Lesson 7: Why HR Policies complement Information Security

The perception of most employees to both the HR and Cybersecurity Department is that they exist so they can look for a mistake and punish you. Some say that HR is the principal's office, while the Cybersecurity team is the surveillance arm.  Although most of the time during investigations, the cybersecurity team becomes the expert … Continue reading Lesson 7: Why HR Policies complement Information Security

Lesson 6: Organizational Security

Coming from a technical team, organizational security might be seen as a domain that only focuses on paper-based policies (sometimes, just copy-paste templated policies), budgets and risk assessment results. There's also a gap between highly technical security members who have been doing hands-on security and those management guys who may have their MBAs but whose … Continue reading Lesson 6: Organizational Security

Proud of my students’ achievements @ UA&P event

Last February 24, 2017, me and my undergraduate students went to the University of Asia and the Pacific (UA&P) in Pasig City to present their project Hydra in a school-initiated research conference. The event was not very big but various students from undergrad to PhD were prepared to present their papers. I was really pushy … Continue reading Proud of my students’ achievements @ UA&P event

COMSEC2 Vulnerability POC and Analysis

For COMSEC2, the project of the students is to simulate and existing vulnerability (it can be application, network etc.) and create an analysis based from research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the … Continue reading COMSEC2 Vulnerability POC and Analysis

Machine Project in Infosec

Objectives ■To be able to configure, implement an open-source security tool. ■To simulate a real-world attack scenario where the security tool can be used. ■To show how to configure necessary functionalities of the security tool. Tasks ■Each group will be assigned a specific security tool. Each group will research about the topic and download an … Continue reading Machine Project in Infosec

Research Paper on Emerging Technologies

Introduction A Case Study will be held as an academic symposium during the midterms week to discuss various emerging technologies in the field of information security. Each group will be tasked to research on a specified topic, explore and answer key issues about the subject. As its culminating activity, an academic paper with a required … Continue reading Research Paper on Emerging Technologies

Process Scheduling Course Notes in Operating Systems 1 (OPESYS1)

Process Scheduling Course Notes in Operating Systems 1 (OPESYS1) Justin David Pineda Faculty, Asia Pacific College November 2015 Introduction On the first half of the term, we discussed the conceptual terms and functions of the operating system such as process states, threads, synchronization to name a few. The second half of the term is dedicated … Continue reading Process Scheduling Course Notes in Operating Systems 1 (OPESYS1)