service Level Agreement)
PROPERTIES AND CHARACTERISTICS
 High scalability and elasticity
 High availability and reliability
 High manageability and interoperability
 High accessibility and portability
 High performance and optimization
ENABLING TECHNIQUES
 Hardware virtualization
 Parallelized and distributed computing
 Web service
CLOUD ECOSYSTEM
 Public Cloud
 Private Cloud
 Community Cloud
 Hybrid Cloud
PROPERTIES AND CHARACTERISTICS
SCALABILITY, ELASTICTY
 Dynamic provision
 Multi-tenant design
AVAILABILITY, RELIABILITY
 Fault tolerance
 System resilience
 System security
PERFORMANCE, OPTIMIZATION
 Parallel processing
 Load balancing
 Job scheduling
ACCESSIBILITY, PORTABILITY
 Uniform access
 Thin client
MANAGEABILITY, INTEROPERABILITY
 Control automation
 System monitoring
 Billing system
BENEFITS OF CLOUD
COST SAVINGS
 Pay for what you use, with no upfront
infrastructure costs
SCALABILITY
 Easily scale resources up or down based on
demand
FLEXIBILITY
 Access resources and applications from
anywhere with an internet connection
RELIABILITY
 Cloud providers typically offer high uptime
and data redundancy
COLLABORATION
 Enable seamless collaboration and data
sharing among teams
BENEFITS
FAULT TOLERANT
 property that enables a system to continue
operating properly in the event of the failure
of some of its components.
 Four Basic Characteristics
Ezekiel B. Olac BSA- C01
- No single point of failure
- Fault detection and isolation to the
failing component
- Fault containment to prevent
propagation of the failure
- Availability of reversion modes
HIGH AVAILABILITY
 The degree to which a system, subsystem, or
equipment is in a specified operable and
committable state at the start of a mission,
when the mission is called for at an unknown
time.
RELIABILITY
 The ability of a system or component to
perform its required functions under stated
conditions for a specified period of time.
SCALABILITY
ELASTICITY
KEY CHARACTERISTICS OF CLOUD COMPUITNG
CLOUD DEPLOYEMENT MODELS
Public cloud
 Services are provided over a public network
and available to anyone
 Cost-effective option for business and
individuals
 Offer wide range of services accessible to the
general public
Private cloud
 Infrastructure is dedicated to a single
organization and may be located on-premises
or off-premises
 Designed to meet specific security
 Offer enhances control, customization and
privacy
Hybrid cloud
 Combines public and private cloud
environments
 Organizations can leverage the benefits of
both public and private cloud
 Deployments enable workload portability and
seamless integration
Community cloud
 Deployment model where infrastructure and
services are shared among a specific
community
 Caters to the needs of a particular
community
 Provides a cost-effective solution while
addressing specific requirements
SERVICE MODEL OVERVIEW
DELIVERY MODELS OF CLOUD
SAAS (SOFTWARE AS A SERVICE)
 Delivers software applications over the
internet
 Users can access and use applications directly
through web browsers
 Provider hosts and manages the underlying
infrastructure, application, and data
 Users can typically customize certain aspects
of the application to fit their needs
 use the provider’s applications running on a
cloud infrastructure.
 The consumer does not manage or control
the underlying cloud infrastructure
Enabling Technique — Web Service
 Web 2.0 is the trend of using the full
potential of the web
- Viewing the Internet as a computing
platform
- Running interactive applications through
a web browser
- Leveraging interconnectivity and mobility
of devices
- Enhanced effectiveness with greater
human participation
 Properties provided by internet:
- Accessibility and portability
Provide service — Web-based Applications
 Conventional applications should translate
their access interface onto web-based
platform.
 Applications in different domains
- General Applications – applications
which are designed for general purpose
- Business Applications – applications
which are designed for business propose
- Scientific Applications – applications
which are designed for scientific propose
Ezekiel B. Olac BSA- C01
- Government Applications – applications
which are designed for government
propose
Provide service — Web Portal
 Offer other services such as e-mail, news,
stock prices, etc.
 Provide a way for enterprises to provide a
consistent look and feel with access control
 Examples:
- iGoogle
- MSNBC
- Netvibes
- Yahoo!
PAAS (PLATFORM AS A SERVICE)
 Offers a platform for developing, testing and
deploying apps
 Users can focus on app development
 Providers manage the underlying
infrastructure
 Developers can leverage pre-configured
environments
 Deploy onto the cloud infrastructure
consumer-created or acquired applications
 The consumer does not manage or control
the underlying cloud infrastructure
System Architecture:
Enabling technique- Runtime Environment Design
 Refers to collection of software services
available
 Common properties in Runtime
Environment:
- Manageability and Interoperability
- Performance and Optimization
- Availability and Reliability
- Scalability and Elasticity
IAAS (INFRASTRUCTURE AS A SERVICE)
 Provides virtualized computing resources over
the internet
 Users have control over the operating
systems, storage and networking components
 Can provision and manage virtual machines
 Provision processing storage, networks and
other fundamental computing resources
 The consumer does not manage or control
the underlying cloud infrastructure but has a
control over operating systems
 Properties supported by virtualization
technique:
- Manageability and interoperability
- Availability and reliability
- Scalability and elasticity
Provide service — System Monitoring Interface
 Several types of monitoring metrics:
- Virtual machine- should be able to
monitor some system states of each
virtual machine
- Virtual storage- should be able to
monitor some storage states of each
virtual storage
- Virtual Network- should be able to
monitor some network states of each
virtual network
COMMON CLOUD COMPUTING USE CASES
DATA STORAGE AND BACKUP
 Store and back up large amounts of data
securely
SOFTWARE DEVELOPMENT AND TESTING
 Rapidly create and deploy applications in a
scalable environment
WEB AND MOBILE APPLICATIONS
 Host web and mobile applications in the
cloud for global accessibility
BIG DATA ANALYTICS
 Process and analyze vast amounts of data
using cloud resources
DISASTER RECOVERY
 Maintain data backups and recovery plans in
the cloud for business continuity
CLOUD ARCHITECTURE
 Refers to the design and structure of cloud
computing environments, including the
arrangement of components and relationship
between them
 Involves various elements that work together
to deliver cloud services and ensure
reliability, scalability and security
NIST ARCHITECTIRE OF CLOUD
CLOUD CONSUMER
 An individual or organization that engages
in business partnership with Cloud
Providers
CLOUD PROVIDER
 A person, organization or entity that is
accountable for offering services to
individuals or entities who are interested in
them
CLOUD AUDITOR
 A party capable of conducting an impartial
evaluation of cloud services, as well as
Ezekiel B. Olac BSA- C01
assessing the performance, security, and
operations of the cloud implementation.
CLOUD BROKER
 An entity responsible for managing the
utilization, performance, and delivery of
cloud services.
CLOUD CARRIER
 An intermediary that facilitates the
connectivity and transportation of cloud
services from Cloud Providers to Cloud
Consumers
CLOUD ARCHITECTURE BEST PRACTICES
ETHICS
 refers to the study of principles and values
that guide human behavior and decision-
making.
 involves evaluating what is morally right or
wrong, just or unjust, and good or bad.
 Ethics provides a framework for individuals
and societies to determine how to navigate
complex situations, make choices, and
interact with others
PROFESSIONAL ETHICS AND CHARACTER
 refers to the moral guidelines and principles
that govern the behavior and conduct of
individuals within a specific profession.
 help professionals make ethical decisions and
uphold their responsibilities to clients,
colleagues, the public, and the field as a
whole.
 Ethical issues within a profession are
situations or dilemmas that involve
conflicting values or principles and require
careful consideration and resolution.
LEGAL, ETHICAL AND SOCIETAL ISSUES
BUSINESS ETHICS
 The moral principles, policies, and values
that govern the way business and individuals
engage in business activity
 Fundamental Business Ethics
- Fairness -Behavior
- Respect - Principle
- Honesty - Trust
- Accountability - Responsibility
- Loyalty - Relationship
- Integrity - Reliability
- Choice - Morality
- Avoid conflict - Compliance
- Relevant Information - Law abiding
- Fulfilling Commitments
CODE OF ETHICS
 Providing a set of principles that affect
employee mindset and decision-making
CODE OF CONDUCT
 A set of values, rules, standards, and
principles outlining what employers expect
from staff within an organization
 Can range from big picture ideals to specific
rules
WHY CREATE CODE OF CONDUCT?
 The organization making a commitment to
self-regulation
 The organization has a framework to inform
ethical decision-making
 Vital part of a company’s compliance and
legal policies
BY CREATING CODE OF CONDUCT
 Staff understands what rules and
expectations management has
 Organization has concrete company policies
Ezekiel B. Olac BSA- C01
 Customers and partners understand the
values of organizations
 Can help engender positive and receptive
attitude from customers
WHAT TO INCLUDE IN CODE OF CONDUCT
 Values your organization believes in
 Guidelines for behavior
 Day-to-day business practices
 How employees should interact with outside
parties
IMPORTANT FACTORS TO CONSIDER
1. Company Values
 Details and topics related to the values the
company holds itself to.
- Business ethics
- Social responsibility
- Environmental responsibility
- Employee rights
- Commitment and responsibility
- Diversity and inclusion
2. Employee behavior
 Leadership must explain to all employees
what is expected of them in terms of behavior
and performance.
- Standards and professionalism
- Discrimination and sexual harassment
policies
- Use of company asset
- Use of social media
- Communication rules
- Disciplinary process
3. Internal practices
 Defined rules related to day-to-day business
practices that are easy to explain
- Dress code
- Annual leave/ holiday time
- Inclement weather policy
- Break policy
- Onboarding process
- Job duties
- Training guidelines
- Rules related to time off through
illness/injury
- Attendance and punctuality
- Use of phone while at work
- Benefits
- Chain of command
4. External practices
 Should define the expectations for employees
when dealing with external parties
- Confidentiality
- Privacy
- Intellectual policies
- Customer communication requirements
- Conflict of
PROFESSIONAL ETHICS
INTRODUCTION
 Is a fundamental framework that guides the
behavior and decision-making of individuals
 Encompasses set of principles, values and
standards that professionals adhere
 Its aim is to maintain integrity, foster trust,
and uphold the well being of clients
 Cornerstone of responsible practice
 Examines moral and ethical issues
KEY CONCEPTS
1. Code of Ethics
 Outline the ethical principles and standards
expected of their members
2. Conflicts of Interest
 Personal interests’ conflict with their
professional duties
3. Client Confidentiality
 Maintaining privacy of client information is a
fundamental ethical obligation
4. Professional competence
 Expected to maintain a high level of
competence in their field
5. Honesty and integrity
 Professionals are expected to maintain a high
level of competence in their field
6. Informed consent
 Must ensure clients and stakeholders are fully
informed about the nature, risks, and
benefits of the services
7. Whistleblowing
 They may face the ethical dilemma of
whether to blow the whistle on these actions
8. Diversity and Inclusion
 Professionals should promote diversity,
equity and inclusion in their practice and
interactions.
9. Boundaries
 Maintaining appropriate boundaries between
professionals and clients, colleagues or other
stakeholders
10. Social responsibility
 Professionals often have broader
responsibility to contribute positively to
society
11. Environmental ethics
 Some professionals have an impact on the
environment
12. Global considerations
 In a globalized world, professionals may
encounter ethical dilemmas
CYBER THREATS AND SECURITY
MALWARE
 Any program or file that is intentionally
harmful to a computer, network or server
SOCIAL ENGINEERING
Ezekiel B. Olac BSA- C01
 Form of cyber-attack in which criminals
manipulative victims into handing over
sensitive information
 TYPES OF SOCIAL ENGINEERING
1. Phishing- sending fraudulent emails or
messages that appear to be from
reputable source
2. Pretexting- creating fabricated scenario or
pretext to deceive individuals into sharing
info
3. Baiting- offering something enticing that
contains malware
4. Quid Pro Quo- offering something in
exchange for info
5. Tailgating- physically following someone
into restricted area
6. Impersonation- pretending to be
someone else
7. Dumpster diving- scavenging through
discarded materials
8. Vishing (Voice Phishing)- using voice
communication
9. Smishing (SMS Phishing)- sending
fraudulent text messages to trick
recipients
10. Water Holing- compromising websites
frequented by the target demographic
IDENTIFYING THEFT
 when someone steals another person's
personal information, such as their name,
Social Security number, credit card number,
or other identifying details, with the
intention of impersonating them
FRAUD
 involves intentional deception for financial
gain or to cause harm
ONLINE HATE CRIMES
 refer to criminal acts that are motivated by
hatred or prejudice and are carried out
through online platforms or digital
communication channels
DATA BREACH
 refers to the unauthorized access, disclosure,
or acquisition of sensitive or confidential
information from a secure location
CYBER VANDALISM
 broad range of malicious activities conducted
with the intention of causing damage,
disruption, or chaos to digital properties
WEBSITE DEFACEMENT
 refers to the act of altering the visual
appearance or content of a website without
permission.
RANSOMWARE
 type of malicious software (malware) designed
to encrypt files on a victim's computer or
network, rendering them inaccessible, and
then demand payment (a ransom) in
exchange for decrypting the files and
restoring access.
RA 11934 (SIM REG ACT)
 is a Philippine law mandating the registration
of SIM cards before activation
RA 10175 (CYBERCRIME PREVENTION ACT)
 is a law in the Philippines that was approved
on September 12, 2012
 aims to address legal issues concerning online
interactions and the Internet in the
Philippines.
SCAREWARE
 type of malware that tricks users into
believing their computer is infected with a
virus or other malicious software, often
through alarming pop-up messages or fake
system notifications
ZOMBIES
 refers to the creation of a network of
compromised computers (also known as a
botnet) under the control of the attacker
PHISHING
 attackers use deceptive emails, text messages,
or websites to trick individuals into divulging
sensitive information such as login
credentials, personal information, or
financial data.
SPEAR PHISHING
 highly targeted form of phishing attack in
which the attacker customizes their phishing
messages to target specific individuals or
organizations.
DEEPFAKES
 type of synthetic media generated using deep
learning techniques, particularly generative
adversarial networks (GANs)
QUISHING (QR PHISHING)
 is a type of cyber attack that leverages Quick
Response (QR) codes to deceive users and
steal sensitive information.
PHARMING
 involves redirecting website traffic from
legitimate websites to fraudulent ones
without the users' knowledge or consent
Ad

More Related Content

Similar to IT Application Notes and Reviewer.pdf file (20)

Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Private Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ali Bahu
 
Introduction to Cloud Computing and AWS
Introduction to Cloud Computing and AWSIntroduction to Cloud Computing and AWS
Introduction to Cloud Computing and AWS
Faisal Ahmed Farooqui
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
ssuser8c0d24
 
MUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdfMUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdf
bigbull8577
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdfcloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
BSEMF20119Unknown
 
Cloud computing
Cloud computingCloud computing
Cloud computing
antimpanghal
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
raghavanp4
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Akshay Vasava
 
Cloud computing
Cloud computingCloud computing
Cloud computing
antimpanghal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
antimpanghal
 
Cloud Deployment
Cloud DeploymentCloud Deployment
Cloud Deployment
Tushar Choudhary
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
GoogleGaming2
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptcloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
HifzaZafar2
 
cloud computing introduction simple.ppt
cloud computing  introduction simple.pptcloud computing  introduction simple.ppt
cloud computing introduction simple.ppt
sivamathi12
 
cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01
Mudassir Farman
 
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
MukeshKrActivelylook
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
PPT.ppt.................................
PPT.ppt.................................PPT.ppt.................................
PPT.ppt.................................
thanvisarvani
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
AslamHossain30
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Private Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ali Bahu
 
Introduction to Cloud Computing and AWS
Introduction to Cloud Computing and AWSIntroduction to Cloud Computing and AWS
Introduction to Cloud Computing and AWS
Faisal Ahmed Farooqui
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
ssuser8c0d24
 
MUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdfMUCLecture_2022_52127829.pdf
MUCLecture_2022_52127829.pdf
bigbull8577
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdfcloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
cloudcomputingsimpleppt-141114085742-conversion-gate01.pdf
BSEMF20119Unknown
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
raghavanp4
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
GoogleGaming2
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptcloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
HifzaZafar2
 
cloud computing introduction simple.ppt
cloud computing  introduction simple.pptcloud computing  introduction simple.ppt
cloud computing introduction simple.ppt
sivamathi12
 
cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01
Mudassir Farman
 
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
MukeshKrActivelylook
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
Agarwaljay
 
PPT.ppt.................................
PPT.ppt.................................PPT.ppt.................................
PPT.ppt.................................
thanvisarvani
 
02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction02_Cloud-Intro.pdf cloud introduction introduction
02_Cloud-Intro.pdf cloud introduction introduction
AslamHossain30
 

Recently uploaded (20)

RITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth Barriers
RITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth BarriersRITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth Barriers
RITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth Barriers
Aime Babi
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
Continuity and Resilience
 
Cost Structure of Hydrogen Vehicle Manufacturing Plant
Cost Structure of Hydrogen Vehicle Manufacturing PlantCost Structure of Hydrogen Vehicle Manufacturing Plant
Cost Structure of Hydrogen Vehicle Manufacturing Plant
surajimarc0777
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
Continuity and Resilience
 
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Chandigarh
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
Continuity and Resilience
 
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your ComplementsHyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
Nayan Kumar
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
Continuity and Resilience
 
Why Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertzWhy Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertz
GrowthExpertz
 
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Insolation Energy
 
Fillip Kosorukov - Passionate About Trading
Fillip Kosorukov - Passionate About TradingFillip Kosorukov - Passionate About Trading
Fillip Kosorukov - Passionate About Trading
Fillip Kosorukov
 
The FedEx Effect; Innovation that Transformed Global Logistics
The FedEx Effect; Innovation that Transformed Global LogisticsThe FedEx Effect; Innovation that Transformed Global Logistics
The FedEx Effect; Innovation that Transformed Global Logistics
ramavisca
 
Leadership Presentation Management Activity.pdf
Leadership Presentation Management Activity.pdfLeadership Presentation Management Activity.pdf
Leadership Presentation Management Activity.pdf
HeshamFandy1
 
Green Corporate Minimalist Infographic Presentation Collection.pptx
Green Corporate Minimalist Infographic Presentation Collection.pptxGreen Corporate Minimalist Infographic Presentation Collection.pptx
Green Corporate Minimalist Infographic Presentation Collection.pptx
BhavadharaniR
 
How to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdf
How to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdfHow to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdf
How to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdf
sundramvozo
 
Solving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-HailingSolving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-Hailing
Nayan Kumar
 
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons  Best Luxury Mattress in Singapore Brand.pptxSimmons  Best Luxury Mattress in Singapore Brand.pptx
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons (SEA) Pte Ltd
 
M. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdf
M. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdfM. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdf
M. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdf
SudkateBoonthaworn1
 
Mr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail UniversityMr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail University
bmdecker1
 
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdfVannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
ovanveen
 
RITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth Barriers
RITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth BarriersRITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth Barriers
RITEM Corporation: Why Your Company Isn’t Scaling – The Hidden Growth Barriers
Aime Babi
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Murphy -Dat...
Continuity and Resilience
 
Cost Structure of Hydrogen Vehicle Manufacturing Plant
Cost Structure of Hydrogen Vehicle Manufacturing PlantCost Structure of Hydrogen Vehicle Manufacturing Plant
Cost Structure of Hydrogen Vehicle Manufacturing Plant
surajimarc0777
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Megan James...
Continuity and Resilience
 
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Visits PEC Chandigarh_ Bridging Academia and Infrastructure Inno...
Kunal Bansal Chandigarh
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Shakti Moha...
Continuity and Resilience
 
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your ComplementsHyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
HyperVerge's journey from $10M to $30M ARR: Commoditize Your Complements
Nayan Kumar
 
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
The Business Conference and IT Resilience Summit Abu Dhabi, UAE - Dr.Carlotta...
Continuity and Resilience
 
Why Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertzWhy Startups Should Hire Fractionals - GrowthExpertz
Why Startups Should Hire Fractionals - GrowthExpertz
GrowthExpertz
 
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Top Solar Panel Manufacturers in India and Photovoltaic Module Manufacturers....
Insolation Energy
 
Fillip Kosorukov - Passionate About Trading
Fillip Kosorukov - Passionate About TradingFillip Kosorukov - Passionate About Trading
Fillip Kosorukov - Passionate About Trading
Fillip Kosorukov
 
The FedEx Effect; Innovation that Transformed Global Logistics
The FedEx Effect; Innovation that Transformed Global LogisticsThe FedEx Effect; Innovation that Transformed Global Logistics
The FedEx Effect; Innovation that Transformed Global Logistics
ramavisca
 
Leadership Presentation Management Activity.pdf
Leadership Presentation Management Activity.pdfLeadership Presentation Management Activity.pdf
Leadership Presentation Management Activity.pdf
HeshamFandy1
 
Green Corporate Minimalist Infographic Presentation Collection.pptx
Green Corporate Minimalist Infographic Presentation Collection.pptxGreen Corporate Minimalist Infographic Presentation Collection.pptx
Green Corporate Minimalist Infographic Presentation Collection.pptx
BhavadharaniR
 
How to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdf
How to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdfHow to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdf
How to Integrate Telehealth Into Existing Workflows for Maximum Impact (1).pdf
sundramvozo
 
Solving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-HailingSolving Disintermediation in Ride-Hailing
Solving Disintermediation in Ride-Hailing
Nayan Kumar
 
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons  Best Luxury Mattress in Singapore Brand.pptxSimmons  Best Luxury Mattress in Singapore Brand.pptx
Simmons Best Luxury Mattress in Singapore Brand.pptx
Simmons (SEA) Pte Ltd
 
M. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdf
M. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdfM. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdf
M. Muhammed - Petroleum Fiscal Systems and Contracts (2010).pdf
SudkateBoonthaworn1
 
Mr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail UniversityMr. Kalifornia Portfolio Group Project Full Sail University
Mr. Kalifornia Portfolio Group Project Full Sail University
bmdecker1
 
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdfVannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
Vannin Healthcare Greencube Electronic Health Record -Modules and Features.pdf
ovanveen
 
Ad

IT Application Notes and Reviewer.pdf file

  • 1. Ezekiel B. Olac BSA- C01 ITAPP CLOUD INTRODUCTION CLOUD COMPUTING  Refers to the delivery of computing services over the internet  Allows users to access resources and services on demands, without the need for physical infrastructure or local servers CLOUD COMPUTING (NIST DEFINITION)  Is a model for enabling convenient, on- demand network access to a shared pool of configurable computing resources  Promotes availability and is composed of five essential characteristics, thee service models, and four deployment models CLOUD COMPUTING (WIKIPEDIA)  Is internet-based computing, whereby shared resources, software and information are provided to computers and other devices on demand  Style of computing in which dynamically scalable and often virtualized resources are provided as a service over the internet CLOUD COMPUTING (WHATIS.COM)  name cloud computing was inspired by the cloud symbol that's often used to represent the Internet in flowcharts and diagrams  is a general term for anything that involves delivering hosted services over the Internet. CLOUD COMPUTING (BERKELEY)  refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services  services themselves have long been referred to as Software as a Service (SaaS), so we use that term. The datacenter hardware and software is what we will call a Cloud.  When a Cloud is made available in a pay-as-you-go manner to the public…… The service being sold is Utility Computing. CLOUD COMPUTING (BUYYA)  a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers. CLOUD COMPUTING  Is a paradigm of computing, a new way of thinking about IT industry but not any specific technology CENTRAL IDEAS  Utility Computing  SOA (Service Oriented Architecture)  SLA (Service Level Agreement) PROPERTIES AND CHARACTERISTICS  High scalability and elasticity  High availability and reliability  High manageability and interoperability  High accessibility and portability  High performance and optimization ENABLING TECHNIQUES  Hardware virtualization  Parallelized and distributed computing  Web service CLOUD ECOSYSTEM  Public Cloud  Private Cloud  Community Cloud  Hybrid Cloud PROPERTIES AND CHARACTERISTICS SCALABILITY, ELASTICTY  Dynamic provision  Multi-tenant design AVAILABILITY, RELIABILITY  Fault tolerance  System resilience  System security PERFORMANCE, OPTIMIZATION  Parallel processing  Load balancing  Job scheduling ACCESSIBILITY, PORTABILITY  Uniform access  Thin client MANAGEABILITY, INTEROPERABILITY  Control automation  System monitoring  Billing system BENEFITS OF CLOUD COST SAVINGS  Pay for what you use, with no upfront infrastructure costs SCALABILITY  Easily scale resources up or down based on demand FLEXIBILITY  Access resources and applications from anywhere with an internet connection RELIABILITY  Cloud providers typically offer high uptime and data redundancy COLLABORATION  Enable seamless collaboration and data sharing among teams BENEFITS FAULT TOLERANT  property that enables a system to continue operating properly in the event of the failure of some of its components.  Four Basic Characteristics
  • 2. Ezekiel B. Olac BSA- C01 - No single point of failure - Fault detection and isolation to the failing component - Fault containment to prevent propagation of the failure - Availability of reversion modes HIGH AVAILABILITY  The degree to which a system, subsystem, or equipment is in a specified operable and committable state at the start of a mission, when the mission is called for at an unknown time. RELIABILITY  The ability of a system or component to perform its required functions under stated conditions for a specified period of time. SCALABILITY ELASTICITY KEY CHARACTERISTICS OF CLOUD COMPUITNG CLOUD DEPLOYEMENT MODELS Public cloud  Services are provided over a public network and available to anyone  Cost-effective option for business and individuals  Offer wide range of services accessible to the general public Private cloud  Infrastructure is dedicated to a single organization and may be located on-premises or off-premises  Designed to meet specific security  Offer enhances control, customization and privacy Hybrid cloud  Combines public and private cloud environments  Organizations can leverage the benefits of both public and private cloud  Deployments enable workload portability and seamless integration Community cloud  Deployment model where infrastructure and services are shared among a specific community  Caters to the needs of a particular community  Provides a cost-effective solution while addressing specific requirements SERVICE MODEL OVERVIEW DELIVERY MODELS OF CLOUD SAAS (SOFTWARE AS A SERVICE)  Delivers software applications over the internet  Users can access and use applications directly through web browsers  Provider hosts and manages the underlying infrastructure, application, and data  Users can typically customize certain aspects of the application to fit their needs  use the provider’s applications running on a cloud infrastructure.  The consumer does not manage or control the underlying cloud infrastructure Enabling Technique — Web Service  Web 2.0 is the trend of using the full potential of the web - Viewing the Internet as a computing platform - Running interactive applications through a web browser - Leveraging interconnectivity and mobility of devices - Enhanced effectiveness with greater human participation  Properties provided by internet: - Accessibility and portability Provide service — Web-based Applications  Conventional applications should translate their access interface onto web-based platform.  Applications in different domains - General Applications – applications which are designed for general purpose - Business Applications – applications which are designed for business propose - Scientific Applications – applications which are designed for scientific propose
  • 3. Ezekiel B. Olac BSA- C01 - Government Applications – applications which are designed for government propose Provide service — Web Portal  Offer other services such as e-mail, news, stock prices, etc.  Provide a way for enterprises to provide a consistent look and feel with access control  Examples: - iGoogle - MSNBC - Netvibes - Yahoo! PAAS (PLATFORM AS A SERVICE)  Offers a platform for developing, testing and deploying apps  Users can focus on app development  Providers manage the underlying infrastructure  Developers can leverage pre-configured environments  Deploy onto the cloud infrastructure consumer-created or acquired applications  The consumer does not manage or control the underlying cloud infrastructure System Architecture: Enabling technique- Runtime Environment Design  Refers to collection of software services available  Common properties in Runtime Environment: - Manageability and Interoperability - Performance and Optimization - Availability and Reliability - Scalability and Elasticity IAAS (INFRASTRUCTURE AS A SERVICE)  Provides virtualized computing resources over the internet  Users have control over the operating systems, storage and networking components  Can provision and manage virtual machines  Provision processing storage, networks and other fundamental computing resources  The consumer does not manage or control the underlying cloud infrastructure but has a control over operating systems  Properties supported by virtualization technique: - Manageability and interoperability - Availability and reliability - Scalability and elasticity Provide service — System Monitoring Interface  Several types of monitoring metrics: - Virtual machine- should be able to monitor some system states of each virtual machine - Virtual storage- should be able to monitor some storage states of each virtual storage - Virtual Network- should be able to monitor some network states of each virtual network COMMON CLOUD COMPUTING USE CASES DATA STORAGE AND BACKUP  Store and back up large amounts of data securely SOFTWARE DEVELOPMENT AND TESTING  Rapidly create and deploy applications in a scalable environment WEB AND MOBILE APPLICATIONS  Host web and mobile applications in the cloud for global accessibility BIG DATA ANALYTICS  Process and analyze vast amounts of data using cloud resources DISASTER RECOVERY  Maintain data backups and recovery plans in the cloud for business continuity CLOUD ARCHITECTURE  Refers to the design and structure of cloud computing environments, including the arrangement of components and relationship between them  Involves various elements that work together to deliver cloud services and ensure reliability, scalability and security NIST ARCHITECTIRE OF CLOUD CLOUD CONSUMER  An individual or organization that engages in business partnership with Cloud Providers CLOUD PROVIDER  A person, organization or entity that is accountable for offering services to individuals or entities who are interested in them CLOUD AUDITOR  A party capable of conducting an impartial evaluation of cloud services, as well as
  • 4. Ezekiel B. Olac BSA- C01 assessing the performance, security, and operations of the cloud implementation. CLOUD BROKER  An entity responsible for managing the utilization, performance, and delivery of cloud services. CLOUD CARRIER  An intermediary that facilitates the connectivity and transportation of cloud services from Cloud Providers to Cloud Consumers CLOUD ARCHITECTURE BEST PRACTICES ETHICS  refers to the study of principles and values that guide human behavior and decision- making.  involves evaluating what is morally right or wrong, just or unjust, and good or bad.  Ethics provides a framework for individuals and societies to determine how to navigate complex situations, make choices, and interact with others PROFESSIONAL ETHICS AND CHARACTER  refers to the moral guidelines and principles that govern the behavior and conduct of individuals within a specific profession.  help professionals make ethical decisions and uphold their responsibilities to clients, colleagues, the public, and the field as a whole.  Ethical issues within a profession are situations or dilemmas that involve conflicting values or principles and require careful consideration and resolution. LEGAL, ETHICAL AND SOCIETAL ISSUES BUSINESS ETHICS  The moral principles, policies, and values that govern the way business and individuals engage in business activity  Fundamental Business Ethics - Fairness -Behavior - Respect - Principle - Honesty - Trust - Accountability - Responsibility - Loyalty - Relationship - Integrity - Reliability - Choice - Morality - Avoid conflict - Compliance - Relevant Information - Law abiding - Fulfilling Commitments CODE OF ETHICS  Providing a set of principles that affect employee mindset and decision-making CODE OF CONDUCT  A set of values, rules, standards, and principles outlining what employers expect from staff within an organization  Can range from big picture ideals to specific rules WHY CREATE CODE OF CONDUCT?  The organization making a commitment to self-regulation  The organization has a framework to inform ethical decision-making  Vital part of a company’s compliance and legal policies BY CREATING CODE OF CONDUCT  Staff understands what rules and expectations management has  Organization has concrete company policies
  • 5. Ezekiel B. Olac BSA- C01  Customers and partners understand the values of organizations  Can help engender positive and receptive attitude from customers WHAT TO INCLUDE IN CODE OF CONDUCT  Values your organization believes in  Guidelines for behavior  Day-to-day business practices  How employees should interact with outside parties IMPORTANT FACTORS TO CONSIDER 1. Company Values  Details and topics related to the values the company holds itself to. - Business ethics - Social responsibility - Environmental responsibility - Employee rights - Commitment and responsibility - Diversity and inclusion 2. Employee behavior  Leadership must explain to all employees what is expected of them in terms of behavior and performance. - Standards and professionalism - Discrimination and sexual harassment policies - Use of company asset - Use of social media - Communication rules - Disciplinary process 3. Internal practices  Defined rules related to day-to-day business practices that are easy to explain - Dress code - Annual leave/ holiday time - Inclement weather policy - Break policy - Onboarding process - Job duties - Training guidelines - Rules related to time off through illness/injury - Attendance and punctuality - Use of phone while at work - Benefits - Chain of command 4. External practices  Should define the expectations for employees when dealing with external parties - Confidentiality - Privacy - Intellectual policies - Customer communication requirements - Conflict of PROFESSIONAL ETHICS INTRODUCTION  Is a fundamental framework that guides the behavior and decision-making of individuals  Encompasses set of principles, values and standards that professionals adhere  Its aim is to maintain integrity, foster trust, and uphold the well being of clients  Cornerstone of responsible practice  Examines moral and ethical issues KEY CONCEPTS 1. Code of Ethics  Outline the ethical principles and standards expected of their members 2. Conflicts of Interest  Personal interests’ conflict with their professional duties 3. Client Confidentiality  Maintaining privacy of client information is a fundamental ethical obligation 4. Professional competence  Expected to maintain a high level of competence in their field 5. Honesty and integrity  Professionals are expected to maintain a high level of competence in their field 6. Informed consent  Must ensure clients and stakeholders are fully informed about the nature, risks, and benefits of the services 7. Whistleblowing  They may face the ethical dilemma of whether to blow the whistle on these actions 8. Diversity and Inclusion  Professionals should promote diversity, equity and inclusion in their practice and interactions. 9. Boundaries  Maintaining appropriate boundaries between professionals and clients, colleagues or other stakeholders 10. Social responsibility  Professionals often have broader responsibility to contribute positively to society 11. Environmental ethics  Some professionals have an impact on the environment 12. Global considerations  In a globalized world, professionals may encounter ethical dilemmas CYBER THREATS AND SECURITY MALWARE  Any program or file that is intentionally harmful to a computer, network or server SOCIAL ENGINEERING
  • 6. Ezekiel B. Olac BSA- C01  Form of cyber-attack in which criminals manipulative victims into handing over sensitive information  TYPES OF SOCIAL ENGINEERING 1. Phishing- sending fraudulent emails or messages that appear to be from reputable source 2. Pretexting- creating fabricated scenario or pretext to deceive individuals into sharing info 3. Baiting- offering something enticing that contains malware 4. Quid Pro Quo- offering something in exchange for info 5. Tailgating- physically following someone into restricted area 6. Impersonation- pretending to be someone else 7. Dumpster diving- scavenging through discarded materials 8. Vishing (Voice Phishing)- using voice communication 9. Smishing (SMS Phishing)- sending fraudulent text messages to trick recipients 10. Water Holing- compromising websites frequented by the target demographic IDENTIFYING THEFT  when someone steals another person's personal information, such as their name, Social Security number, credit card number, or other identifying details, with the intention of impersonating them FRAUD  involves intentional deception for financial gain or to cause harm ONLINE HATE CRIMES  refer to criminal acts that are motivated by hatred or prejudice and are carried out through online platforms or digital communication channels DATA BREACH  refers to the unauthorized access, disclosure, or acquisition of sensitive or confidential information from a secure location CYBER VANDALISM  broad range of malicious activities conducted with the intention of causing damage, disruption, or chaos to digital properties WEBSITE DEFACEMENT  refers to the act of altering the visual appearance or content of a website without permission. RANSOMWARE  type of malicious software (malware) designed to encrypt files on a victim's computer or network, rendering them inaccessible, and then demand payment (a ransom) in exchange for decrypting the files and restoring access. RA 11934 (SIM REG ACT)  is a Philippine law mandating the registration of SIM cards before activation RA 10175 (CYBERCRIME PREVENTION ACT)  is a law in the Philippines that was approved on September 12, 2012  aims to address legal issues concerning online interactions and the Internet in the Philippines. SCAREWARE  type of malware that tricks users into believing their computer is infected with a virus or other malicious software, often through alarming pop-up messages or fake system notifications ZOMBIES  refers to the creation of a network of compromised computers (also known as a botnet) under the control of the attacker PHISHING  attackers use deceptive emails, text messages, or websites to trick individuals into divulging sensitive information such as login credentials, personal information, or financial data. SPEAR PHISHING  highly targeted form of phishing attack in which the attacker customizes their phishing messages to target specific individuals or organizations. DEEPFAKES  type of synthetic media generated using deep learning techniques, particularly generative adversarial networks (GANs) QUISHING (QR PHISHING)  is a type of cyber attack that leverages Quick Response (QR) codes to deceive users and steal sensitive information. PHARMING  involves redirecting website traffic from legitimate websites to fraudulent ones without the users' knowledge or consent
  翻译: