Guardians Like No Other: Navigating the World of Cybersecurity Today

6 March 2024

Trisha Mae Advincula and Clark Thomas Arriola are part of Benilde’s pioneer batch under the country’s first Bachelor of Science in Cybersecurity offered by the School of Management and Information Technology (SMIT). “It has been over two years, and it definitely did not disappoint. I love how our batch has turned into. We have experienced pentesting (penetration testing) websites, creating applications that require a database, and knowledge about the different cyber laws.” Arriola shares. “During my senior high school graduation, the guest speaker with a PhD in Economy informed the audience of the top 10 careers in demand this decade. Cybersecurity sits at number 2. The best part is that De La Salle-College of Saint Benilde is known for releasing new undergraduate programs, and they make sure there is an industry you can work in after you graduate.”

Both Advincula and Arriola do not shy away from the fact that the field of Cybersecurity pays well. “Technology is ever-changing, and so do the challenges that come with it. Most of the kids I knew at my age were hacking games and jailbreaking them. Growing up, I was always interested in how these things worked and what goes on behind all of this. I get to discover new things, help mitigate those, and, on top of that, get paid well. I’m not only securing networks. I’m securing a lifestyle!” Advincula eagerly explains.

They are right. Careers as future Security Analysts, Data Privacy Officers, Risk Management Analysts, Malware Analysts, Cybersecurity Officers, Cybersecurity Trainers, Information Assurance Specialists, Secured Developers, Secured Programmers, Cloud Security Analysts, IT Auditors, Security Auditors, Vulnerability Analysts, PEN Testers, Network Security Engineers, and Security Policy Analysts are very in demand in the current landscape. Cybersecurity requires technical and managerial expertise in data protection, incident response, and security threat assessment. The Bachelor of Science in Cybersecurity program focuses on practical and theoretical aspects of cybersecurity across various fundamental areas like network security and vulnerability assessment, information security policy and governance, digital forensics, and ethical hacking.

In a time when everyone’s daily activities seem to happen in digital spaces, the importance of cybersecurity has become more practical than theoretical. Recent memory is underscored by real-world threats in (1) safeguarding sensitive databases, (2) defending against ransomware attacks, (3) protecting proprietary information, (4) countering disinformation campaigns, and (5) ensuring the security of Internet of Things (IoT) devices among others. We asked these second-year cybersecurity students their take on the above threats based on what they have learned in their classes thus far.

On safeguarding sensitive databases, Arriola discussed the erosion of trust resulting from data breaches: “Digital trust is a key factor in today’s businesses because it has a huge influence on consumers of today’s generation. As cyberattacks become more common, trust becomes more difficult to earn, especially for those who have already faced one. 81% of consumers lose trust in a brand after a breach, while 25% stop interacting with it, a huge number for a business aiming to thrive in this digital age.”

Concerning defense against ransomware, Advincula specifies that “effective cybersecurity can help prevent ransomware attacks through implementing strong security protocols such as firewalls, antivirus, intrusion detection system, backing up data and even more, educating employees on best practices such as detecting phishing emails, and security policy, using strong passwords, etc. Additionally, ensuring your system is up to date is very important. After all, around 88% of data breaches are caused by human error.”

Arriola has this story about protecting proprietary information, “I asked a subject teacher in one of our major courses: ‘How often do systems in your company get attacked? What is the interval between these attacks?’ He replied, ‘Actually, attacks happen almost every few seconds, totaling more than 2,000 daily attacks.’ The entire class was overwhelmed by this information. I then pondered how difficult it would be for an organization without a specific cybersecurity department or even a plan in times of an attack. These statistical readings highlight the efforts of cybersecurity to counter black hat hackers who seek corporate espionage. If those huge numbers of attacks were to be successful, this could result in millions of pesos in damage, resulting in bankruptcy.”

Countering disinformation campaigns is also a hot topic with the proliferation of fake news. Advincula expounds, “Cybersecurity plays a role in identifying and responding to disinformation by using tools to identify patterns, monitor network traffic, and scout the internet and social media. Implementing a response plan to handle disinformation, resolve the issue, and mitigate it as soon as possible, including removing false accounts and blocking websites if needed, is urgent. Everyone should be educated on information hygiene, fact-checking, how to combat phishing (such as educating them about deepfakes), and procedures for responding to disinformation.”

Lastly, ensuring the security of Internet of Things (IoT) devices is a valid concern for us all, says both Advincula and Arriola. “Internet of Things devices or simply IoT are input/output devices like microphones, sensors, and speakers, and they can be connected to the internet or other IoT devices to exchange data with each other,” Arriola details. “A great example of the usage of IoT is smart houses with appliances and security cameras that an owner can control remotely through a smartphone, smartwatch, or even a voice assistant. This lifestyle is very efficient, but considering the vulnerabilities of IoT devices, a cybersecurity professional would say otherwise.” Advincula agrees, “malicious actors can compromise the integrity of devices, gaining unauthorized access and control. The privacy and security of the users are violated, making them vulnerable to exploitation, surveillance, and data theft. Addressing these threats requires comprehensive cybersecurity measures, including improved device security, threat intelligence sharing, regulatory frameworks, and public awareness initiatives.”

Arriola sums up, “On a more personal level, I learned how to speak to people and effectively communicate to an audience, which greatly helps me not just in our group work but also in making friends with people in other programs. Our batch is a lively bunch. Despite the stress and being overwhelmed with technical information, I learned to have fun with my classmates, form bonds beyond the classroom, and treat each other like family. Creating a small but vibrant community within the first batch of Benilde’s cybersecurity is why I am very proud of choosing this program over the others.”

For more information on Benilde’s undergraduate programs, contact us at (63) 2 8230 5100 local 1801 or admissions@benilde.edu.ph. You may also visit our website at www.benilde.edu.ph.

Other stories you might like