SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Prepared by
Jumanne Mtambalike
Tony Severine
CYBER SECURITY AND ETHICAL HACKING
WE ARE NOT DOING THIS……
THE SECURITY CROWD
CONTENTS
• Introduction to cyber-security
• Types of cyber crimes
• Understanding terminologies
• Documentation and Reports
• Cyber security Tanzania Perspective
• Cyber security Africa Perspective
• Global attack trends
• Overcoming Cyber Crimes
INTRODUCTION TO CYBER-SECURITY
•What is cyber
security
TYPES OF CYBERCRIMES
• Phishing
• Hacking
• Vishing
• Cyber stalking
• Cross site scripting (XSS)
• Bot Networks
• Cyber squatting
UNDERSTANDING TERMINOLOGIES
• Malicious codes
• Spam
• Intrusion
• Scam
• Phishing site
• Hacker
• Denial of Service (DOS)
• Cyber terminologies (Cyber terrorism, Cyber wars, etc.)
• Offensive and Defensive security
• Virus, malware, worms and spyware
• Cyber Espionage
DOCUMENTATION AND REPORTS
• Cyber Security IEEE Report by Jumanne Mtambalike
• Crime Scenario in India by Dr. B. Muthukumaran
• Cybercrime Report Tanzania
• Ethical Hacking Presentation by Pratheeba Murugesan
CYBER SECURITY @ TANZANIA PERSPECTIVE
• News Report
• Reference Documents
• Governments Initiative
• Cyber laws and Implementation
• Statistics and Records
• Government Position
• The future
CYBER SECURITY @ AFRICAN PERSPECTIVE
• Overview
• Statistics and Report
• Associations
• On the News
• The future
GLOBAL CYBER SECURITY TRENDS
• Europe
• South America
• North America
• Asia
• Australia
OVERCOMING CYBERCRIMES
• Security Policy and Legal Framework
• Law Enforcement Agency
• Research and Development
• International Collaboration
FUTURE OF CYBER SECURITY OPEN DISCUSSION
PRACTICAL SESSION
• PRACTICAL #1: EXPLORING PHISHING SITES
• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS
• PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM
• PRACTICAL #4: EXPLORING SOCIAL ENGINEERING
• PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK
• PRACTICAL #6: HACKING WEBMAILS ACCOUNTS
• PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM
• PRACTICAL #8: FACEBOOK HACKING
• PRACTICAL #9: WINDOW COMMAND PROMPT HACKING
• PRACTICAL #10: CREATING VIRUSES AND PREVENTION
THANK YOU!!!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Badgujar
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO_Presentations
 
Key and cipher overview
Key and cipher overviewKey and cipher overview
Key and cipher overview503416
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1DallasHaselhorst
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorialiuvmtech
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareCyren, Inc
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
Interop 2007 Keynote Teaser
Interop 2007 Keynote TeaserInterop 2007 Keynote Teaser
Interop 2007 Keynote TeaserAnton Chuvakin
 

Was ist angesagt? (15)

Hacking - A Technical Threat
Hacking - A Technical ThreatHacking - A Technical Threat
Hacking - A Technical Threat
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Internet security
Internet securityInternet security
Internet security
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
 
Key and cipher overview
Key and cipher overviewKey and cipher overview
Key and cipher overview
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Security tips
Security tips Security tips
Security tips
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
GroupProtectionM6A1
GroupProtectionM6A1GroupProtectionM6A1
GroupProtectionM6A1
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Interop 2007 Keynote Teaser
Interop 2007 Keynote TeaserInterop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
 

Ähnlich wie Cybersecurity

Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT CollegesPotato
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Hîmãlåy Làdhä
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023KharimMchatta
 
Cybersecurity and its oppoutinities
Cybersecurity and its oppoutinitiesCybersecurity and its oppoutinities
Cybersecurity and its oppoutinitiesLAVANS2
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 
Cyber crime is around us
Cyber crime is around usCyber crime is around us
Cyber crime is around uslichuyuliting
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxRahulDhanware2
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppthm5314581
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxKhushiLodhi1
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Deepam Aggarwal
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023KharimMchatta
 

Ähnlich wie Cybersecurity (20)

Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Cybersecurity and its oppoutinities
Cybersecurity and its oppoutinitiesCybersecurity and its oppoutinities
Cybersecurity and its oppoutinities
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber crime is around us
Cyber crime is around usCyber crime is around us
Cyber crime is around us
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Mehr von jumanne rajabu

Hdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up TanzaniaHdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up Tanzaniajumanne rajabu
 
Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.jumanne rajabu
 
How to make a great Pitch
How to make a great PitchHow to make a great Pitch
How to make a great Pitchjumanne rajabu
 
Innovation ecosystem in tanzani
Innovation ecosystem in tanzaniInnovation ecosystem in tanzani
Innovation ecosystem in tanzanijumanne rajabu
 
Manufacturing in tanzania (1)
Manufacturing in  tanzania (1)Manufacturing in  tanzania (1)
Manufacturing in tanzania (1)jumanne rajabu
 
Hivos Energy Safari Building Cases
Hivos Energy Safari Building CasesHivos Energy Safari Building Cases
Hivos Energy Safari Building Casesjumanne rajabu
 
Manufacturing in tanzania
Manufacturing in  tanzaniaManufacturing in  tanzania
Manufacturing in tanzaniajumanne rajabu
 
Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania jumanne rajabu
 
Innovation ecosystem tanzania
Innovation ecosystem tanzaniaInnovation ecosystem tanzania
Innovation ecosystem tanzaniajumanne rajabu
 
Tanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity ExchangeTanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity Exchangejumanne rajabu
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation jumanne rajabu
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation jumanne rajabu
 
Open data day presentation
Open data day presentationOpen data day presentation
Open data day presentationjumanne rajabu
 
Social media markerting
Social media markertingSocial media markerting
Social media markertingjumanne rajabu
 

Mehr von jumanne rajabu (20)

Hdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up TanzaniaHdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up Tanzania
 
Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.
 
How to make a great Pitch
How to make a great PitchHow to make a great Pitch
How to make a great Pitch
 
E learning tanzania
E learning tanzaniaE learning tanzania
E learning tanzania
 
Innovation ecosystem in tanzani
Innovation ecosystem in tanzaniInnovation ecosystem in tanzani
Innovation ecosystem in tanzani
 
Manufacturing in tanzania (1)
Manufacturing in  tanzania (1)Manufacturing in  tanzania (1)
Manufacturing in tanzania (1)
 
Hivos Energy Safari Building Cases
Hivos Energy Safari Building CasesHivos Energy Safari Building Cases
Hivos Energy Safari Building Cases
 
Manufacturing in tanzania
Manufacturing in  tanzaniaManufacturing in  tanzania
Manufacturing in tanzania
 
Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania
 
Branding 4 start ups
 Branding 4 start ups  Branding 4 start ups
Branding 4 start ups
 
Innovation ecosystem tanzania
Innovation ecosystem tanzaniaInnovation ecosystem tanzania
Innovation ecosystem tanzania
 
Tanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity ExchangeTanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity Exchange
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
 
Azam TV prototype
Azam TV prototype Azam TV prototype
Azam TV prototype
 
T good trainer
T good trainerT good trainer
T good trainer
 
Power of google
Power of googlePower of google
Power of google
 
Open data day presentation
Open data day presentationOpen data day presentation
Open data day presentation
 
Social media markerting
Social media markertingSocial media markerting
Social media markerting
 
Social Media Basics
Social Media BasicsSocial Media Basics
Social Media Basics
 

Kürzlich hochgeladen

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Kürzlich hochgeladen (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Cybersecurity

  • 1.
  • 2. Prepared by Jumanne Mtambalike Tony Severine CYBER SECURITY AND ETHICAL HACKING
  • 3. WE ARE NOT DOING THIS……
  • 5. CONTENTS • Introduction to cyber-security • Types of cyber crimes • Understanding terminologies • Documentation and Reports • Cyber security Tanzania Perspective • Cyber security Africa Perspective • Global attack trends • Overcoming Cyber Crimes
  • 7. TYPES OF CYBERCRIMES • Phishing • Hacking • Vishing • Cyber stalking • Cross site scripting (XSS) • Bot Networks • Cyber squatting
  • 8. UNDERSTANDING TERMINOLOGIES • Malicious codes • Spam • Intrusion • Scam • Phishing site • Hacker • Denial of Service (DOS) • Cyber terminologies (Cyber terrorism, Cyber wars, etc.) • Offensive and Defensive security • Virus, malware, worms and spyware • Cyber Espionage
  • 9. DOCUMENTATION AND REPORTS • Cyber Security IEEE Report by Jumanne Mtambalike • Crime Scenario in India by Dr. B. Muthukumaran • Cybercrime Report Tanzania • Ethical Hacking Presentation by Pratheeba Murugesan
  • 10. CYBER SECURITY @ TANZANIA PERSPECTIVE • News Report • Reference Documents • Governments Initiative • Cyber laws and Implementation • Statistics and Records • Government Position • The future
  • 11. CYBER SECURITY @ AFRICAN PERSPECTIVE • Overview • Statistics and Report • Associations • On the News • The future
  • 12. GLOBAL CYBER SECURITY TRENDS • Europe • South America • North America • Asia • Australia
  • 13. OVERCOMING CYBERCRIMES • Security Policy and Legal Framework • Law Enforcement Agency • Research and Development • International Collaboration
  • 14. FUTURE OF CYBER SECURITY OPEN DISCUSSION
  • 15. PRACTICAL SESSION • PRACTICAL #1: EXPLORING PHISHING SITES • PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS • PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM • PRACTICAL #4: EXPLORING SOCIAL ENGINEERING • PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK • PRACTICAL #6: HACKING WEBMAILS ACCOUNTS • PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM • PRACTICAL #8: FACEBOOK HACKING • PRACTICAL #9: WINDOW COMMAND PROMPT HACKING • PRACTICAL #10: CREATING VIRUSES AND PREVENTION