Edukasyon Online Your Online Education Portal

  • Skip to content
  • Jump to main navigation and login
  • Jump to additional information

Nav view search

Navigation

  • Home
  • Legal Forms
  • Blog
  • Downloads
  • DepEd
    • Memorandum
    • DepEd Orders
    • Advisory
  • Algebra
  • Community forum
  • Online Classes
  • Products listing
  • CATEGORY
  • African Stories
  • Block Games
  • My Cart
  • Great Books
  • Story Books
  • SLIDESHARE DOWNLOADER
  • YOUTUBE

Search

You are here: Home

Share This

Follow Us

Ads

Search Edukasyon

STEP-BY-STEP PROCEDURE ON HOW TO CREATE YOUR 8 SLIDES POWERPOINT PRESENTATION

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

STEP-BY-STEP PROCEDURE ON HOW TO CREATE YOUR 8 SLIDES POWERPOINT PRESENTATION

SLIDE N0. 1:  (Open the PowerPoint window)

  1. In the Ribbon above, click New Slide 7 times to make at least 8 Blank Slides
  2. Now you have at least 8 Slides, click Slide No. 1 to begin working with the slides
  3. In the Click to add title of the slide window, type: “CREATING MY FIRST POWERPOINT PRESENTATION”. That will be the title of our presentation.
  4. In the Click to add subtitle, type: by: and “YOUR NAME”
  5. Now let us apply Animation to our Slide Title. On the Ribbon above, click the Animation Tab.
  6. Then click Custom Animation Tab.
  7. Click anywhere in the title so that the rectangular textbox appears and click Add Effect.
  8. Under Add Effect, Place the Mouse Pointer to Entrance and select Crawl In.
  9. Now change the Speed of our animation to Slow. Click dropdown arrow and select Slow.
  10. Let us apply Animation also to our Subtitle, click anywhere in the subtitle below so that the rectangular textbox appears then click Add Effects.
  11. Under Add Effect, Place the Mouse Pointer to Entrance and select Bounce.
  12. Change the Speed of our animation to Medium. Click dropdown arrow and select
  13. Now, Click the Play button below to watch the result.

 

SLIDE NO. 2:

  1. Let’s move on to the second slide. Click Slide No. 2.
  2. In the Click to add title above, type: WHAT IS MICROSOFT POWERPOINT.
  3. Click anywhere in this box ‘Click to add text’.
  4. Then, copy the following text given in the Click to add text box.
  5. Now let us apply Animation to the text that we have typed. In the Ribbon, click Custom Animation. The Add Effect Button should appear on the left of your screen.
  6. Now, highlight all the text that you have typed.
  7. Click Add Effect and under Add Effect, Place the Mouse Pointer to Entrance and select Color Typewriter.
  8. Now, Click the Play button below to watch the result.

  

 

SLIDE NO. 3:

  1. Now let’s move on to the 3rd Click Slide No. 3.
  2. In the Click to add title, type: EXERCISE NO. 1
  3. In the Click to add text, we are going to insert Objects or Documents.
  4. In the Ribbon above, click the Insert Tab, then, click Object in the far right of the ribbon.
  5. An Insert Object Window appears, click Create from file Button.
  6. Then click: Browse.
  7. Find your Filename, click to highlight and click
  8. Click Exercise -1 to highlight then Click
  9. The Insert Object window appear, click OK to insert the selected Object.
  10. Now let us apply Animation to our slide. Click anywhere in the inserted object so that the rectangular textbox appears and click Add Effect.
  11. Under Add Effect, Place the Mouse Pointer to Entrance and select Bounce.
  12. Replace Speed to Medium, click dropdown arrow and select
  13. Now, Click the Play button below to watch the result.

 

 

SLIDE NO. 4:

  1. Now let’s move on to the 4th slide. Click Slide No. 4
  2. In the Ribbon, click the Home Tab then click
  3. A selection of Slide Layout appears then, select Title Only.
  4. In the Click to add title above, type: EXERCISE NO. 2
  5. In the Click to add text, we are going to insert Objects or Documents.
  6. In the Ribbon, click the Insert Tab then, click the
  7. An Insert Object Window appears, click Create form file
  8. Then click:
  9. Find your Filename, click to highlight and click
  10. Click Exercise -2 to highlight then Click OK
  11. The Insert Object window appear, click OK to insert the selected Object.
  12. Try to resize and align the Object to get a better view.
  13. Now let us apply Animation to the inserted object. Click anywhere in the inserted object so that the rectangular textbox appears and click Add Effect.
  14. Under Add Effect, Place the Mouse Pointer to Entrance and select
  15. Replace Speed from Medium, click dropdown arrow and select
  16. Now, Click the Play button below to watch the result.

 

  

 

 

 

SLIDE NO. 5:

  1. Now let’s move on to the 4th slide. Click Slide No. 5
  2. In the Ribbon, click the Home Tab, and then,
  3. A selection of Slide Layout appears: select, Two Content.
  4. In the Click to add title, type: THE INTERNET
  5. Click anywhere in the first column then copy the text given in the Click to add text

  

  1. In the second column, we are going to insert Clip Art.
  2. A selection of Content Icons appears at the center of the second column.
  3. Click anywhere in this second column. Now in the selection of Content Icons below, click Clip Art.
  4. A Search Bar for clip arts appears on the far left of the screen. Type: computers then, click
  5. A selections of Computer Clip Arts appears, scroll the bar to select the best computer clip art for our presentation.
  6. Select or Click Communications Computer.
  7. The selected Clip Art appears at the center of the second column.
  8. Click the picture then resize and align the picture.
  9. Now let us apply animation to the inserted object, highlight all the text in the first column then click Add Effect.
  10. Under Add Effect, Place the Mouse Pointer to Entrance and select Color Typewriter.
  11. Let us apply animation also to the inserted Media Clip or Picture, click anywhere in the picture so that the circular resizing points appears then click Add Effect.
  12. Under Add Effect, Place the Mouse Pointer to Entrance and select
  13. Replace Speed from Very Fast to Medium, click dropdown arrow and select
  14. Now, Click the Play button below to watch the result.

SLIDE NO. 6

  1. Now let’s move on to the 6th slide. Click Slide No. 6
  2. In the ribbon above, click
  3. A selection of Slide Layout appears then, select Title Only.
  4. In this Slide (No. 6), we are going to insert Picture from your file. In the Click to add title, type: SAMPLE PICTURE.
  5. In the ribbon above, click Then click: Picture.
  6. My Picture folder appears, select any picture available from the picture file then click: Insert tab below.
  7. The picture is inserted in your slide. Now using your Mouse, make necessary adjustment by resizing the inserted picture.
  8. Identify the picture by placing a Text Box anywhere in the picture.
  9. In the textbox type the name of the picture or where the picture was taken
  10. Move the textbox anywhere inside the picture where you want the text to be placed.
  11. Now let us apply Animation to the Sample Picture.
  12. Click anywhere in the inserted picture so that the Resizing Points appears and click Add Effect.
  13. Under Add Effect, Place the Mouse Pointer to Entrance and select
  14. Change the Speed of our animation from Very Fast to Medium. Click dropdown arrow and select
  15. Click the Play button below to watch the result.

 

  

 

 

 

 

 

SLIDE NO. 7:

  1. Now let’s move on to the 7th slide. Click Slide No. 7
  2. In the ribbon above click,
  3. A selection of Slide Layout appears then, select Title Only.
  4. In the Click to add title of the slide window, type:
  5. Below the title, we are going to insert another clip art to animate.
  6. In the Search Bar of the far left task pane search for Clip Arts, Type: airplane then, click Go.
  7. A selection of Airplanes appears below the Search Bar, select one.
  8. The clip art appears at the center, Re-size the clip art.
  9. Now in the Custom Animation, Click Add Effect.
  10. A selection of Effects appears below, place the Mouse pointer to Motion Paths to highlight, then Under Motion Paths, place the Mouse Pointer to Draw Custom Paths and click Scribble.
  11. The mouse pointer was replaced with a Now drag the pencil to draw a path for the plane.
  12. Change the Speed to
  13. Click Play button below to watch the movement.

 

  

 

 

 

 

 

 

 

 

 

 

SLIDE NO. 8:

  1. Now click our final Slide (No. 8), we are going to insert Organization Chart – Design your own Organization Chart
  2. In the Click to add title, type: ORGANIZATIONAL CHART
  3. In the ribbon, click Smart Art.
  4. select: Hierarchy
  5. Under Hierarchy, Select Organization Chart. Then, click
  6. Create your own Organizational Chart or insert previously created Organizational Chart from your file.

 

  1. After completing the Organizational Chart, we are now going to apply a Slide Design for all the slides.
  2. Click Slide No. 1, then in the ribbon click Design
  3. Different Design Templates now appear in the Ribbon.
  4. Click the arrow down in the right corner to show all Themes and select one among the choices.
  5. Now you have 8 Slides with different designs
  6. Next, we are now going to apply Slide Transitions in our slides. Click Slide No. 1 and in the Menu Bar, click
  7. A selection of Slide Transitions appears in the Ribbon. Click Arrow Down in the corner of the Slide Transition Tabs to reveal all the selections and select any of your choice.
  8. Then click Apply to All Tab.
  9. Now, after applying your selected Design Templates and Slide Transition, click the Slide Show Icon below to watch your presentation.
  10. Finally, we are now going to save your presentation, In the Ribbon above, click the Office Button. Place mouse pointer to Select Save as…Click PowerPoint Presentation look for your Filename to Open, replace title with “My first PowerPoint Presentation” and click

End …….

Philippines Data Privacy Act of 2012: What I need to know

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Filipinos spend an average of 10 hours and 2 minutes each day online, the highest in the world, according to recent data. The Philippines also tops social media use for the fourth straight year. Vast amounts of personal information from the Philippines, including photos of daily activities, are freely circulating the Web. 

What has the country done to ensure privacy and data protection?

In 2012 the Philippines passed the Data Privacy Act 2012, comprehensive and strict privacy legislation “to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.” (Republic Act. No. 10173, Ch. 1, Sec. 2). This comprehensive privacy law also established a National Privacy Commission that enforces and oversees it and is endowed with rulemaking power. On September 9, 2016, the final implementing rules and regulations came into force, adding specificity to the Privacy Act.

Scope and Application

The DPA and its Implementing Rules and Regulations (IRR) apply to all acts done or practices engaged in and outside of the Philippines if:

  • If the person, either an individual or an institution, involved in the processing of personal data is located in the Philippines;
  • The act or practice involves personal data of a Philippine citizen or Philippine resident;
  • The processing of personal data is done in the Philippines; or
  • The act, practice or processing of personal data is done by an entity with links to the Philippines, subject to international law and comity.

“Personal data” refers to all types of personal information.

“Processing” is any operation/s performed upon personal data. These operations include, but are not limited to the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure, or destruction of data.

The Data Privacy Act is broadly applicable to individuals and legal entities that process personal information, with some exceptions. The law has extraterritorial application, applying not only to businesses with offices in the Philippines, but when equipment based in the Philippines is used for processing. The act further applies to the processing of the personal information of Philippines citizens regardless of where they reside.

One exception in the act provides that the law does not apply to the processing of personal information in the Philippines that was lawfully collected from residents of foreign jurisdictions — an exception helpful for Philippines companies that offer cloud services.

 

How to comply with the Data Privacy Act?

Approach

The Philippines law takes the approach that “The processing of personal data shall be allowed subject to adherence to the principles of transparency, legitimate purpose, and proportionality.”

Collection, processing, and consent

The act states that the collection of personal data “must be a declared, specified, and legitimate purpose” and further provides that consent is required prior to the collection of all personal data. It requires that when obtaining consent, the data subject be informed about the extent and purpose of processing, and it specifically mentions the “automated processing of his or her personal data for profiling, or processing for direct marketing, and data sharing.” Consent is further required for sharing information with affiliates or even mother companies.

Consent must be “freely given, specific, informed,” and the definition further requires that consent to collection and processing be evidenced by recorded means. However, processing does not always require consent.

Consent is not required for processing where the data subject is party to a contractual agreement, for purposes of fulfilling that contract. The exceptions of compliance with a legal obligation upon the data controller, protection of the vital interests of the data subject, and response to a national emergency are also available.

An exception to consent is allowed where processing is necessary to pursue the legitimate interests of the data controller, except where overridden by the fundamental rights and freedoms of the data subject.

Required agreements

The law requires that when sharing data, the sharing be covered by an agreement that provides adequate safeguards for the rights of data subjects, and that these agreements are subject to review by the National Privacy Commission.

Sensitive Personal and Privileged Information

The law defines sensitive personal information as being:

  • About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical or political affiliations;
  • About an individual’s health, education, genetic or sexual life of a person, or to any proceeding or any offense committed or alleged to have committed;
  • Issued by government agencies “peculiar” (unique) to an individual, such as social security number;
  • Marked as classified by executive order or act of Congress.

All processing of sensitive and personal information is prohibited except in certain circumstances. The exceptions are:

  • Consent of the data subject;
  • Pursuant to law that does not require consent;
  • Necessity to protect life and health of a person;
  • Necessity for medical treatment;
  • Necessity to protect the lawful rights of data subjects in court proceedings, legal proceedings, or regulation.

Surveillance

Interestingly, the Philippines law states that the country’s Human Security Act of 2007 (a major anti-terrorism law that enables surveillance) must comply with the Privacy Act.

Privacy program required

The law requires that any entity involved in data processing and subject to the act must develop, implement and review procedures for the collection of personal data, obtaining consent, limiting processing to defined purposes, access management, providing recourse to data subjects, and appropriate data retention policies. These requirements necessitate the creation of a privacy program. Requirements for technical security safeguards in the act also mandate that an entity have a security program.

Data subjects' rights

The law enumerates rights that are familiar to privacy professionals as related to the principles of notice, choice, access, accuracy and integrity of data.

The Philippines law appears to contain a “right to be forgotten” in the form of a right to erasure or blocking, where the data subject may order the removal of his or her personal data from the filing system of the data controller. Exercising this right requires “substantial proof,” the burden of producing which is placed on the data subject. This right is expressly limited by the fact that continued publication may be justified by constitutional rights to freedom of speech, expression and other rights.

Notably, the law provides a private right of action for damages for inaccurate, incomplete, outdated, false, unlawfully obtained or unauthorized use of personal data.

A right to data portability is also provided.

Mandatory personal information breach notification

The law defines “security incident” and “personal data breach” ensuring that the two are not confused. A “security incident” is an event or occurrence that affects or tends to affect data protection, or may compromise availability, integrity or confidentiality. This definition includes incidents that would result in a personal breach, if not for safeguards that have been put in place.

A “personal data breach,” on the other hand, is a subset of a security breach that actually leads to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.

Requirement to notify 

The law further provides that not all “personal data breaches” require notification., which provides several bases for not notifying data subjects or the data protection authority. Section 38 of the IRRs provides the requirements of breach notification:

  • The breached information must be sensitive personal information, or information that could be used for identity fraud, and
  • There is a reasonable belief that unauthorized acquisition has occurred, and
  • The risk to the data subject is real, and
  • The potential harm is serious.

The law provides that the Commission may determine that notification to data subjects is unwarranted after taking into account the entity’s compliance with the Privacy Act, and whether the acquisition was in good faith.

Notification timeline and recipients

The law places a concurrent obligation to notify the National Privacy Commission as well as affected data subjects within 72 hours of knowledge of, or reasonable belief by the data controller of, a personal data breach that requires notification.

It is unclear at present whether the commission would allow a delay in notification of data subjects to allow the commission to determine whether a notification is unwarranted. By the law, this would appear to be a gamble.

Notification contents

The contents of the notification must at least:

  • Describe the nature of the breach; 
  • The personal data possibly involved;
  • The measures taken by the entity to address the breach;
  • The measures take to reduce the harm or negative consequence of the breach;
  • The representatives of the personal information controller, including their contact details;
  • Any assistance to be provided to the affected data subjects.

Penalties

The law provides separate penalties for various violations, most of which also include imprisonment. Separate counts exist for unauthorized processing, processing for unauthorized purposes, negligent access, improper disposal, unauthorized access or intentional breach, concealment of breach involving sensitive personal information, unauthorized disclosure, and malicious disclosure.

Any combination or series of acts may cause the entity to be subject to imprisonment ranging from three to six years as well as a fine of approximately $20,000 to $100,000.

Notably, there is also the previously mentioned private right of action for damages, which would apply.

Penalties for failure to notify

Persons having knowledge of a security breach involving sensitive personal information and of the obligation to notify the commission of same, and who fail to do so, may be subject to penalty for concealment, including imprisonment for 1 1/2 to five years of imprisonment, and a fine of approximately $10,000 - $20,000.

Depending upon the circumstances additional violations might apply.

 

Who implements the Data Privacy Act?

The National Privacy Commission (NPC) is in charge of administering and implementing the DPA. It is also tasked to monitor and ensure compliance of the Philippines with international standards for personal data protection. The major functions of the NPC are as follows:

  1. Rule making.
  2. Advisory. The NPC is the advisory body on matters related to personal data protection.
  3. Public education. – The NPC shall launch initiatives to educate the public about data privacy, data protection and fair information rights and responsibilities.
  4. Compliance and monitoring. – The body has compliance and monitoring functions to ensure personal information controllers comply with the law. It is also tasked to manage the registration of personal data processing systems.
  5. Complaints and investigations.
  6. Enforcement.

“Personal information controller” is an individual or institution, or any other body who controls the processing of personal data, or instructs another to process personal data on its behalf.

 

Cybersecurity Incident Response

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Here's why cybersecurity incident response is something your entire organization has to care about: Hackers are likely trying to invade your network, and security vulnerabilities likely make this easier than you would believe.

Indeed, we have evolved from a time when executive leaders were mostly disconnected from the information security function to an era where cybersecurity is top of mind for many such former naysayers. And for good reason: There's likely not a day that goes by that your organization isn't under attack or otherwise exposed to IT-related security risks.

 

Security threats and vulnerabilities, and the subsequent incidents and breaches that they can lead to, affect organizations of all kinds. Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it?

This is where incident response (IR) comes into play.

What is incident response?

Incident response is the process of detecting security events that affect network resources and information assets and then taking the appropriate steps to evaluate and clean up what has happened. Cybersecurity incident response is critical to today's businesses because, simply put, there is so much to lose. From the simplest of malware infections to unencrypted laptops that are lost or stolen to compromised login credentials and database exposures, both the short- and long-term ramifications of these incidents can have a lasting impact on the business.

Why do you need it?

Security breaches can require notification, resulting in customer distrust, reputation loss, regulatory fines, legal fees and cleanup costs. And these can all come at once -- in ways that even the most financially secure of businesses can have trouble absorbing.


Number of sensitive consumer records exposed

Consumer data exposure is escalating; records containing personally identifiable information reached nearly 450 million in 2018.

 

Networks, software and end users can only reach a certain level of resilience. Oversights will occur, and mistakes will happen. What matters is what you have done, in advance, to minimize the impact of a security incident on your organization. You can't prevent hackers from existing, but you can be proactive in prevention and response. That's why having a functional team, the proper technologies and a well-written incident response plan are essential for being able to respond to such events in a prompt and professional manner.

An important aspect of understanding incident response is fleshing out the necessary elements in your security program to differentiate between threats and vulnerabilities:

  • Threat: An indication or stimulus, such as a criminal hacker or dishonest employee, that's looking to exploit a vulnerability for ill-gotten gains.
  • Vulnerability: A weakness in a computer system, a business process or people that can be exploited.

Threats exploit vulnerabilities, which, in turn, create business risk. The potential consequences include unauthorized access to sensitive information assets, identity theft, systems taken offline, and legal and compliance violations.

Related terms include the following:

  • Breach: An incident where sensitive information, such as intellectual property or customer records, is exposed.
  • Hack (sometimes referred to as an attack): The act of a criminal hacker (or hackers) or a rogue user doing something such as taking your systems offline, planting or spreading malware, or stealing information assets.
  • Incident: An attack that's successful in draining computing resources, obtaining unauthorized access, or otherwise putting information assets and related network resources at risk.
  • Network (or security) event: A term that lawyers often to use to refer to potential security issues that haven't yet been confirmed or the details of which aren't ready to be released to outside parties or the public.

Attacks don't always lead to incidents, and incidents don't always lead to breaches. They're all considered network events and are often played down until the details can be obtained. It all depends on what took place and what can be determined after the fact.


How to take a proactive approach to incident response.

A proactive approach to incident response requires a cross-functional team, an updated plan, a solid framework, appropriate technology and a solution-oriented mindset.

 

The purpose of this guide is to give IT and enterprise security teams actionable strategies to meet today's security threats and vulnerabilities more effectively. This is regardless of whether you have an existing IR program or you're just getting started. It can also serve to help get business executives on board with this critical function of a well-run information security program and highlight ways users may need more security training. You can use this information to improve your incident response capabilities, share it with executive management to further their understanding and get buy-in on your security initiatives, and even use it as a basis for your policies and ongoing user security awareness and training efforts.

Building an IR team

A good incident response program starts with building a great team. Without the right people, security policies, processes and tools mean very little. An IR team is made up of a cross-functional group of people from diverse parts of the business, including IT and security, operations, legal and public relations. One or more of these roles could -- and should -- be at the executive management level. The reason for this is to ensure the highest level of decision-making and that the business's best interests are kept in mind.

What does an IR team do?

The overall goal of an incident response team should be to detect and respond to security incidents in order to minimize their impact on the business. Such teams are often referred to as a computer security incident response team (CSIRT) or a computer emergency response (or readiness) team (CERT). A larger group of IR professionals are often pulled together into a security operations center (SOC), whose scope is broader than incident response. The name of your IR team is largely irrelevant because its goals are the same.

Whatever the name, the IR team should be working to support its role in the overall incident response plan, which itself should complement the goals of your information security program and overall business. Team goals might include working on response times and impact minimization, conducting periodic meetings and performing tabletop exercises. In order for these goals to work, they need to be very specific, written in the present tense and include steps that must be accomplished along with deadlines to help with accountability. The following are examples of IR team goals that might be developed by the team itself or an overarching security committee:

  • We develop metrics for analyzing our IR program initiatives that involve monitoring and alerting, communication among team members, and technology evaluations.
  • We update our IR plan document periodically and consistently.
  • We create and execute three separate tabletop exercises for IR simulations.
  • We engage our security committee and executive management to report on incidents, actions taken and additional improvements needed for incident response.

The IR team -- or program manager -- would flesh out each of these goals with specific steps needed to meet each one, along with deadlines so that everyone on the team knows what's expected and what to aim for.


Steps for building an IR team
Building your IR team requires creating a core group, adding cross-functional members, deciding on external help and outlining responsibilities.
 

Another thing to keep in mind with your incident response team goals is to make sure that they are both reasonable and achievable and, most importantly, that they are being reviewed and followed. Otherwise, they can become an afterthought and evolve into a liability rather than an asset. It's even more complicated if, after an incident or confirmed breach, someone finds that documented procedures were nonexistent or not followed at all.

An essential part of cybersecurity incident response is understanding the various team member roles and responsibilities. After all, what good are goals if you don't have the right people on board, or you have people working on the team but their expectations are not clear? At a minimum, you should outline in your IR plan, or elsewhere, specific roles and responsibilities.

Incident response skills

The IR team should include the following:

  • Technical team: IT and security team members.
  • Executive sponsor: A senior executive charged with overseeing information security.
  • Incident response coordinator: The person responsible for ongoing management of the team and incidents.
  • Media relations coordinator: Your PR representative in charge of interfacing with the news media and related outlets once a breach occurs.
  • Forensic analyst: A forensics expert internal to the company or an outside adviser.
  • Outside consultant: A third-party information security or incident response expert.
  • Legal counsel: Your corporate attorney or outside law firm that would represent your organization as needed for incidents and breaches.

Incident response requires a number of skills. At the heart of an IR team is the core group of technical staff and incident responders who defend an organization against cyberthreats. These members are skilled at security and can execute on tasks such as monitoring the network for vulnerabilities and breaches and taking the appropriate measures where necessary.

As for incident responders, these team members use data to spot and assess the scope or urgency of incidents and perform other ongoing IR duties. They may also report on trends, educate the organization's users and liaise with law enforcement. There are specific questions that can help organizations better hire these team members.

But technical skills are not all that's required for successful incident response. As noted above, a solid IR team will need cross-functional members who can execute on nontechnical tasks, such as talking with the media and responding to legal issues. The actual titles for each of these roles can vary from organization to organization depending on your existing staff structure, staff expertise and your specific business needs. The important thing is that you have the right people on board.

In terms of team building, rather than pulling people into your IR team who may not want to be there, seek out those in the organization who are interested in the topic and are eager to add value to this critical aspect of security. Each IT and security team member has his or her own interests, and incident response may not be one of them. Moreover, it's critical to have both technical and nontechnical people on your IR team. The technical people will know the network environment and can help dig into the details in system logs, network packet captures, vulnerability scanner reports and the like. Nontechnical people can help lead the oversight and team communications required to keep everyone in the know, ask the not-so-obvious questions, and help in the decision-making process so that business interests are properly represented. You might consider linking to an overall business communication plan that may exist.

IR methodology

An incident response plan is a go-to document for when the going gets rough with security issues. It outlines the who, what, when, why and how of addressing security events, incidents, and, once confirmed, breaches. It's important because the last thing you need to be doing under duress is figuring out how to respond to these challenges. In fact, when you don't have a documented plan, you'll be reacting. And when you react, you lose your ability to reason. You're flying by the seat of your pants. You can't think clearly, and you're quite likely not going to make good decisions. By having a documented IR plan, you can respond with clarity and direction and avoid letting emotions drive your response efforts.

Creating an incident response plan

An incident response plan should be developed by the team or IR coordinator in advance and should contain the components detailed in the chart below.

Incident plan element Purpose and scope

Overview

Introduces the plan; details high-level goals, the scope of what's covered and assumptions that have been considered.

Outline of roles and responsibilities

Lists and discusses the duties and expectations of each of the team members.

Detailed list of incidents requiring action

Outlines the specific threats, exploits and situations that require formal incident response actions. The possibilities are endless, but could include denial-of-service attacks, malware infections, email phishing and lost or stolen laptops. Note: This is arguably the most important part of the incident response plan.

Detection, investigation and containment procedures

The beginning of the actual incident response procedures that you plan to use; this includes directives on tasks such as analyzing the situations, notifying team members, getting outside parties involved, securing the network, confirming the incident, gathering evidence and reporting on findings.

Eradication steps

Provides the general steps for cleaning up the incident and may include network traffic and system log analysis, forensics review and subsequent vulnerability testing to confirm resolution.

The recovery phase

Details tasks in the recovery phase, such as reinstalling or reimaging hosts, resetting passwords, and adjusting firewall rules and related network configurations.

Breach notification

Outlines the how and when to alert those impacted by a confirmed breach as required by contracts or law.

Follow-up tasks

Discusses additional reports, enhanced documentation and lessons learned that might come out of this phase.

Call list (in the appendix)

Provides contact information for incident response team members and involved outside vendors, such as internet service providers and cloud service providers.

Testing scenarios (appendix)

Outlines specific testing scenarios that have been or will be carried out.

Revision history (appendix)

Outlines details on plan updates and improvements, including who did it and when it was done.

Everyone's plan will look a little different depending on specific needs. However, the essentials covered by this template are standard and should be included in every organizations' plan. There are IR best practices and other resources available from organizations that you might consider integrating into your plan.

NIST, US-CERT, ISACA and ISO/IEC all provide frameworks that organizations can use as guidance. For example, the NIST "Computer Security Incident Handling Guide" includes an incident response framework in the form of an IR lifecycle -- preparation; detection and analysis; containment, eradication and recovery; and post-incident activity.

Additional frameworks are available from the SANS Institute, the Institute of Electrical and Electronics Engineers, the Internet Engineering Task Force and the European Union Agency for Network and Information Security.

An incident response plan should not be combined with documents on other organizational security plans and procedures, such as such as an overview of security policies or disaster recovery and business continuity plans. Instead, it works best as a stand-alone document that all your incident response team members know about and have easy access to -- both on the network and in hard-copy form. In addition to consulting frameworks from the organizations mentioned above, it can help to start with an IR plan template to guide you in the right direction.

Creating an incident response plan requires the expertise and input of all your incident response team members. A good way to go about establishing a plan -- or, even, fleshing out your existing one -- is to divvy up the various parts to the necessary team members. Once everyone has fleshed out their section, the incident response team can pull it all together into a single document and start working on editing and forming the final version. Keep in mind that your incident response plan is not unlike any given security policy; it's a work in progress. So, you want to make sure that it's reviewed periodically and adjusted appropriately as changes to your network, security and business come about.

To put a fine point on it: Your IR plan needs to be kept current, or it cannot keep your organization safe.

How, when and why to use IR tools

If information security is considered a strategic function of the business (and it often is), then incident response would be a tactical component of the security program. A military concept associated with the decisions and actions needed for effective incident response -- dubbed the OODA loop -- is a cycle where you observe, orient, decide and act. The essence of the OODA loop is to use situational awareness and information to see impactful events, such as security incidents, unfold so you can quickly respond and gain an advantage toward thwarting the threat. This enables you to minimize the impact of threats on your business.


How the OODA loop works

The OODA loop -- which consists of observing, orienting, deciding and acting -- is a military concept widely used as a model for incident response.

 

The OODA loop can be utilized as an overall approach to incident response and can also help define which security tools you use in the process. Whether from the functions of prevention, detection or response, there are numerous incident response tools that can be used in this regard. For example, the visibility provided by packet analysis, system resource examination and file integrity monitoring are technologies you can use to fulfill the observe component of the OODA loop. Technologies that use real-time threat indicators and threat intelligence can provide context on attacks and be used to fulfill the orient component of the OODA loop. The decide component could be fulfilled by tools that provide forensic details, including replays of what happened in order to shed light on context and technical information. This can help you make more informed decisions on what to do -- or what not to do -- during the incident response process. Finally, the act component of the OODA loop can be fulfilled by activities such as blocking, redirecting or quarantining threats in order to minimize their effects on your network and information assets.

While cybersecurity incident response is a process, technology can automate certain functions to help minimize the time involved and eliminate errors. IR-focused technology vendors provide tools for functions such as the following:

  • net flow and traffic analysis;
  • vulnerability management;
  • security incident and event management;
  • endpoint detection and response;
  • firewall, intrusion prevention and denial-of-service mitigation; and
  • forensic analysis.

Most technology products in this space are commercial, so you'll need the budget -- sometimes a big one -- for both capital and operating expenditures associated with these tools. As an alternative, there are open source software offerings for most of these areas. You'll have to decide whether open source can meet your specific business requirements and what level of effort will be involved in doing so. You must also consider whether the open source software will be around over the long haul after you've invested so much in establishing your incident response efforts.

You can't simply depend on IR tools to run your entire incident response program.

Of course, as with any new technical control you put in place, you'll need to make sure you have the staff and expertise. Having the necessary resources is critical not only in terms of initial design and implementation, but also with day-to-day administration, troubleshooting and so on.

One final point: Does it make sense to fully integrate the OODA loop with your incident response efforts? It depends. You might at least consider it as a guideline for your approach to incident response and customize your methodology according to your needs. Similarly, you can't simply depend on IR tools to run your entire incident response program. The reality is, the success of the IR function depends on many factors, such as business culture, security buy-in, network design, budget and people. As with your incident response plan document, your IR methodology and tools are going to be unique based on your specific business requirements. If you follow the core OODA steps and use incident response tools where appropriate, that will put you at an advantage -- ahead of the curve -- and that's where you need to be.

A role for SOAR

Security orchestration, automation and response (SOAR) is a stack of compatible software that enables cybersecurity professionals to collect data about security threats and automatically respond to them. SOAR performs the following three main functions:

  • connects and coordinates heterogeneous tool sets and defines incident analysis parameters and processes;
  • automatically triggers specific workflows, tasks and triages based on those parameters; and
  • accelerates general and targeted responses by enabling a single view for analysts to access, query and share threat intelligence.

SOAR and SIEM may seem to play similar roles in the SOC, but they serve different purposes. SIEMs take in log and event data from traditional infrastructure component sources, while SOAR platforms extend that capability, pulling information from a variety of sources, including endpoint security software and third-party sources. SOAR platforms are also more sophisticated in their ability to orchestrate and automate alert responses.

SOAR has an array of use cases, including the following:

  • threat intelligence coordination;
  • case management;
  • vulnerability management;
  • automated enrichment for remediation;
  • threat hunting; and
  • incident response.
SOAR elements 

Incident response problem-solving

Problem-solving is a key part of incident response. Even though the OODA loop is about decision-making, it's important to not get caught up in the process of it or any other IR methodology. It's easy to get sidetracked and lose sight of what's important, and that's prioritization. Looking at this from the perspective of incidents requiring actions discussed above, you must be able to prioritize what to focus your efforts on and know which ones you can ignore. You go about doing this by considering which security events are urgent, which are important and how you'll need to respond to the various scenarios. The best way to do this is to view security events, incidents and confirmed breaches in terms of the following:

  1. What's urgent but not important?
  2. What's important but not urgent?
  3. What's both urgent and important?

An example of an urgent but not important issue would be a malware infection on a branch office sales workstation that only connects to the office network or internet via guest Wi-Fi. An example of an important but not urgent issue is a new, recently imaged laptop that is lost but that doesn't yet contain any business-related information. Examples of an urgent and important situation is a distributed denial-of-service attack against an e-commerce website, a malware infection affecting production servers and phishing attempts against executives that have led to the compromise of network credentials. Urgent and important scenarios are those where something bad is happening to a critical business resource or asset and you know that something must be done quickly.

The average small business, midmarket corporation or large enterprise has countless vulnerabilities that have yet to be acknowledged.

You'll find that many security issues you're forced to address fall into the first two categories above. Although they may need to be addressed in some way, they'll likely only serve as a distraction. This is why you must be good at filtering out the noise and focusing on the things that really matter for your particular environment. The third category -- both urgent and important -- is where you'll find most of your incident response resources should be dedicated. What's important is that you take the bigger picture into account and address the security events that are most impactful towards your critical network resources and information assets.

In today's technology-centric world where decisions are often made for us, it's becoming more of a struggle to find IT and security staff who can truly solve problems, especially when under the pressure of a security event. As it relates to incident response in your security program as a whole, ensure that problem-solving involves the proper areas, which include defining the problem, determining all possible solutions, deciding on the best solution and then taking purposeful action.

Prevention is key

Prevention is critical to incident response. You create a great IR program so you are ready to mitigate cyberattacks and deal with security mishaps and exploits. However, your first line of defense is to keep your network safe and your users empowered and security-aware. The security incidents that can create the most damage are those that exploit the gullibility of your network users, malware, and misconfigured computer systems and software that can be exploited for further enumeration and penetration. The average small business, midmarket corporation or large enterprise has countless vulnerabilities that have yet to be acknowledged, much less addressed. Knowing what we know today and having such advanced tools at our disposal, there's simply no reason to offer low-hanging fruit to hackers. Weak passwords, missing patches and unsecured information can easily lead to an incident or confirmed breach. Unfortunately, that's typically how incidents and breaches occur, so it's up to the incident response team or the security committee to determine where the gaps and opportunities lie and then vow to not let them lead to the downfall of your business.

Rather than implementing more paperwork and technical controls policies, processes and technologies -- many of which can serve as mere bureaucracy or a false sense of security -- what's often needed most is discipline. The discipline to acknowledge security threats and vulnerabilities. The discipline to acknowledge weaknesses in your information security program, including incident response. The discipline to take reasonable steps to prevent most incident scenarios. And the discipline to have the proper visibility and control in place to minimize the impact of the exploits that do get through.

Incident response is not just an IT and security issue that's overseen and executed by technical professionals. Instead, it's a core business function that's arguably as important as anything on the legal, financial or operations side of the business. Business leaders must understand that information security is a critical underpinning of the enterprise that must be supported at the highest of levels. Unless and until critical aspects of security are mastered, including incident response, it's a matter of time before the going gets rough, the questioning begins and intrusive investigations ensue. It's unreasonable to expect a perfect security program. Still, it's better to get started on improving your incident response efforts now before you're forced to.

Amazing Love  96-100

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Chapter 96
Charlie said angrily at this time: “Fatty, do you think it’s okay not to speak? You have to know, this is Aurous Hill! Which of these people who were deceived by you is not rich? Hooking fingers can let you stay in Aurous Hill. There is no place for burial! I advise you to be acquainted and take the time, to tell the truth, otherwise, no one can save you!”

Warnia knew that Charlie was launching a psychological offensive, and immediately cooperated with him, saying with a black face: “Our Song family is a big family with a bit of face in Aurous Hill. If anyone dares to deceive the Song family, our Song family must have it. Give him a profound lesson, if we are soft and spread, the family’s face will be affected!”

The fat man was frightened suddenly!

 

He knows how high your Song family is. If he really angers Warnia, he will probably die in Aurous Hill!

So he was panicked, and hurriedly shouted at Qi Lao desperately: “Qi Lao, save me! This is not my own business!”

Old Qi’s face changed suddenly and he roared: “What are you talking nonsense? You lied to the Song family and framed me. I want your life!”

After all, Qi Lao took out a dagger from his pocket, a cold light flashed in his eyes and immediately pounced on the fat man.

The fat man’s eyes were cracked, and he cursed: “d*mn, you turn your face faster than a book! You obviously told me that Ms. Warnia relies on your mouth. As long as you say yes, this thing will be sold. You hurt me so much!”

 

Warnia gave them a cold look, and then said to Charlie: “Mr. Charlie just laughed, thanks to you today, let’s leave, these people, our family will send someone to clean up these people.”

Charlie nodded slightly and said, “Okay, then go back.”

After all, the two got up and prepared to leave.

Seeing that Warnia was about to leave, Qi Lao was shocked, and he didn’t care about killing the fat man. He knelt on the ground and said, “Miss, please forgive me. For the sake of my hard work and work in the Song family for so many years, forgive me. This time”

Before Warnia spoke, Tailai stood up and sneered: “You old thing is really looking for death. You want to be Master of the game, and you can get two or three billion. Do you think the Song family can spare you? “

Old Qi was pale and sat slumped on the ground.

Tailai continued: “Even if the Song family forgave you, I, Tailai, will never forgive you!”

Old Qi suddenly collapsed and cried, and the whole person has completely collapsed.

Seeing this, Warnia shook her head slightly, and said to Charlie: “I’m so sorry, Mr. Charlie, my family made a mistake, you read a joke.”

Charlie said calmly: “There are treacherous villains everywhere, Miss Song doesn’t have to say that.”

 

At this time, Tailai from Haicheng took Guo Ming and Qin Gang from the Aurous Hill Qin family, all came out.

Seeing Charlie, Tailai immediately stepped forward to Charlie and said, “Mr. Wade, thanks to you today, otherwise, Li will be fooled by this thief!”

Guo Ming next to him also said with some shame: “Mr. Wade is really a hero, and the Old Master just didn’t see through the articles they wrote on jade, ashamed!”

Qin Gang also arched his hand and said, “Mr. Charlie, thanks to you today, otherwise the three of us who robbed the head and robbed it was a fake. Let alone the heavy losses, I am afraid that people will laugh out loud!”

Charlie smiled slightly and said faintly: “You are welcome, I was originally invited by Miss Song to come here to verify the authenticity of things, so this is also my business.”

After everyone was done speaking, Charlie got into the car with Warnia.

At this time, there was silence in the courtyard behind him.

But Charlie could see that as soon as everyone left with their front feet, several people in black suits walked in quickly.

It seems that Qi Lao and the fat man are in a disaster!

Chapter 97
In the car, Warnia’s expression has always been cold.

For her, she was very annoyed by a s*umbag in the family, and what was even more annoying was that this Uncle Qi wanted to set a situation for him in front of so many outsiders.

 

If you were fooled in today’s affairs, given the money, and Uncle Qi also escaped, if you find yourself cheated in the future, you will lose your face and the entire Song family!

Fortunately, Charlie was present, lighting up the mystery in time and avoiding the loss of himself and his family.

So, she took out a bank card from the glove box in the car, handed it to Charlie, and said: “Mr. Charlie, there are one million in this card, and the code is six 8, which is a little bit of mine. Please accept it with your heart.”

As she spoke, she couldn’t help sighing, Charlie still seemed to be a little real to learn, she didn’t know why she chose to join a small family? If he comes out to engage in the antique appraisal by himself, he can save a lot of family business after a few years.

Charlie looked at the card in her hand and hesitated slightly.

One million is not a small amount, but it just drizzles to the Song family.

Charlie didn’t look down on this one million. After all, he still had more than 9.9 billion in his card, and this one million was just a drop in the bucket.

What’s the point of accepting it?

But when he thinks about it carefully, he’s not a trillionaire. The son-in-law of the Willson family.

For a son-in-law, if he is not interested in seeing one million, it will definitely make Warnia puzzled, so he directly took the card and said, “Thank you, Miss Song.”

 

Warnia smiled slightly: “Mr. Charlie is polite.”

After speaking, Warnia asked again: “Where is Mr. Charlie going next?”

Charlie smiled and said, “Send me to the vegetable market. I have to buy vegetables and go home to cook.”

Warnia was stunned, and couldn’t help saying: “I also heard about Mr. Charlie. To be honest, Mr. Charlie has such a skill. There is no need to let a son-in-law be attached to her. It is better to come to my Jiqingtang. As the chief appraiser, I will give you a basic salary of one million every year, what do you think?”

Charlie waved his hand and said with a smile: “I am a person, my teeth are not good, and I am used to eating leftovers.”

Warnia was startled slightly and then sighed.

It seems that the rumors in the market are really good, this Charlie is just a son-in-law who eats soft rice.

I used to think that he was just a Rubbish, and it was a helpless act for Rubbish to eat soft rice, which was understandable.

But now it seems that he is not a waste, but a waste of self-willing depravity.

This really made her unacceptable.

Immediately, her attitude towards Charlie also changed somewhat.

Charlie knew that she would look down on him a little bit, but this was the best way for him so that everyone could guess him wrong, and he would have the last laugh.

Passing by the vegetable market, Charlie got off and said goodbye to Warnia, and then bought some vegetables and went home.

But as soon as he walked in, Charlie heard the Old Master laughing wildly while shouting.

“Hahaha come! Come and see the baby I found!”

Claire also got off work and was sitting on the sofa reading documents. At this moment, she couldn’t help standing up and said to Jacob who was laughing, “Dad, you almost scared me to death.”

 

“Look at this.” Jacob didn’t notice Claire’s expression at all. He happily held a pair of palm-sized celadon cups and held them in a show-off manner: “This is the blue and white chicken bowl I found from the antique market. , I heard that it was picked up from the coffin of Emperor Gandi, and it was worth more than 500,000!”

“More than half a million?” Claire stood up suddenly and blurted out: “Dad, where did you get so much money?”

Chapter 98
Charlie was so helpless that he broke the Yuhuchun bottle in the morning. Taking advantage of his time to go out, did this Old Master go to Antique Street again?

This is the typical mindset. The scars forget the pain.

Jacob laughed and said mysteriously: “I mean this cup is worth half a million. Guess, how much did I buy?”

Claire hesitated for a moment, and tentatively said, “Three hundred thousand?”

“No! Guess again!” Jacob waved his hand.

“Two hundred thousand?”

“That’s not right!”

Charlie, who was next to him, glanced at the celadon cup and instantly saw that it was a fake, thinking that it would be good if this thing could be worth hundreds.

At this time, Jacob did not sell anymore, and said with a smile: “Hahaha, I bought it for 300! Isn’t it amazing?”

Jacob laughed, and the joy in his expression could not be suppressed.

Claire’s eyes widened in surprise and couldn’t believe it: “No, this cup really only cost three hundred?”

Elaine, the mother-in-law, heard the movement and walked out of the kitchen with joy, “This cup is so invaluable? Isn’t it fake?”

Jacob slapped his chest: “Don’t worry, the people who sell the cups don’t understand the market. I even asked someone to help me read it and said it was true!”

“Really?” Elaine carefully picked up the cup, looked left and right, smiling from ear to ear.

Charlie stood aside, but only smiled in agreement, his expression calm.

He had long seen that these two cups were fakes, but it was rare that the Old Master was so happy that he still did not expose them.

Jacob was so excited that he looked like a cat who stole the fish and said with joy: “This cup is not yet available. The boss said that he will bring the missing part, and I will take a look again tomorrow! Try to buy the whole set! In that case, the value can be doubled several times! With any luck, the six million debts can be paid back!”

Charlie frowned and immediately stopped: “Dad, don’t be greedy for playing antiques. Buying these two cups is enough, let’s not talk about it.”

Jacob glared at him and cursed: “What more, would the kid teach me now?”

Charlie said hurriedly: “No, no, do as you like it.”

After talking, I didn’t bother to be nosy.

Anyway, even if the Old Master is cheated, it is not his own money.

Claire also said, “Dad, why are you buying so much? These two cups can’t be eaten or drunk. Besides, the price difference is such big. Whether the cups are true or not has yet to be identified.”

She doesn’t believe that the pie is falling in the sky. If you can buy 500,000 for three hundred, wouldn’t everyone be rich?

Jacob was on his head when he saw a few people pouring cold water on himself and said contemptuously: “You don’t understand! This is an antique, and it depends on a pair of clever eyes to pick it up!”

As he said, he admired the celadon cup and said to Claire: “You don’t have to worry about this. There are still several people who want to grab it with me today. I may not be able to buy it tomorrow.”

Elaine said hurriedly: “If it is so valuable, you must find a way to sell it!”

Seeing the two elders busy admiring the chicken bowl cup, Claire quietly pulled Charlie aside.

“I don’t think this is very reliable. It feels like a scam. Dad will definitely go there tomorrow. Then you and Dad will take a trip to the Antique Street so that he won’t be cheated.”

Charlie nodded. If Claire didn’t say anything, he wouldn’t bother to care about it, but since his wife has spoken, he naturally couldn’t stand by and watch!

Chapter 99
The next day is the weekend.

Charlie was pulled by the Old Master and drove to the Antique Street early.

The Old Master was refreshed, and he waved to Charlie when he got out of the car, “come, I will show you what it means to pick up a fortune.”

After that, strode to Antique Street.

Charlie had to walk quickly to keep up, looking around as he walked.

On weekends, there are a lot more people on Antique Street than usual.

The antique jade shops on both sides are very dense, and the vendors who come out to set up stalls are also densely packed, and the whole street is blocked.

There are also many vendors who just spread a plastic sheet on the ground, filled with various antiques and jade, to welcome guests on the spot.

Charlie glanced casually, and almost didn’t see any genuine products. They were all used by black-hearted vendors to trick laymen and foreign tourists.

Many tourists who bought the fakes were completely blindfolded, holding the imitations and grinning, thinking that they were taking a big advantage.

“right here!”

Jacob stopped and stood in front of a simple stall, his expression unable to hide his excitement.

There were a few tourists standing next to the stall, picking antiques, Jacob hurried into the crowd for fear of falling behind.

Charlie glanced, this stall was nothing more than spreading a piece of oiled paper on the ground and placed dozens of antiques stained with mud, such as blue and white horses, five emperors copper coins, copper wine cups, blood jade bracelets, yellowed calligraphy, and paintings.

There was a dazzling array of things, but Charlie just took a casual look and found that these were all fakes.

The stall owner was a thin, dark-skinned man. He was wearing a coarse blue cloth. His hair was greasy and disheveled. He grew a simple and honest appearance. He looked dull and dull.

“Look at this!” Jacob greeted Charlie excitedly. He pointed to a colorful bottle with a big mouth and said in a low voice: “This is the wine bottle set with my two glasses! I bought it back and made one. Set, the price can be doubled!”

Charlie glanced at the wine bottle, held it in his hand, and raised his head to ask the boss.

“how much is it?”

The boss stared and blistered, and said dumbly: “My father said, at least 20,000, less than a cent will not be sold!”

When Jacob heard this, he almost laughed, and said to Charlie quickly: “This boss doesn’t know the goods, let’s buy them quickly, so as not to be picked up by others.”

After speaking, he hurriedly paid for it.

At this moment, Charlie swiftly held his hand and smiled: “Dad, this thing is not worth 20,000, let’s not buy it.”

“What?” Jacob was taken aback, “Then how much do you think it is worth?”

Charlie stretched out his hand and shook it in front of the boss: “This number.”

“Five thousand?” the boss asked, staring.

Charlie shook his head: “No, it’s fifty.”

The boss stared at Charlie for several seconds like looking at an alien, and suddenly shouted: “Do you know the goods? This is an antique left by my grandfather. It is a genuine treasure. You people in the city are too bullying. .”

Jacob was also anxious and pulled Charlie a hand: “Don’t talk nonsense, be careful of messing up the business.”

Charlie smiled, picked up the bottle and turned it over, pulled the yellow mud on the bottom of the bottle with his hand, pointed to the middle of a slit, and said, “Dad, look at what this is.”

The slit is extremely small. If it weren’t for Charlie pointed out, ordinary people would not see it at all. In the slit, a row of very small English letters appeared.

“Made in China.”

Jacob was stunned, his mouth opened so that he could lay an egg, and he couldn’t react for a long time.

Suddenly, he recovered, his face flushed, pointing to the boss and yelling.

“You, you are cheating!!”

Charlie took the wine bottle, shook it to the boss, and said, “The manufacturer dare not blatantly forge antiques. You have written this sign deliberately. You are quite clever. You know that you can block it with mud. In one sentence, thirty, can you sell it?”

“This”

The boss was stunned for a moment, suddenly all the honesty on his face disappeared, and he slapped his forehead with a smile.

Chapter 100
“Two bosses, I was coming out in a hurry today, and I took the wrong bottle.”

“You got it wrong?” Charlie smiled, and picked up a snuff bottle full of mud, digging into the mud on the bottle mouth with his hand, shone it to the sun, and said with a seriousness: “This is not wrong. It is made in Sioux City.”

In the snuff bottle, there was a row of small transparent characters.

“Made by Suzhou Crafts Factory.”

“I don’t know how to read, who knows what’s written on it.” The boss saw that he didn’t even do business. He sneered and wrapped the oiled paper cloth and wanted to grease the soles of his feet.

This time Jacob was completely in his senses, and he was so angry after realizing that he was treated like a monkey for a long time.

He grabbed the boss and roared.

“You liar, return the money to me.”

“What kind of money, I have never seen you before.” The boss struggled hard, and from the oil paper cloth he was holding in his hand, fake copper coins and fake jade horses kept dropping.

The jade horse fell on the ground without breaking. It seems to be made of hardened plastic.

“If you don’t refund the money, I’ll call the police!” Jacob screamed, his lungs exploded with anger.

Between the two pullings, a thing suddenly fell from the boss’s arms.

At the moment this thing fell, Charlie frowned suddenly and stared at the things on the ground.

This thing is a fist-sized white pebble, just like the pebble on the river beach, gray and matt.

But one difference is that this cobblestone is carved with the words “safe and rich!”

The fonts are crude and shoddy, and at first glance, they are carved up manually.

This kind of engraved stone is everywhere in the scenic area, and it is not worth any money. No wonder the boss didn’t put it out just now.

However, Charlie walked up with a stride, picked up the stone, and the blood all over his body suddenly boiled.

Just now, he felt a different kind of breath exuding from this antique!

Said it is breath, in fact, it is more like a kind of energy, a kind of magnetic field, which has produced a strong attraction to him.

Charlie knew that this should be the spiritual energy recorded in the Nine Profound Heavenly Secrets!

Reiki is a mysterious energy that has been lost for a long time. It can not only completely transform a person’s physical fitness, but can even cultivate and produce many incredible effects for ordinary people!

Charlie was overjoyed, calmly weighed the pebbles in his hand, and asked, “Is this yours?”

The boss froze for a moment, and nodded subconsciously, “Yes.”

“How to sell this stone?”

Jacob was also surprised and asked, “Why did you buy this broken stone! Don’t you know that this profiteer sells all fakes!”

“It’s just a piece of stone. It’s okay to buy one and go back to be unlucky.” Charlie said with a smile.

The boss took the opportunity to break away from Jacob’s hand and sneered at Charlie: “Do you really want to buy?”

Charlie nodded: “I do!”

The boss suddenly became energetic, and said eloquently, “Brother, you are really insightful! Don’t look at my pebble, but it is of extraordinary origin. It was placed on the Dragon Case in Lord Qiandi’s study. Paperweight”

Charlie didn’t have time to listen to his long talk and interrupted impatiently.

“Don’t talk to me about these and some, just come to the point!”

The boss laughed and said, “Since you are an expert, then 20,000!”

Charlie said disdainfully: “You want money crazy, right? One price, three hundred! If you don’t sell, I will call the police to arrest you.”

“Three hundred?” The boss sighed and said with a dry smile: “Brother, you are a person who knows the goods. Three hundred is three hundred.”

Charlie smiled slightly and pinched the stone in his hand.

Jacob was puzzled. He didn’t know why he bought such a broken stone. Just about to ask a question, there was a screaming voice next to him.

“Yeah, this stone is good, my master wants it!”

Amazing Love  91-95

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Chapter 91
Charlie asked them to drag all these five people up, and said coldly: “Today, I spared you five dogs, but if any of you dare to disclose everything that happened today, I will kill his whole family and understand?”

The five immediately nodded frantically.

It is a blessing in misfortune to be able to pick up life at this time, how dare to disobey Charlie’s meaning!

 

Seeing that these five people were completely convinced by his own treatment, Charlie nodded in satisfaction and said to Lili’s father and Yuesheng: “If you cheat my brother, you will have to pay the price. You will change the restaurant to my brother’s name tomorrow, yourself. Get out of the restaurant with your daughter, do you understand?”

Yuesheng nodded like garlic: “I understand, I’ll get out of here tomorrow!”

Charlie said to Zhaodong’s father, Zhao Haifeng: “Your son cuckolded my brother and severely injured my brother. You will pay my brother two million in damages tomorrow. One point less will not work. Do you understand? “

Zhao Haifeng also hurriedly said: “Mr. Charlie, I will call you to take the money tomorrow!”

Charlie was only satisfied, and said to Orvel’s men: “Okay, you throw all the garbage out!”

 

A group of people immediately took the five people out.

After they were taken away, Charlie said to Biao, “Biao, you did a good job this time.”

Biao smiled and hurriedly said, “Mr. Charlie, this is what I should do!”

Charlie said lightly: “I will ask someone to transfer two million to your account as a reward for you.”

Biao was immediately ecstatic and bowed: “Thank you, Mr. Charlie!”

Although he has made a lot of money with Orvel, Mr. Orvel is really not so generous, and he can give two million for every shot.

Charlie directly sent a text message to Issac, asking him to help transfer money to Biao. Although he has a lot of money in his card, it is not convenient to operate now.

A minute later, the money went to Biao’s account.

Biao was so excited that he kept bowing to Charlie.

Charlie said to Orvel again: “Mr. Orvel, you must not look down on these two million.”

Mr. Orvel said hurriedly, “Mr. Charlie, it is my honor to share your worries for you.”

Charlie gave a hum, and said, “I will remember this favor, and I will give you a chance to rise above and beyond.”

Hearing this, Orvel immediately knelt on the ground, banged his head at Charlie.

For Mr. Orvel, what he wants is not money, but a higher level.

However, for a person like him, it’s hard to climb to the next level.

Issac was the object he had always wanted to fawn on, but Issac never looked down on him because his background was too low and dirty.

Now, with a word from Charlie, it is very likely that Issac will lead him so that in the future, he will really be able to take it to the next level!

After discussing the merits, Charlie turned around and said to Darren, “Are you satisfied with today’s affairs?”

Darren was extremely shocked.

He really didn’t understand why Charlie had become so powerful.

Even the underground emperor of Aurous Hill must kneel in front of him!

He froze for a long time before he came back to his senses, and hurriedly said: “Satisfied! Satisfied!”

Charlie said, “I’m returning you to the restaurant. I will also get you two million for the loss. The rest of the future will depend on you!”

Darren said immediately: “Charlie, I will definitely be a cow and a horse for you in the future, and repay your kindness! No matter what you ask me to do, I will say nothing!”

Chapter 92
Charlie nodded and said, “You should heal your injury first, and if you recover from your injury, run the restaurant well. If there is anything you need to do, I will tell you then.

Darren repeatedly said: “I will listen to your instructions at any time!”

Charlie said again: “Oh, right, about today you must not tell anyone about this matter. I don’t want others to know my identity, understand?”

Darren hurriedly nodded and said: “I understand, don’t worry, even if I die, I won’t say anything!”

Charlie gave a hum and said, “I will arrange two nurses for you to take care of you. Take care of yourself. I will leave now.”

Back home, Charlie did not tell his wife Claire what happened today.

He still doesn’t want to let his wife know too much. For her, the less she knows, the safer.

The next day, when he was out shopping for groceries, he suddenly received a call. He picked it up and saw that it was actually from Warnia, the boss of Jiqingtang and the daughter of the Song family.

Charlie couldn’t help but wonder, what would Warnia have to do with him?

After picking it up, Warnia’s voice came, “Mr. Charlie, I’m really sorry, I take the liberty to interrupt, please forgive me.”

Charlie asked subconsciously, “Is there something wrong with the Yuhuchun bottle after I repaired it?”

Warnia quickly replied: “That’s not the case. I called Mr. Charlie because of other things.”

Charlie gave a hum and said, “say it.”

Warnia said: “The thing is, I have recently fancied something, but I am a little bit uncertain. You have a lot of knowledge in antiques, so I would like to ask you to come and help me with it?”

Charlie didn’t actually have any interest in appreciating antiques, but now he also has some treasures that contain spiritual energy, so he continued to ask: “Can you tell me what it is?”

Warnia replied: “It’s an ancient jade. According to the seller, after wearing it, it has the effect of peace of mind and good luck and avoiding evil.”

Charlie’s mind suddenly turned.

The Nine Profound Heaven Scriptures that he got accidentally seemed to record some spiritual things.

That kind of treasure that contains spiritual energy is of great benefit to people. He wanted to know if such a treasure could really be found in the world, so he agreed and said: “Okay, I can accompany you.”

Warnia said, “Thank you, Mr. Charlie, I will pick you up at 8 o’clock tomorrow morning.”

“it is good.”

After hanging up the phone, Charlie also thought to himself.

Regal feng shui, this kind of antiques that can calm the nerves and seek good fortune and avoid evil is highly praised by the rich. You can contact them more in the future to see if there is any chance.

Early the next morning.

Warnia drove to pick up Charlie on time.

After Charlie got in the car, Warnia said: “Mr. Charlie, I’m going to buy this ancient jade today, as well as a few other people in Aurous Hill are interested. I am afraid the competition will be very fierce.”

Charlie nodded and said lightly: “It doesn’t matter if there are many people or few people. The main thing is to see how things are. If things are good, you shouldn’t be afraid of people. I believe in Miss Song’s strength. If you really want to get a treasure, don’t stop yourself.”

Warnia smiled slightly and said, “Mr. Charlie, as the saying goes, there are mountains outside the mountains, and people outside the mountains. Just in Aurous Hill, this one-third of acres will hide dragons and crouching tigers. I don’t know how many people are better than me.”

Charlie pretended to be surprised and asked: “No? Isn’t the Song family the largest family in Aurous Hill?”

Warnia smiled and said, “That’s just the surface, let’s not talk about anything else. Take the new chairman of the Emgrand Group as an example. The Emgrand Group will top our entire Song family. The strength of this person is truly unfathomable.”

While talking, Warnia sighed again: “I actually want to make friends with this big man, but it’s a pity that this person is too mysterious to find any breakthrough.”

Chapter 93
Warnia spoke the truth.

She does feel that the new chairman of Emgrand Group is unfathomable.

You can buy a group of hundreds of billions at will without showing up. It can be seen that their industry is by no means just an Emgrand group.

In contrast, the Song family is indeed a little less interesting.

However, she didn’t know that the chairman of the Emgrand Group she had always wanted to make friends with was sitting next to her at this time.

Charlie was naturally also very low-key, and casually echoed a few sentences, but never revealed any information.

Warnia’s car drove fast and steady.

Soon, the car drove to a small courtyard by the river.

This small courtyard is secluded and elegant, with a simple and unpretentious appearance, but inside it is a huge water town.

Small bridges and flowing water, elegant gardens, pavilions, row upon row.

After parking, someone specially greeted the two to enter the door.

Go through the yard and into the lobby.

In the Chinese-style decorated hall, there is a mahogany round table, beside the table are several grandmaster chairs.

Seeing the two coming in, a white-haired Old Master stood up and said hello to Warnia: “Miss, you are here.”

Warnia looked a little embarrassed and nodded and said, “Old Qi, why are you here too.”

The Old Master smiled slightly and said, “I heard that you are coming, so I am here to take care of it.”

Warnia nodded and introduced to Charlie: “Qi is always the appraiser of our Song family. He is sent by the family, so he should be afraid of making mistakes.”

Charlie nodded. She was too young, and the Song family was not worried.

Old Qi glanced at Charlie, his face was a little disdainful, and said, “This is the appraiser invited by the eldest? Is so young, have you learned appraisal?”

Next to him, a middle-aged man with a blue complexion sneered and said, “Looking for such a hairy boy to hold his hands? Is there no one in the Song family? Would you like me to lend you some appraiser? Hahahaha.”

Warnia’s face became cold, and she said, “Tailai Li, this is Aurous Hill, not your Haicheng. It’s not your turn to speak up here.”

Tailai shrugged, and said indifferently: “The little girl from the Song family has a big temper.”

“Okay,” a middle-aged man sitting at the east of the round table frowned. “It’s all for business, not for quarrels, all calm down.”

“And this young man, let’s sit together.”

Warnia snorted before sitting down slowly.

Charlie also took a seat, and then Warnia leaned in his ear and whispered: “The one called Tailai before is the richest man in Haicheng. Next to him is Guo Ming, a very powerful Fengshui master. The one who spoke just now is Qin Gang. , The head of the Qin family in Aurous Hill, their family is the closest”

Charlie only noticed that Tailai was sitting next to an Old Master in a turquoise Thompson suit.

The Old Master was full of silver hair and had a sense of immortality. He kept his eyes closed all over his body, exuding an atmosphere that no one should get close to. He hadn’t even opened his eyes after the two of them arrived.

Speaking of this, Warnia shut up. Although Charlie was a little curious in his heart, he couldn’t ask anymore.

After everyone was seated, sitting on the other side of the table, a fat man dressed in luxurious clothes smiled and said, “Since the quarrel is over, let’s hurry up and see the goods. You are all big families. Stuff, there is no need to struggle for too long.”

Qin Gang snorted coldly, and said, “As long as this thing is really like what you said, it can adjust Feng Shui, calm and concentrate, I really don’t care about the billion self.”

Chapter 94
The fat man glanced at him before placing a simple wooden box on the table.

Inside the box was a piece of red jade glowing with blood, with an old style. As soon as it was taken out, everyone felt that the hall was filled with a warm atmosphere.

The eyes of Qin Gang suddenly lit up.

Warnia turned around and asked Elder Qi, “Old Qi, what do you think of this jade?”

Elder Qi stared for a moment and nodded: “It should be no problem. It is a bloody jade from before the Thompson Dynasty, and at first glance, it can be seen that a good monk has cultivated it for a long time.”

Warnia nodded, then turned to ask Charlie, “What do you think of it Mr. Charlie?”

Charlie curled his mouth in disdain and said: “Fake”

Old Qi snorted and scolded: “You are so young, who gave you the courage to slander in front of so many people!”

The Old Master Guo Ming beside Tailai also opened his eyes, looked, and asked: “Can I get started?”

The fat man sneered disdainfully and said, “Mr. Guo, are you kidding me? You don’t understand jade? Normal jade can’t be passed. My piece is bloody jade from the Zhou Dynasty.

Guo Ming was stunned for a moment before he said, “I was abrupt.”

After all, he also got to the edge of the ancient jade and watched it carefully. After a while, he closed his eyes again, and after a long time, he nodded and said: “If this jade is from the Zhou Dynasty, I don’t know, but it adjusts the Feng Shui and calms the mind. It should be real.”

As soon as these words were spoken, everyone’s hearts were instantly heated.

For them, it doesn’t really matter what history the jade has. The important thing is what role the jade has.

Old Qi smiled and said, “Old Guo is also a discerning person, not like those who are incapable and pretentious.”

When Warnia heard this, she couldn’t help but feel a little disappointed in Charlie.

It seems that he is still too young. Perhaps he has some accomplishments in the restoration of cultural relics, but he is still far behind these old people in the identification of antiques.

When Charlie saw this, he just shook his head slightly. Since these people are willing to be fooled, there is no need to stop them.

When the fat man saw that everyone had finished the appraisal, he closed the box and said with a smile: “Since the thing has been appraised, guys, is it time to make a price?”

Before he could finish his words, Qin Gang took the lead and said: “I will pay 100 million.”

“One hundred and thirty million.” Tailai also said.

Seeing that Warnia was silent, the fat man asked, “Where is Ms. Song?”

Seeing Warnia hesitated, Mr. Qi hurriedly whispered in her ear: “Miss, this is definitely a treasure. The estimated value should be around 300 million. If it can be won at 200 million, it will be a steady profit.”

Warnia was also a little shaken in her heart. She turned her head and glanced at Charlie, only to see that the other party looked indifferent, not sad or happy, and she couldn’t help but hesitate.

Old Qi glanced at Charlie with a cold look. Knowing that Warnia was affected by Charlie, she didn’t ask for a price. He said, “Just now, Mr. Charlie said that this ancient jade is fake. I really want to know. how he came to the conclusion! Let us also see Mr. Charlie’s methods!”

If Charlie talks nonsense later, Warnia will naturally know that Charlie’s words are false, and then she will feel relieved to bid.

Others contemptuously said:

“He knows what a little boy, don’t be ashamed of coming up”

“Yes, how can it be his turn to speak here?”

“If you don’t want to buy it, don’t waste everyone’s time.”

Listening to everyone’s ridicule, Charlie just stared at Old Qi with interest, and asked indifferently: “Are you sure you want me to tell?”

Chapter 95
“Of course! Just say it!”

Old Qi sneered and said: “I also want to see how you liars usually deceive people.”

Charlie shrugged and said: “I didn’t really want to expose your scam, but I can’t refuse you repeatedly asking for it.”

“A scam? Boy, you mean, did we all miss it?”

Guo Ming, who had been calm, said with a sneer.

Charlie glanced at him and said with a sneer: “You are the most stupid here in particular”

“Boy, you are looking for death!” Guo Ming was furious.

Charlie ignored him and said, “Jade is true jade, you liar have a conscience.”

Then he said: “But this jade is not a bloody jade of the Zhou Dynasty, and there is no good monk who has raised it personally. It is nothing more than a piece of fine topaz from Hetian. It has a good texture, but it has some value. The price is at most 500,000.”

“bulls*it. Can’t you see that the jade is red?” Qi Lao scolded.

Charlie continued: “The red color is due to the erosion of the manganese ore containing submanganate. Don’t you really think it was blood-soaked in the corpse of some eminent monk?”

“Then what about the warm atmosphere we feel?” Qin Gang frowned and asked eagerly.

Charlie shook his head and said, “This thing is even less technical. The grass from Africa, the rhizome is ground into a powder and dissolved in water. Soaking this jade in water for about half a year will naturally have this effect. It’s not a warm atmosphere. It’s a psychedelic effect. It’s easy to remove it. Just burn the piece of jade with fire.”

“Boy! How dare you say crazy words!” Hearing the words, the fat man patted the table and stood up.

Tailai turned dark, looked at the fat man, and said, “Take the jade out for a while?”

The fat man was sweating profusely and said: “What is too hot, this kid is obviously pretending to be a deceit, don’t listen to his nonsense!”

Qin Gang tapped his finger on the desktop and said, “After the fire, if the effect is still there, I will pay for it, but if the effect is gone, the consequences, you know, although our Qin family has recently encountered something, it is not Let others ride on the head!”

Warnia also nodded and said: “If Mr. Charlie is wrong, it doesn’t matter if you go too far. Jade will not burn, but if Mr. Charlie is right, you have to give us an explanation today!”

The fat man suddenly sweated profusely.

Of these three, none of them can be offended by him.

The reason why this round was made was entirely because of Qi Lao inside and outside, wanting to cheat Warnia a sum of money, and then share the spoils.

Unexpectedly, a Charlie would kill it halfway, and all the mysteries in it would be revealed in one word!

Actually, Charlie didn’t know jade before.

The reason for being able to see through this jade at a glance is entirely because of the Nine Profound Heavenly Secrets.

Don’t know why. he just saw this piece of jade, and the answers have already appeared in his brain.

It seems that this identification of antique jade is a skill in the Nine Profound Heaven Scriptures.

Seeing that the fat man didn’t speak, Charlie suddenly sneered and said: “Why? Is your heart guilty? Don’t care about talking?”

The fat man’s face was blue and white, but he didn’t say whether he wanted to go too far.

More Articles ...

  1. Amazing Love  86-90
  2. Amazing Love  81-85
  3. Amazing Love  76-80
  4. Amazing Love  71-75

Page 54 of 70

  • Start
  • Prev
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • Next
  • End
Close info

Additional information

Login Form

  • Forgot your password?
  • Forgot your username?
  • Create an account

Thank you and Welcome!

Popular Tags

  • Novels
  • Blog
  • Law Reviewer
  • Amazing Love
  • Political law
  • CONSTITUTIONAL LAW
  • Article
  • Media and information Literacy
  • Resources
  • Philippine BAR Exam

Latest Articles

  • Gross Neglect vs. Loss of Trust: A Delicate Balance in Employment Law
  • Acquittal in Denial of Financial Support Case Highlights Importance of Proving Criminal Intent
  • SERVER MAINTAINANCE
  • PBBM orders review of performance management systems
  • Earn $500 By Using Google Maps - Make Money Online
  • synoboot
  • OBS stream key: What is it and how to find it
  • Beginner’s guide to using terminal on Linux Mint
  • 15 Very Useful Linux Commands that everyone should master!
  • Linux Terminal Command Reference

Random products

dll_1840314014
60,00 PHP each DAILY LESSON LOG
+
–
Product details
teracare
18 240,00 PHP each Terahertz Wand
+
–
Product details
images_1
10 000,00 PHP each Software Development Services
+
–
Product details

Random Resources

  • E-SAT Tool DepEd for SY 2022-2023 FREE Download
  • Automated RPMS IPCRF School Year 2022 - 2023 UPDATED 7-10-2023
  • Automated Weekly Lesson Log RAISE PLUS
  • National Achievement Test Reviewers
  • PHILOSOPHY REVIEWER SENIOR HIGH SCHOOL
  • Reviewer for Philippine Politics and Governance Senior High Schol
  • PERSONAL LIFELONG LEARNING PLAN SAMPLE
  • RPMS PPST FOR SY 2021 -2022 ROLL-OUT FACILITATOR'S MATERIALS
  • RPMS PPST FOR SY 2021 -2022
  • RPMS PPST ROLL OUT 2021-2022

Random Blog

  • Earn $500 By Using Google Maps - Make Money Online
  • synoboot
  • OBS stream key: What is it and how to find it
  • Beginner’s guide to using terminal on Linux Mint
  • 15 Very Useful Linux Commands that everyone should master!
  • Linux Terminal Command Reference
  • The 5-Minute Linux Essential Shell Tutorial
  • Install Microsoft Office on Linux | A Step-By-Step Guide
  • PARENTAL WAIVER AND CONSENT SAMPLE
  • Installing LAMP (Linux, Apache, MySQL and PHP) On Linux Mint

Random Novels

  • Amazing Love 186 - 190
  • Amazing Love 231-235
  • Amazing Love 101-105
  • Amazing Love 126 -130
  • Amazing Love 351-355
  • Amazing Love  46-50
  • Amazing Love 251-255
  • Amazing Love 346-350
  • Amazing Love 391-395
  • Amazing Love 356-360