Monday, March 29, 2010

Information Technology Organizations in the Philippines

There are quite a lot of Organizations who exist in the field of the IT. Philippines' ICT is on the rise and is very rapidly growing in terms of innovation and brilliance of ideas of Filipino Minds - These IT Organizations have definitely contributed a lot to the rise and stability of the Philippine Economy.


1.) Name: Information Technology Foundation of the Philippines (ITFP)
Address: 32nd Flr Philam Life Tower
8767 Paseo de Roxas Ave, Makati City E Mail: cynthia.mamon@sun.com.ph
Tel No: (632) 750-3742
Fax No: (632)
Website: www.itfp.org.ph
About: The Information Technology Foundation of the Philippines (ITFP) is a non-stock and non-profit organization. It is the federation of all the Philippine Computer IT organization.
Programs & Projects: 8-POINT PROGRAM-ITFP aims to achieve the following:

For the ITFP Organization itself
Be financially strong and stable
Professionally run and managed.
For the Member Associations
Improve members well-being and supports its interest
For the IT Industry
Focus on the local market but supports global competitiveness
Support the national thrust to become the e-services hub of Asia
Be strong lobby group
For the Public (Government and the civil society)
To promote social responsibility
To support and assist in e-governance
2007 Programs
Push for "Strengthen CICT to DICT
Procurement Law and its implementation (CICT and DBM)
- Forum
- Training (With ITAP-NCI)
Automation of the Electoral System
ICT Training and Certification (CICT, NCI, ITAP, TESDA, PAQTVET)
Good Governance of IT Organizations and Associations (Code of Ethics)

MOA re Promoting English Proficiency (PEP)

Fund Raising
Vision: "The voice and the medium of the ICT community in the country that supports the ICT programs of the government and private sector."
Mission: To contribute to the contribute to the economic, social and political development of the country

- by advocating the wise and widespread use of ICT;
- by representing the needs and interest of the ICT industry and community;
- by supporting the ICT-based programs of government and private sector; and
- by strengthening the country's global competitiveness through ICT
Objectives: To accelerate the development of the Philippine Information Technology industry and help the profession by conducting and supporting projects and activities that will lead to the attainment of its purposes.
To support and fund selected IT related activities of its member Associations.
To contribute towards the social and economic development to the country through the promotion of IT utilization in all sectors of the Philippine society.
To represent the IT industry in the government in the formulation and implementation of policies, laws, regulations and statues affecting the IT industry.
Date Founded:
Contact Person: Ellen Almazon
List of Officers
CYNTHIA R. MAMON, President
SUN MICRO SYSTEMS PHILIPPINES
(632) 885-7867, 885-0401
(632) 885-7866
cynthia.mamon@sun.com.ph

2.)University of the Philippines Information Technology Training Center
The University of the Philippines Information Technology Training Center (UP ITTC) is a program of the University of the Philippines together with the Japan International Cooperation Agency (JICA) solely devoted to training professionals in information technology. The UP ITTC also hosts the Philippine Youth Congress in Information Technology or Y4IT every September, the largest gathering of IT enthusiasts from all over the Philippines.
University of the Philippines
Information Technology
Training Center

Helping You Build a Solid IT Career
Address
Quirino Avenue cor. Velasquez Street
Vidal A. Tan Hall
UP Diliman
Quezon City, 1101
Philippines
Coordinates- 14°39′7.60″N 121°4′5.88″ECoordinates: 14°39′7.60″N 121°4′5.88″E Information
Opened -2004
Authority University of the Philippines System
Director Dr. Jaime D.L. Caro
Website http://ittc.up.edu.ph/

3.) International Organization for IT

The heart of AITP lies in its local chapters. Chapter activities provide unique opportunities for informal but direct contact with other IT professionals. For more information about AITP chapter locations, contact the AITP Membership Department, call 1-800-224-9371 or visit a chapter’s Web site.
AITP gives you online access to local chapters by state or city. Chapter e-mail addresses and Web site pages are provided where available.

4. Philippine Information Technology Journal

A refereed journal on all areas of information technology. Published by the Computing Society of the Philippines (CSP) and the Philippine Society of Information Technology Educators (PSITE).

Journal Contact

Mailing Address

Room 317, SEC Bldg. A
Ateneo de Manila University
Loyola Heights
Quezon City 1108
Philippines
Website: http://www.math.admu.edu.ph/pitj

Principal Contact

Rafael P. Saldana
Editor-in-Chief
Philippine Information Technology Journal
Phone: +63 2 7090907
Fax: +63 2 7090907
Email: raffysaldana@gmail.com

Focus and Scope

The Philippine Information Technology Journal (PITJ) is a refereed publication of the Computing Society of the Philippines (CSP) and the Philippine Society of Information Technology Educators (PSITE). It aims to publish high quality papers on all areas of information technology.

Open Access Policy

This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.

Editorial Team

Editor-in-Chief

Rafael P. Saldana, Ateneo de Manila University, Philippines

Associate Editors

Jaime DL Caro, University of the Philippines-Diliman
Caslon L Chua, De La Salle University-Manila, Philippines

Luzon Representative

Allan A Sioson, Ateneo de Naga University, Philippines

Visayas Representative

Gregg D Gabison, University of San Jose-Recoletos, Philippines

Mindanao Representative

Emmanuel M Lagare, MSU-Iligan Institute of Technology





Common Types of Attacks on Computer and Internet Security

Without security measures and controls in place, your data might be subjected to an attack. Some attacks are passive, meaning information is monitored; others are active, meaning the information is altered with intent to corrupt or destroy the data or the network itself.

Your networks and data are vulnerable to any of the following types of attacks if you do not have a security plan in place.

Eavesdropping

In general, the majority of network communications occur in an unsecured or "cleartext" format, which allows an attacker who has gained access to data paths in your network to "listen in" or interpret (read) the traffic. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network.

Data Modification

After an attacker has read your data, the next logical step is to alter it. An attacker can modify the data in the packet without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit. For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be modified.

Identity Spoofing (IP Address Spoofing)

Most networks and operating systems use the IP address of a computer to identify a valid entity. In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An attacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet.

After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your data. The attacker can also conduct other types of attacks, as described in the following sections.

Password-Based Attacks

A common denominator of most operating system and network security plans is password-based access control. This means your access rights to a computer and network resources are determined by who you are, that is, your user name and your password.

Older applications do not always protect identity information as it is passed through the network for validation. This might allow an eavesdropper to gain access to the network by posing as a valid user.

When an attacker finds a valid user account, the attacker has the same rights as the real user. Therefore, if the user has administrator-level rights, the attacker also can create accounts for subsequent access at a later time.

After gaining access to your network with a valid account, an attacker can do any of the following:

  • Obtain lists of valid user and computer names and network information.

  • Modify server and network configurations, including access controls and routing tables.

  • Modify, reroute, or delete your data.

    Denial-of-Service Attack

    Unlike a password-based attack, the denial-of-service attack prevents normal use of your computer or network by valid users.

    After gaining access to your network, the attacker can do any of the following:

  • Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion.

  • Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services.

  • Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

  • Block traffic, which results in a loss of access to network resources by authorized users.


Man-in-the-Middle Attack

As the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently. For example, the attacker can re-route a data exchange. When computers are communicating at low levels of the network layer, the computers might not be able to determine with whom they are exchanging data.

Man-in-the-middle attacks are like someone assuming your identity in order to read your message. The person on the other end might believe it is you because the attacker might be actively replying as you to keep the exchange going and gain more information. This attack is capable of the same damage as an application-layer attack, described later in this section.

Sniffer Attack

A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated (tunneled) packets can be broken open and read unless they are encrypted and the attacker does not have access to the key.

Using a sniffer, an attacker can do any of the following:

  • Analyze your network and gain information to eventually cause your network to crash or to become corrupted.

  • Read your communications.


Application-Layer Attack

An application-layer attack targets application servers by deliberately causing a fault in a server's operating system or applications. This results in the attacker gaining the ability to bypass normal access controls. The attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following:

  • Read, add, delete, or modify your data or operating system.

  • Introduce a virus program that uses your computers and software applications to copy viruses throughout your network.

  • Introduce a sniffer program to analyze your network and gain information that can eventually be used to crash or to corrupt your systems and network.

  • Abnormally terminate your data applications or operating systems.

  • Disable other security controls to enable future attacks.


Source: http://technet.microsoft.com/en-us/library/cc959354.aspx

The bottom line in this issue is that, you would not let others bypass or put your security into vulnerability or else intruders would "fiesta" on your data and information which are supposedly be kept private and confidential. Intrusion is UNETHICAL, yet oftentimes, it is us who allowed them to gain access to our systems because of NEGLECT and IRRESPONSIBILITY.

♥♥♥damsuy♥♥♥

TYPES of Viruses

Here is an array of the VIRUS FAMILY (not the coccus/cocci treatable with medicine from Rose Pharmacy). I am referring to the Viruses whose attacks are treatable with Kaspersky and the like :-)

Meet and Greet :-)
Don't tell them that my source is: http://www.buzzle.com/articles/different-types-of-computer-viruses.html

Types of Viruses

Different Types of Computer Viruses

There are Different Types of Computer Viruses could be classified in (origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack) etc.

  • Computer Virus is a kind of malicious software written intentionally to enter a computer without the user's permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely affect program and performance of the system.

Most common types of viruses are mentioned below:

Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.


Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses
Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

You can protect yourself against viruses with a few simple steps:

  • If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like UNIX. You never hear about viruses on these operating systems because the security features keep viruses (and unwanted human visitors) away from your hard disk.
  • If you are using an unsecured operating system, then buying virus protection seoftware is a nice safeguard.
  • If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses.
  • You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should NEVER run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.
  • You should never double-click on an e-mail attachment that contains an executable. Attachments that come in as Word files (.DOC), spreadsheets (.XLS), images (.GIF), etc., are data files and they can do no damage (noting the macro virus problem in Word and Excel documents mentioned above). However, some viruses can now come in through .JPG graphic file attachments. A file with an extension like EXE, COM or VBS is an executable, and an executable can do any sort of damage it wants. Once you run it, you have given it permission to do anything on your machine. The only defense is never to run executables that arrive via e-mail.
Macro Virus Protection in Microsoft Word
Open the Options dialog from the Tools menu in
Microsoft Word and make sure that Macro Virus Protection is enabled. Newer versions of Word allow you to customize
the level of macro protection you use.

Saturday, March 20, 2010

Would and Could I consider myself a "PROFESSIONAL" after I Graduate?

Before going directly to the question if I could or would consider my self as a professional when I graduate, let me define what is a "PROFESSION" and "PROFESSIONAL".

A Definition of PROFESSION from Microsoft Encarta:
  • occupation requiring extensive education: an occupation that requires extensive education or specialized training
As the meaning suggests, one could be considered professional only if he underwent extensive or thorough education or a specialized training. Very self-explanatory.

Definitions of PREFESSIONAL from Microsoft Encarta:

1. of profession: relating to or belonging to a profession
professional people

2. following occupation as paid job: engaged in an occupation as a paid job rather than as a hobby
professional tennis player

3. businesslike: conforming to the standards of skill, competence, or character normally expected of a properly qualified and experienced person in a work environment
professional attitude

4. very competent: showing a high degree of skill or competence
did a very professional job

From the definitions above, being a professional connotes a well-mannered individual with conduct and good attitude toward his duties/responsibilities as he might be paid for what he is doing (2nd definition); belonging to a group of people who are also "professional" (1st definition); proper mannered, competent and experienced (3rd definition); and exemplary in whatever he does because of a high level of skills [talent, too] ensuring a job to be very well done.

And now, for the most coveted question: C/Would I consider myself a professional when I graduate?

The answer obviously lies on my own decision. The choice is on me if I would choose to utilize my years of education and training on the bright side to make a better community in the light of Information Technology.

I might also use my knowledge to improve and put my self on the top in the expense of others' rights, privileges or life...Technology is very powerful. It can bring life but it can also bring destruction.

And, as an IT practitioner very soon, I'd rather choose to be PROFESSIONAL than to be the other way around. I could still be considered a professional no matter what my future choices and actions are - no matter if I could hurt or jeopardize others' lives and make myself on top; but I'd rather choose to be the hardworking and admired for exemplary achievements and contributions that could benefit the community surrounding me.

Doing that, I am definite that I am a professional.