cybersecurity
DESCRIPTION
Cyber-security Training SlidesTRANSCRIPT
![Page 1: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/1.jpg)
![Page 2: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/2.jpg)
Prepared by
Jumanne Mtambalike
Tony Severine
CYBER SECURITY AND ETHICAL HACKING
![Page 3: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/3.jpg)
WE ARE NOT DOING THIS……
![Page 4: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/4.jpg)
THE SECURITY CROWD
![Page 5: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/5.jpg)
CONTENTS
• Introduction to cyber-security
• Types of cyber crimes
• Understanding terminologies
• Documentation and Reports
• Cyber security Tanzania Perspective
• Cyber security Africa Perspective
• Global attack trends
• Overcoming Cyber Crimes
![Page 6: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/6.jpg)
INTRODUCTION TO CYBER-SECURITY
•What is cyber security
![Page 7: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/7.jpg)
TYPES OF CYBERCRIMES
• Phishing
• Hacking
• Vishing
• Cyber stalking
• Cross site scripting (XSS)
• Bot Networks
• Cyber squatting
![Page 8: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/8.jpg)
UNDERSTANDING TERMINOLOGIES
• Malicious codes
• Spam
• Intrusion
• Scam
• Phishing site
• Hacker
• Denial of Service (DOS)
• Cyber terminologies (Cyber terrorism, Cyber wars, etc.)
• Offensive and Defensive security
• Virus, malware, worms and spyware
• Cyber Espionage
![Page 9: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/9.jpg)
DOCUMENTATION AND REPORTS
• Cyber Security IEEE Report by Jumanne Mtambalike
• Crime Scenario in India by Dr. B. Muthukumaran
• Cybercrime Report Tanzania
• Ethical Hacking Presentation by Pratheeba Murugesan
![Page 10: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/10.jpg)
CYBER SECURITY @ TANZANIA PERSPECTIVE
• News Report
• Reference Documents
• Governments Initiative
• Cyber laws and Implementation
• Statistics and Records
• Government Position
• The future
![Page 11: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/11.jpg)
CYBER SECURITY @ AFRICAN PERSPECTIVE
• Overview
• Statistics and Report
• Associations
• On the News
• The future
![Page 12: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/12.jpg)
GLOBAL CYBER SECURITY TRENDS
• Europe
• South America
• North America
• Asia
• Australia
![Page 13: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/13.jpg)
OVERCOMING CYBERCRIMES
• Security Policy and Legal Framework
• Law Enforcement Agency
• Research and Development
• International Collaboration
![Page 14: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/14.jpg)
FUTURE OF CYBER SECURITY OPEN DISCUSSION
![Page 15: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/15.jpg)
PRACTICAL SESSION
• PRACTICAL #1: EXPLORING PHISHING SITES
• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS
• PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM
• PRACTICAL #4: EXPLORING SOCIAL ENGINEERING
• PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK
• PRACTICAL #6: HACKING WEBMAILS ACCOUNTS
• PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM
• PRACTICAL #8: FACEBOOK HACKING
• PRACTICAL #9: WINDOW COMMAND PROMPT HACKING
• PRACTICAL #10: CREATING VIRUSES AND PREVENTION
![Page 16: Cybersecurity](https://reader036.vdocuments.us/reader036/viewer/2022070315/554ee698b4c905d51b8b5109/html5/thumbnails/16.jpg)
THANK YOU!!!!!