Week 3 | Week 4

Well this week, we had a lot of activity and all of us are excited and doing are best on what we will share to them. We have a debate and each group has with different topics. You need to prove or defend your side!


In this part of Activity, I really had fun in defending our side 😛 Bwahahaha. We’re government side, and good for us because we have cooperation. We study our topic before the debate, and we talk about what we will going to do if we are on the opposition side or in the Government side. But first of all, our topic is about “Should Piracy for educational purposes be illegal?” We had a lot of conversation about what we will going to do, what will be our strong point to defend our topic, what are the best way to point out the things about the topic. Well, before the debate, our group discussed that if we were in the opposition side the reason that we will point out are:

1. Education is anyone’s right and it is free.

2. Budget issues in the Philippines especially on Public Schools.

3. Not available in the Philippines.

We also had our reasons /points if we will going to be in  the Government side.

1. NO ONE is  above the law.

2. Hurts the companies and hurts the people actually paying for it!

3. Risk of Dangerous Computer Viruses.

Yes that’s our point. Luckily, our side during the debate was Government, and we study our side before the fight. Huh? Fight daw? lol


One of my favorite topic in the discussion of some other group’s debate was the “China Censorship be implemented in the Philippines ” and the “”Cybersex with consent should be legal “. In the Chine Sensor ship,   I think that we shouldn’t follow the censorship like China because our freedom will get restricted and we will not have the freedom to access information to the sites that we want to go. Look at China, they can fabricate stories and articles or even news in the outside world since they control what the people can and cannot access. We should not follow the censorship ban like China, it would just limit our freedom and many will revolt against it!

And in Cybersex….. Cybersex even with consent still holds potential danger. It can be an industry and its a fact that you cannot get any sexual transmitted diseases from cybersex but legalizing it because the users have consent still holds potential dangers that can harm the users. Blackmail is a possibility where the user is blackmailed because of showing the user’s body to another user. He or she could record the ongoing live cam or take shots of the user who is involved. Next one is that anyone can listen and even watch the transaction of cybersex between two people just by hacking and connecting to their connection. Its a threat since the users are unaware that somebody else is watching. And the last threat is that when cybersex with content is legalize, some may abuse the law to some degree.


That’s all for this week. We’re moving on to the next part! Wohoooo!! Leggo! Let’s do this. AJA.





Week 1 | Week 2

New lesson, new beginning! I noticed that in our 2 or 3 weeks of discussion, we had a lot of lessons tackled. It was good for us to learn a lot and discover new ideas and topic. I know that we will have a lot of weeks of our discussion and it will help us to know more about security etc. Wow!


                                             Honestly, for me this was also really a difficult subject. (Hmmm kinda) It was really hard for me to easily gets the lesson 😦 huhu I can say na “magulo ang utak ko” magulo when I was in the class. 😦 Why!? Ugh huhu ……. but when I was skimming our lessons at home…. I was like….. “AHHH. Ayun lang pala yun.” “Ganun pala.” Well, let’s now start!!! 🙂


                                            So first…. What is INFOSE? INFOSEC or Information Security is about the study of protecting data and information so that no intruders can access it, only the allowed people can access it. Infosec is similar to IT security but it is still different because Infosec is the general term of securing and protecting information while IT security is a focus on Information Technology security. Other than that we’ve also learned about the CIA or Confidentiality, Integrity, and Availability. Confidentiality is the protection from intruders, Integrity is proctecting the information from unwanted changes and modifications and Availability is the protection against denial of service. We also learned about the Defense in Depth. The middle part being the Data, which information and data lies, the Application, which can manipulate and change the data, the Host, the person who controls the application, the Network which protects the data from intruders from the net, Operational, which are certain rules to be observed, and finally Physical which is your basic checking of bags and CCTV for security. Each part is essential and has a roll to play in the protection of the data.


                                            Well, for me I need to study more and more and more!! UGH I NEED TO LEARN!!!

That’s all for my first blog!! Bye 🙂