Professional Documents
Culture Documents
Hernandez
Hosting Institution: De La Salle Lipa
Seminar Date and Venue: February 22, 2018 – CBEAM Building (CB403)
Seminar Title: ETHICAL HACKING SEMINAR
The Speaker
Engr. Bernadette Cañubas
-BS Computer Engineering Graduate Batch 2008 at De La Salle Lipa
-Malware Researcher at Trend Micro (November 2008 – July 2009)
-Detection Specialist at Threat Track Security Inc. (January 2010 - Present)
The Seminar
The seminar held at the CB-403 in De La Salle Lipa on the 22th day of February
2018 began around 08:30AM when the guest speaker arrived with a opening prayer
which was led by a host group member. The guest speaker was then presented by our
teacher-in-charge of the course Semtrip. She gave a handful of professional credentials
about the guest speaker and I was again surprised because the speaker, Engr. Bernadette
Cañubas, was also a graduate of BS Computer Engineering in De La Salle Lipa similar to
the last speaker we had two weeks ago. The guest speaker took the floor and further
introduced herself and presented in her introduction that the Cyber Security career is one
of the most highly demand jobs that companies are currently looking for, and with
the booming emergence of the internet and technology there are various path careers in
Cyber Security that we as graduating students could take. There are at least six career
paths in the job of Cyber Security, these are; Forensic Analyst, Security, Analyst,
Malware Analysts, Network Security Engineer, Vulnerability Researchers, and
Penetration Tester Crypt Analyst. Forensic Analysis can be described as about gathering
and retrieving information from computers and storage devices. As the said occasion
advanced, the speaker inquired as to whether ever we have encountered dealing with
malware in our gadgets and none of us could share possibly in light of the fact that we
thought she was alluding to an abnormal state contamination. Our SEMTRIP instructor
in-control shared one of her encounters which gave route for the speaker to examine
about the diverse kinds of Trojan infections. One sort of Trojan infection the speaker
characterized was the flooder which causes movement in correspondence channels
subsequently coming about into an impeded preparing. Another is the adware which is a
non-destructive kind of malware on the grounds that it simply indicate promotions and is
simply irritating. The speaker at that point went ahead to talk about how she identifies
infections in a PC, she demonstrated to us various strides in the wake of contaminating
the virtual workstation with a malware. The speaker said that through time and practice
we could get over the trouble that amateurs normally encounter. The workshop had a
short stop for noon and we had a pragmatic test directly after to check whether we
completely comprehend what was educated by the speaker. We ran the malware in the
virtual workstation and took after similar advances the speaker did yet for a clench hand
clock like me, it was entirely difficult to do fortunately some of my companions could do
it so I requested help. Toward the end I could comprehend it and expectation that I could
use it later on.
Figure 1. Discussion of Cyber Security