SlideShare ist ein Scribd-Unternehmen logo
1 von 87
Downloaden Sie, um offline zu lesen
‫فى‬ ‫وهويتك‬ ‫معلوماتك‬ ‫وتحمى‬ ‫آمنا‬ ‫تبقى‬ ‫كيف‬
‫الرقمى‬ ‫العصر‬
‫مهندس‬:‫الدٌن‬ ‫صالح‬ ‫أشرف‬
‫وكندا‬ ‫أمرٌكا‬ ‫فى‬ ‫المصرٌٌن‬ ‫العلماء‬ ‫رابطة‬ ‫عضو‬
‫الرقمى‬ ‫والتحول‬ ‫المعلومات‬ ‫أمن‬ ‫إستشارى‬
Agenda
• What is information security
• Why should we care
• Modern threads
• Phishing
• Password
• How you can protect yourself
• Privacy and social media
• How you can protect yourself online
• Encryption
• Social engineering
• Practical session
Information security ‫المعلىمبت‬ ‫أمن‬
SECURITY VISION FOR THE 2020S
‫بأ‬ ‫خبصة‬ ‫واضحة‬ ‫رؤية‬ ‫لىضع‬ ‫بحبجة‬ ‫نحن‬ ‫لمبرا‬‫المعلىمبت‬ ‫من‬
Virtually everything is on the table
as we enter a new decade that
will be defined by global
innovation and technology
breakthroughs. Companies and
governments worldwide are
jockeying for position to define
the new technology landscape.
‫مع‬ ‫واقعا‬ ‫أصبح‬ ‫شًء‬ ‫كل‬ ‫فى‬ ‫رقمٌا‬ ‫التحول‬
‫خالل‬ ‫من‬ ‫تحدٌده‬ ‫سٌتم‬ ‫ًا‬‫د‬ٌ‫جد‬ ‫ًا‬‫د‬‫عق‬ ‫دخولنا‬
‫الحدٌثة‬ ‫التقنٌات‬ ‫ووتوغل‬ ً‫العالم‬ ‫االبتكار‬
‫التكنولوجٌة‬.
‫أنحاء‬ ‫جمٌع‬ ً‫ف‬ ‫والحكومات‬ ‫الشركات‬ ‫وتنافس‬
‫المشهد‬ ‫لتحدٌد‬ ‫موقع‬ ‫على‬ ‫للحصول‬ ‫العالم‬
‫الجدٌد‬ ً‫التكنولوج‬.
What is Information Security?
• Protects the confidentiality, integrity,
and availability of important data
• Controls can be Physical or Technical
• Locks and safes – encryption and
passwords
• Technology has made our lives easier
in many ways, but this convenience
has also increased our exposure to
threats
• Thieves and attackers can also work
more effectively
•‫الهامة‬ ‫البٌانات‬ ‫وتوافر‬ ‫وسالمة‬ ‫سرٌة‬ ً‫ٌحم‬
•‫فنٌة‬ ‫أو‬ ‫مادٌة‬ ‫التحكم‬ ‫عناصر‬ ‫تكون‬ ‫أن‬ ‫ٌمكن‬
•‫وخزائن‬ ‫أقفال‬-‫مرور‬ ‫وكلمات‬ ‫تشفٌر‬
•، ‫كثٌرة‬ ‫نواح‬ ‫من‬ ‫أسهل‬ ‫حٌاتنا‬ ‫التكنولوجٌا‬ ‫جعلت‬
‫للتهدٌدات‬ ‫تعرضنا‬ ‫من‬ ‫ا‬ً‫ض‬ٌ‫أ‬ ‫زادت‬ ‫الراحة‬ ‫هذه‬ ‫ولكن‬
•‫والمهاجمٌن‬ ‫اللصوص‬ ‫مكنت‬ ‫التكنولوجٌا‬
‫وسرعة‬ ‫فعالٌة‬ ‫أكثر‬ ‫بشكل‬ ‫العمل‬ ‫ا‬ً‫ض‬ٌ‫أ‬ ‫والمخربٌن‬
Why Should We Care?
• Theft is becoming increasingly
digital
• Ease of identity, account, and
credential theft makes everyone an
ideal target
• Applies to organizations that house
such data or individuals
themselves
• Compromise may affect customers,
coworkers, friends, and family
•‫فى‬ ‫اإللكترونٌة‬ ‫والجرائم‬ ‫السرقات‬ ‫أصبحت‬
‫مستمر‬ ‫تزاٌد‬
•‫وبٌانات‬ ‫والحساب‬ ‫الهوٌة‬ ‫سرقة‬ ‫سهولة‬
‫ا‬ًٌ‫مثال‬ ‫ا‬ً‫ف‬‫هد‬ ‫الجمٌع‬ ‫تجعل‬ ‫اإلئتمان‬ ‫بطاقات‬
•‫هذه‬ ‫مثل‬ ‫تضم‬ ً‫الت‬ ‫المنظمات‬ ‫على‬ ‫ٌنطبق‬ ‫هذا‬
‫أنفسهم‬ ‫األفراد‬ ‫أو‬ ‫البٌانات‬
•‫وزمالء‬ ‫العمالء‬ ‫على‬ ‫ٌؤثر‬ ‫قد‬ ‫التأثٌر‬ ‫هذا‬
‫والعائلة‬ ‫واألصدقاء‬ ‫العمل‬
Historical Perspective
• Many historical methods of monetary theft
• Stagecoach Robberies
• Train Hijacking
• Armed Assault
• “Inside Jobs”
• Losses from tens of thousands of dollars, up into the millions
• Today, most banks do not house “millions of dollars” on-
premises
• Liquid economy
• Data is the new commodity
Modern Threats - ‫الحذيثة‬ ‫التهذيبت‬
• Viruses, Trojans, Worms,
and Root Kits
• Adware/Spyware
• Spam, Phishing, and other
Email attacks
• Identity Theft
• Social Engineering
‫ومجموعات‬ ‫والدٌدان‬ ‫طروادة‬ ‫وأحصنة‬ ‫الفٌروسات‬
‫نفسه‬ ‫الكود‬ ‫على‬ ‫العمل‬Root kits
‫المزعجة‬ ‫الموجهة‬ ‫اإلعالنات‬/‫التجسس‬ ‫برامج‬
ً‫اإللكترون‬ ‫البرٌد‬ ‫وهجمات‬ ‫والتصٌد‬ ً‫العشوائ‬ ‫البرٌد‬
‫األخرى‬
‫الهوٌة‬ ‫سرقة‬
‫اجتماعٌة‬ ‫هندسة‬
How do we do It
Frauds committed internally
and externally across Europe
European Economic Crime Survey 2019
PriceWaterhouseCoopers
External fraud
41%Internal fraud
59%
External fraud
41%Internal fraud
59%
‫الخبيثة‬ ‫البرمجيبت‬ ‫أنىاع‬ ‫أشهر‬
Viruses
• Viruses are malicious programs that hide
themselves on your computer
• Usually very small
• May have access to view or delete your
information
• Often contracted through a website,
email, or p2p applications
• May destroy your documents, format
your hard drive, send emails from your
computer or a variety of other nefarious
actions – it just depends on the strain!
• Viruses are created for the sole purpose
of causing trouble
• Taking revenge, political statements, etc…
• Most modern viruses are financially motivated – may hold
data for ransom or steal information
Just like real viruses, computer viruses spread to others…
Other computers on the network
Sending out email replications of itself
Always use anti-virus protection!
Famous viruses:
Love Bug
Code Red
Ransamware
Worms, Trojans, and Root Kits
• Trojan appears as a legitimate program
• Possible to repackage Trojans with
legitimate programs
• Worms are self-replicating
• Typically propagate through un-patched
systems
• Blaster
• Sasser
• Root Kits
• Low level programs that embed
themselves in the operating system
itself
• Difficult if not impossible to detect
•ً‫شرع‬ ‫كبرنامج‬ ‫طروادة‬ ‫حصان‬ ‫ٌظهر‬
•‫البرامج‬ ‫مع‬ ‫طروادة‬ ‫أحصنة‬ ‫حزم‬ ‫إعادة‬ ‫الممكن‬ ‫من‬
‫الشرعٌة‬
•‫التكاثر‬ ‫ذاتٌة‬
•‫مصححة‬ ‫غٌر‬ ‫أنظمة‬ ‫خالل‬ ‫من‬ ‫عادة‬ ‫ٌنتشر‬
•‫مكبر‬
•‫ساسر‬
•‫التشغٌل‬ ‫نظام‬ ‫مستوى‬ ‫على‬ ‫تعمل‬ ‫خبٌثة‬ ‫برامج‬
•‫نظام‬ ً‫ف‬ ‫نفسها‬ ‫تدمج‬ ً‫الت‬ ‫المنخفض‬ ‫المستوى‬ ‫ذات‬ ‫البرامج‬
‫نفسه‬ ‫التشغٌل‬
•‫اكتشافه‬ ‫المستحٌل‬ ‫من‬ ‫ٌكن‬ ‫لم‬ ‫إن‬ ‫صعب‬
Adware/Spyware
•‫جمع‬ ‫أو‬ ‫إنتباهك‬ ‫لجذب‬ ‫الضارة‬ ‫البرامج‬ ‫بعض‬ ‫تصمٌم‬ ‫تم‬
‫الحاسوبٌة‬ ‫عاداتك‬ ‫حول‬ ‫معلومات‬
•‫تزورها؟‬ ً‫الت‬ ‫المواقع‬ ‫ما‬
•‫وقت؟‬ ‫باي‬ ‫متً؟‬
•‫تشتري؟‬ ‫ماذا‬
•‫الموقع؟‬ ‫تصفح‬ ‫تستغرق‬ ‫الوقت‬ ‫من‬ ‫كم‬
•‫بك؟‬ ‫الخاص‬ ‫الكمبٌوتر‬ ‫جهاز‬ ‫تستخدم‬ ‫ماذا‬ ‫أو‬ ‫كٌف‬
•‫مثال‬:Sony "Root Kit"
•‫مخصص‬"‫التسوٌق‬ ‫ألغراض‬"
•‫برامج‬ ‫مع‬ ‫شائع‬ ‫بشكل‬ ‫تثبٌته‬ ‫ٌتم‬p2p‫مجانٌة‬ ‫برامج‬ ‫أو‬
•‫ضرر‬ ‫أي‬ ‫ٌسبب‬ ‫وال‬ ‫إزعاج‬ ‫مصدر‬ ‫فقط‬ ‫ٌكون‬ ‫قد‬
•‫اإلعالنٌة؟‬ ‫البرامج‬ ‫بجانب‬ ‫تثبٌتها‬ ‫ٌمكن‬ ً‫الت‬ ‫األخرى‬ ‫األشٌاء‬ ‫ما‬
• Some malware is designed to solicit you, or
gather information about your computing
habits
• Which websites you visit?
• When? What times?
• What are you purchasing?
• How long do spend surfing the website?
• How or what do you use your computer for?
• Example: Sony “Root Kit”
• Intended for “Marketing Purposes”
• Commonly installed with p2p or free software
• May be only an annoyance and cause no harm
• What else may be installed alongside adware?
Email
• Common Attacks
• Phishing
• Malicious attachments
• Hoaxes
• Spam
• Scams (offers too good to be true)
• Best Practices
• Don’t open suspicious attachments
• Don’t follow links
• Don’t attempt to “unsubscribe”
•‫الشائعة‬ ‫الهجمات‬
•‫التصٌد‬
•‫الخبٌثة‬ ‫المرفقات‬
•‫خدع‬
•‫مؤذي‬ ‫برٌد‬
•‫الخداع‬(‫ٌصعب‬ ‫لدرجة‬ ‫ا‬ً‫د‬‫ج‬ ‫جٌدة‬ ‫عروض‬
‫تصدٌقها‬)
•‫الممارسات‬ ‫أفضل‬
•‫المشبوهة‬ ‫المرفقات‬ ‫تفتح‬ ‫ال‬
•‫الروابط‬ ‫تتبع‬ ‫ال‬
•‫تحاول‬ ‫ال‬"‫االشتراك‬ ‫إلغاء‬"
Example of email fraud
Example of email fraud
Example of email fraud
Phishing
، ‫مكان‬ ‫كل‬ ً‫ف‬ ‫اإلنترنت‬ ‫مجرمو‬ ‫ٌتربص‬
‫عن‬ ‫وتتخلى‬ ‫عم‬ُ‫الط‬ ‫تأخذ‬ ‫أن‬ ‫أمل‬ ‫على‬
‫الشخصٌة‬ ‫معلوماتك‬.
•‫إلى‬ ‫المستخدمٌن‬ ‫لدفع‬ ‫المخادعة‬ ً‫اإللكترون‬ ‫البرٌد‬ ‫رسائل‬
‫الضارة‬ ‫الروابط‬ ‫فوق‬ ‫النقر‬
•‫الحساسة‬ ‫المعلومات‬ ‫أدخل‬
•‫التطبٌقات‬ ‫بتشغٌل‬ ‫قم‬
•‫الشرعٌة‬ ً‫اإللكترون‬ ‫البرٌد‬ ‫رسائل‬ ‫مع‬ ‫متطابقة‬ ‫تبدو‬
•‫بك‬ ‫الخاص‬ ‫البنك‬
•‫بال‬ ‫باي‬
•‫حكومة‬
•‫المتغٌرات‬
•ً‫الصوت‬ ‫التصٌد‬-‫بصوت‬ ‫ولكن‬ ‫المفهوم‬ ‫نفس‬
•‫النظام‬ ً‫ف‬ ‫لالتصال‬ ‫المستخدم‬ ‫تعلٌمات‬
•‫العادي‬ ‫والبرٌد‬ ‫النصٌة‬ ‫الرسائل‬
Phishing ‫التصيذ‬‫خبدعة‬ ‫برسبئل‬
• Deceptive emails to get users to
click on malicious links
• Enter sensitive information
• Run applications
• Look identical to legitimate emails
• Your Bank
• PayPal
• Government
• Variants
• Vishing – same concept but with
voice
• User instructed to call into system
• Text messages and postal mail
Samples of phishing emails
Samples of phishing emails
•‫حساسة‬ ‫معلومات‬ ‫على‬ ‫الحصول‬ ‫محاولة‬(‫اسم‬
‫االئتمان‬ ‫وبطاقة‬ ‫المرور‬ ‫وكلمة‬ ‫المستخدم‬-‫النهاٌة‬ ً‫ف‬
$$)
•‫بالثقة‬ ‫جدٌر‬ ‫ككٌان‬ ً‫الجنائ‬ ‫التنكر‬(، ‫بنك‬ ، ‫جامعة‬
‫حكومى‬ ‫موقع‬ ‫أو‬ ‫رسالة‬)
•، ‫الفورٌة‬ ‫والرسائل‬ ، ً‫اإللكترون‬ ‫البرٌد‬ ‫عبر‬
‫األخرى‬ ‫اإللكترونٌة‬ ‫واالتصاالت‬( .‫البرٌد‬ ‫عبر‬
‫واالتصاالت‬ ، ‫الفورٌة‬ ‫والرسائل‬ ، ً‫اإللكترون‬
‫األخرى‬ ‫اإللكترونٌة‬)
What is Phishing ‫التصيد‬‫برسائل‬
‫خادعة‬
Attempt to obtain sensitive
information
(username, password, credit card –
ultimately $$)
Criminal Masquerades as a
trustworthy entity
(University, Bank, Canadian
Government)
Via email, instant message, other
electronic comm.
(via email, instant message, other
electronic communication)
•ً‫اإللكترون‬ ‫البرٌد‬ ‫ٌبدو‬/‫ًا‬ٌ‫شرع‬ ‫النص‬(‫توقٌع‬ ‫على‬ ‫ٌحتوي‬
‫رسومات‬ ‫ٌتضمن‬ ‫وقد‬ ، ‫المظهر‬ ‫صالح‬)
•‫رابط‬ ‫على‬ ‫الضغط‬ ‫منك‬ ‫ٌطلب‬(‫التحقق‬ ، ‫المثال‬ ‫سبٌل‬ ‫على‬
‫حسابك‬ ‫تفعٌل‬ ‫أو‬ ‫اإلجراءات‬ ‫بعض‬ ‫اتخاذ‬ ‫أو‬ ‫الحساب‬ ‫من‬)
•‫االعتماد‬ ‫بٌانات‬ ‫بإدخال‬ ‫تقوم‬ ‫مزٌف‬ ‫موقع‬ ‫إلى‬ ‫الرابط‬ ‫ٌنتقل‬
‫بك‬ ‫الخاصة‬(‫أخرى‬ ‫ومعلومات‬)
•‫المفاتٌح‬ ‫مسجل‬ ‫مثل‬ ، ‫ضارة‬ ‫برامج‬ ‫تثبٌت‬ ‫للمرفقات‬ ‫ٌمكن‬
‫الفٌروسات‬ ‫أو‬
•‫هاتفك‬ ‫ٌحتوي‬ ‫المحمول‬ ‫الجهاز‬ ‫من‬ ‫الفورٌة‬ ‫الرسائل‬
‫مكانك‬ ‫حول‬ ‫معلومات‬ ‫على‬ ‫المحمول‬...
How does it Work?Email/text looks legitimate
(contains valid-looking signature, may
include graphics)
Asks you to click on a link
(e.g., verify account, or take some
action)
Link goes to fake website
You enter your credentials (and other info)
Attachments
Can install malware, such as key logger or
virus
IM from mobile device
Your mobile contains information about
where you are…
•‫عناوٌن‬URL‫المزٌفة‬-‫من‬ ‫قرٌبة‬ ‫تبدو‬ ً‫الت‬ ‫الروابط‬
‫المثال‬ ‫سبٌل‬ ‫على‬ ،‫األصلٌة‬ ‫المواقع‬"payapl.com"
•‫عاجل‬ ‫إجراء‬ ‫مطلوب‬/‫فوري‬-‫حسابك‬ ‫صالحٌة‬ ً‫ستنته‬
‫إلخ‬ ،.
•‫االسم‬/‫المثال‬ ‫سبٌل‬ ‫على‬ ، ‫السبر‬ ً‫الرسم‬ ‫التوقٌع‬"‫إدارة‬
‫ماكجٌل‬ ‫جامعة‬"
•‫الشعار‬-‫الشركات‬ ‫مواقع‬ ‫من‬ ‫النسخ‬ ‫سهل‬/‫المؤسسات‬
‫الحقٌقٌة‬
•‫الجائزة‬/‫لـ‬ ‫اختٌارك‬ ‫تم‬ ‫لقد‬ ‫المثال‬ ‫سبٌل‬ ‫على‬ ‫االعتراف‬
...
•‫مثل‬ ‫المحتوى‬ ‫مشاركة‬ ‫تطبٌقات‬OneDrive‫و‬Google
Drive
Watch out for
Fake URLs – Links that look close to legit
sites, e.g. "payapl.com"
Urgent / immediate action required – Your
account will expire, etc.
Official sounding Name/Signature e.g.
"McGill University Admin"
Logo – Easy to copy from real
corporate/institutional websites
Prize / recognition e.g. you have been
selected for …
Content sharing apps e.g., OneDrive,
Google Drive
Watch this video then let us discuss
Common Practice
 Website used to create temporary email accounts
 Click here
 Website used to create fake social media chat, messages
. ..etc
 Click here
Applications to create fake social media chats
Passwords
Today’s world
Do you know
how many passwords
you have?
Why we use passwords
• Authentication is the first line of defense
against bad guys
• Logins and passwords authenticate you to the system
you wish to access
• Never share your password with others!
• If someone using your login credentials does
something illegal or inappropriate, you will be held
responsible
• The stronger the password, the less likely
it will be cracked
• Cracking: Using computers to guess the password
through “brute-force” methods or by going through
entire dictionary lists to guess the password
•‫المخربٌن‬ ‫ضد‬ ‫األول‬ ‫الدفاع‬ ‫خط‬ ً‫ه‬ ‫الدخول‬ ‫بٌانات‬ ‫على‬ ‫المصادقة‬
•‫الذي‬ ‫النظام‬ ‫على‬ ‫المرور‬ ‫وكلمات‬ ‫الدخول‬ ‫تسجٌل‬ ‫عملٌات‬ ‫تصادقك‬
‫إلٌه‬ ‫الوصول‬ ً‫ف‬ ‫ترغب‬
•‫اآلخرٌن‬ ‫مع‬ ‫مرورك‬ ‫كلمة‬ ‫تشارك‬ ‫ال‬!
•‫الخاصة‬ ‫الدخول‬ ‫تسجٌل‬ ‫اعتماد‬ ‫بٌانات‬ ‫باستخدام‬ ‫ما‬ ‫شخص‬ ‫قام‬ ‫إذا‬
‫المسؤولٌة‬ ‫فستتحمل‬ ، ‫مناسب‬ ‫غٌر‬ ‫أو‬ ً‫قانون‬ ‫غٌر‬ ‫شًء‬ ‫بعمل‬ ‫بك‬
•‫اختراقها‬ ‫احتمال‬ ‫قل‬ ، ‫أقوى‬ ‫المرور‬ ‫كلمة‬ ‫كانت‬ ‫كلما‬
•‫االختراق‬:‫خالل‬ ‫من‬ ‫المرور‬ ‫كلمة‬ ‫لتخمٌن‬ ‫الكمبٌوتر‬ ‫أجهزة‬ ‫استخدام‬
‫أسالٌب‬"‫الغاشمة‬ ‫القوة‬"‫بالكامل‬ ‫القاموس‬ ‫قوائم‬ ‫تصفح‬ ‫خالل‬ ‫من‬ ‫أو‬
‫المرور‬ ‫كلمة‬ ‫لتخمٌن‬
Strong password
• Strong passwords should be:
• A minimum of 8 characters in length
• Include numbers, symbols, upper and lowercase letters (!,1,a,B)
• Not include personal information, such as your name, previously used passwords,
anniversary dates, pet names, or credit-union related words
Examples:
Strong Password: H81h@x0rZ -Micr@$@ft234
Weak Password: jack1
Pass Phrase: 33PurpleDoves@Home? - Long, complex, easy to recall
What are the dangers?
‫الهوٌة‬ ‫سرقة‬
ً‫المال‬ ‫االحتٌال‬
‫ابتزاز‬
‫انتقام‬
Identity theft
Financial fraud
Extortion
Revenge
•‫الفدٌة‬ ‫برامج‬
•‫البٌانات‬ ‫سرقة‬
•ً‫الصناع‬ ‫التجسس‬
•‫المالٌة‬ ‫الخسائر‬
Ransomware
Data theft
Industrial espionage
Financial losses
Know your enemy
•‫قاموس‬
•‫الغاشمة‬ ‫القوة‬
•‫اجتماعٌة‬ ‫هندسة‬
•‫التصٌد‬
Dictionary
Brute-force
Social engineering
phishing
Common mistakes
•‫جدا‬ ‫قصٌر‬
•‫جدا‬ ‫شائعة‬
•‫جدا‬ ‫قدٌم‬
•‫التخمٌن‬ ‫سهل‬
•ً‫إفتراض‬
Too short
Too common
Too old
Easy to guess
Default
•‫استخدامها‬ ‫معاد‬
•‫سًء‬ ‫بشكل‬ ‫تخزٌنها‬
•‫مؤمن‬ ‫غٌر‬ ‫جهاز‬
•‫مشترك‬
Reused
Poorly stored
Unsecured Device
shared
Use a long password:
12 characters or more
Use a combination of:
Lowercase letters
Uppercase letters
Numbers
Symbols
don’t use a common password:
Remember Spaceballs?
How you can protect yourself
don’t base it on personal information:
Social security number
Name of a relative/pet
Favorite things (book, team, etc.)
Change the Default
How you can protect yourself
Never reuse a password
Store it securely:
Don’t write it down
Secure your Device
Never share a password
How you can protect yourself
How you can protect yourself
The math behind password length & complexity
Lowercase letters = 26 possibilities
Uppercase letters = 26 possibilities
Numbers = 10 possibilities
Special characters = 33 possibilities
Using them all provides 95 possibilities (26+26+10+33)
for each character in a password
(Also, there are 65,000 different Unicode characters…)
How you can protect yourself
8 character password with lowercase only: 268 = 208,827,064,576
For fun:
8 character password with Unicode characters:
650008 = 318,644,812,890,625,000,000,000,000,000,000,000,000 (3.18 x 1038)
The math behind password length & complexity
2 character password with all possibilities: 95*95 = 9025
8 character password with all possibilities: 958 = 6,634,204,312,890,625
2 character password with lowercase only: 26*26 = 676
Test your password
https://password.kaspersky.com/
http://www.passwordmeter.com/
https://www.grc.com/haystack.htm
How you can protect yourself
Passwordmeter.com
Use a password manager
Helps generating secure passwords
No need to remember them all
Work across platforms
Cloud based or desktop
Many are free
How you can protect yourself
Privacy & Social Media
TodayThe good ol’
days
Vs
What are the dangers?
Identity theft
Location tracking &
sharing apps
Social Engineering
Phishing
Know your ‘Legal’ enemy
How much money did Facebook
make from you in Q1’2019?
3 billion Monthly Active Users
98% revenue from Advertising
In US and Canada, average
revenue per user: $39.38
Common mistakes
Provide your personal info
Post when you aren’t home
Ignore privacy settings
Use easy-to-guess password
How you can protect yourself
You
Be mindful about what you share
Think twice before clicking links & installing apps
Don’t accept unknown connection / friend requests
Avoid third party applications
The result ‫النتيجة‬
How you can protect yourself
Your account(s)
Check your privacy settings
Practice password hygiene
Secure with two-Factor Authentication
https://twofactorauth.org/
How you can protect yourself
Your device(s)
Lock it
Keep OS, browser & software updated
Antivirus
Socialization Safety Guidelines:
Improve your privacy and security settings
Facebook: https://www.facebook.com/settings?tab=privacy
Snapchat: https://support.snapchat.com/en-US/a/privacy-settings
Google: https://myaccount.google.com/intro/privacycheckup
LinkedIn: https://www.linkedin.com/psettings/privacy
Twitter: https://twitter.com/settings/safety
Apple: https://www.apple.com/ca/privacy/manage-your-privacy/
Microsoft: https://account.microsoft.com/account/privacy
Encryption ‫التشفير‬
Encryption
 Encryption allows confidential or sensitive data to be scrambled when stored on media or
transmitted over public networks (such as the Internet)
 Many services, such as web and email, use unencrypted protocols by default
 Your messages can be read by anyone who intercepts the message
 For example, think of shouting a secret to one person in a crowded room of people
 Always use encryption when storing or transferring confidential material
 For Business use - Ask IT for assistance with encryption
 For Personal use - Free programs, such as TrueCrypt, allow you to encrypt hard drives, flash
drives, CompactFlash/SD cards and more
 When purchasing online or using online banking, ensure that you are using an encrypted
connection
 Secure URLs begin with HTTPS://
 Most browsers notify you that you are entering an encrypted transmission – be very cautious of
warnings!
 Padlock in bottom, right-hand corner of browser
Digital Threats: Protect Yourself
 Never disable anti-virus programs or your firewall
 This causes a lapse in security
 Never download documents or files without the express permission of a supervisor, or unless
otherwise stated in IT Policies
 Could contain malware/spyware, viruses, or Trojans
 Don’t open unexpected email attachments
 Make sure it’s a file you were expecting and from someone you know
 Never share login or password information
 Anyone with your credentials can masquerade as you!
 Do not ever send confidential information or customer data over unencrypted channels
 Email
 Instant Messaging
 If you suspect you have been a victim of fraud, theft, or a hacking attempt, notify the IT
Department immediately!
Social Engineering
 People are often the weakest links
 All the technical controls in the world are worthless if you share
your password or hold the door open
 Attempts to gain
 Confidential information or credentials
 Access to sensitive areas or equipment
 Can take many forms
 In person
 Email
 Phone
 Postal Mail
One Man’s Trash…
 Dumpster diving is the act of sorting through garbage to find
documents and information that has been improperly discarded
 Customer information
 Internal records
 Applications
 Some things we’ve found:
 Credit cards
 Technical documentation
 Backup tapes
 Loan applications
 Floor plans/schematics
 Copies of identification
 Lots of banana peels and coffee cups
Your Workstation
 Access to a personal computer allows you to complete work more efficiently
 Email
 Word processing software
 Online resources
 Someone with access to your workstation now has access to your resources:
 Databases
 Customer records
 Personal data
 Email
 Lock your workstation when you leave – even if you will be gone
briefly!
 Critical Data can be stolen in a matter of seconds
Windows Key + L lock your computer
This will prevent somebody from “volunteering” you for the lunch tab tomorrow!
Wireless
• Common Attacks
• WEP Cracking
• Sniffing
• Fake Access Points
• Beware of the WiFi Pineapple!
• Best Practices
• WPA/WPA2
• VPN
Social Networking
 Sites that allow users to post profiles, pictures and group together by similar interests
 MySpace
 Facebook
 Livejournal
 Some sites “enforce” age limitations, but no verification process exists to determine a
user’s actual age
 This means there are no barriers in place to prevent children from registering
 Often lists personal details like name, age, location, pictures or place of business
 Photos entice stalkers
 Don’t list personal details on public websites
 Popular with teenagers and young adults
 False sense of anonymity – anyone can access this information
 College admissions offices and employers are now utilizing social networking websites to
perform background checks
Portable Devices
 Easy to lose, easy to steal
 Always keep them within sight, or lock away when not in use
 Use caution when in crowded areas
 PacSafe bags are cost-effective, great ways to secure your mobile computing devices
 http://www.pacsafe.com
 Report lost or stolen items immediately
 Sometimes carry confidential information
 Use strong passwords!
 Require the device to lock after a period of inactivity
 Use encryption
 TrueCrypt: http://www.truecrypt.org
 Always cleanly wipe portable devices before disposal
 Eraser: http://www.heidi.ie/eraser/
 Usually very valuable – you don’t want to pay for a new one!
 As expensive as devices these devices are, the information on them is often worth much more.
 Your daughter’s piano recital pictures, your tax returns or bank statements, or that dissertation
or thesis you’ve been working on for a year!
Personal Protection
 Always use antivirus, anti-spyware, and firewall
 Educate your family on the dangers of the Internet
 Stalkers, sexual predators, crooks and con-men have access to computers
too
 Be selective in the sites you visit
 Some downloads have Adware or Spyware bundled with the file
 Monitor children’s internet usage
 Encrypt stored data and dispose of data properly
Top Ten Tips
 Never write down or share your passwords
 Don’t click on links or open attachments in email
 Use antivirus, anti-spyware, and firewall and don’t disable
 Don’t send sensitive data over unencrypted channels
 Dispose of data properly
 Cross-cut shredding
 Multiple-wipe or physically destroy hard drives
Top Ten Tips
 Don’t run programs from un-trusted sources
 Lock your machine if you step away
 Properly secure information
 Safes, locked drawers for physical documents
 Encryption for digital information
 Verify correct person, website, etc.
 If something seems too good to be true, it probably is
‫تعرضى‬ ‫حال‬ ‫فى‬ ‫أتصرف‬ ‫كيف‬
‫الرقمية‬ ‫هويتى‬ ‫لسرقة‬
Victim of Identity Theft?
• Place a fraud alert on your credit reports
• Close the accounts you know or believe to have been compromised
• File a complaint with the Federal Trade Commission
• File a report with your local police
• For more information, visit the FTC’s website:
http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
https://www.egcert.eg/
Further Education
 Microsoft:
 http://www.microsoft.com/protect/fraud/default.aspx
 CERT:
 http://www.cert.org/tech_tips/home_networks.html
 McAfee:
 http://home.mcafee.com/AdviceCenter/Default.aspx
 US CERT:
 http://www.us-cert.gov/cas/tips/
 Trace Security
 http://tracesecurity.com (videos on lower-right)
 Wikipedia and Google
 Research is fun!
Alerts and Advisories
 US CERT:
 http://www.us-cert.gov/
 Microsoft:
 http://www.microsoft.com/security/
 Security Focus:
 http://www.securityfocus.com/
 PayPal, your bank, and other popular websites will typically address scams or
security problems on their home page
‫وإستفسبرات‬ ‫أسئلة‬ ‫إلنصبتكم‬ ‫شكرا‬
Thank you

Weitere ähnliche Inhalte

Ähnlich wie م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوماتك فى العصر الرقمى

An Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsAn Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsSophiaJohnson39
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Vibrant Event
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 

Ähnlich wie م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوماتك فى العصر الرقمى (20)

An Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsAn Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogs
 
Cyber security
Cyber securityCyber security
Cyber security
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

Mehr von Egyptian Engineers Association

المحاضرة رقم 209 دكتور / يسرا الدسوقي عنوان المحاضرة Data Driven Management
 المحاضرة رقم 209 دكتور / يسرا الدسوقي  عنوان المحاضرة  Data Driven Management المحاضرة رقم 209 دكتور / يسرا الدسوقي  عنوان المحاضرة  Data Driven Management
المحاضرة رقم 209 دكتور / يسرا الدسوقي عنوان المحاضرة Data Driven ManagementEgyptian Engineers Association
 
المحاضرة رقم 208 مهندس / محمد ماجد حجازي عنوان المحاضرة Performance Measur...
 المحاضرة رقم 208 مهندس / محمد ماجد حجازي  عنوان المحاضرة  Performance Measur... المحاضرة رقم 208 مهندس / محمد ماجد حجازي  عنوان المحاضرة  Performance Measur...
المحاضرة رقم 208 مهندس / محمد ماجد حجازي عنوان المحاضرة Performance Measur...Egyptian Engineers Association
 
مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...
مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...
مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة عنوان المحاضرة Establish an...
تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة  عنوان المحاضرة Establish an...تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة  عنوان المحاضرة Establish an...
تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة عنوان المحاضرة Establish an...Egyptian Engineers Association
 
مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...
مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...
مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...Egyptian Engineers Association
 
#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي عنوان المحاضرة أمن المعلوم...
#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي  عنوان المحاضرة أمن المعلوم...#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي  عنوان المحاضرة أمن المعلوم...
#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي عنوان المحاضرة أمن المعلوم...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين عنوان المحاضرة "The Era of Fr...
تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين  عنوان المحاضرة "The Era of Fr...تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين  عنوان المحاضرة "The Era of Fr...
تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين عنوان المحاضرة "The Era of Fr...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...
تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...
تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...
تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...
تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة عنوان المحاضرة " Supply Cha...
تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة  عنوان المحاضرة " Supply Cha...تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة  عنوان المحاضرة " Supply Cha...
تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة عنوان المحاضرة " Supply Cha...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير عنوان المحاضرة "إستراتيجيات...
تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير  عنوان المحاضرة "إستراتيجيات...تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير  عنوان المحاضرة "إستراتيجيات...
تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير عنوان المحاضرة "إستراتيجيات...Egyptian Engineers Association
 
المحاضرة رقم 189 المهندس / محمد العربي بعنوان "Digital Disruption Act- From...
 المحاضرة رقم 189 المهندس / محمد العربي  بعنوان "Digital Disruption Act- From... المحاضرة رقم 189 المهندس / محمد العربي  بعنوان "Digital Disruption Act- From...
المحاضرة رقم 189 المهندس / محمد العربي بعنوان "Digital Disruption Act- From...Egyptian Engineers Association
 
#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...
#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...
#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...Egyptian Engineers Association
 
ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...
ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...
ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...Egyptian Engineers Association
 
ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...
ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...
ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...Egyptian Engineers Association
 
تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي بعنوان "Between Environme...
تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي  بعنوان "Between Environme...تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي  بعنوان "Between Environme...
تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي بعنوان "Between Environme...Egyptian Engineers Association
 
#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي بعنوان "مبادرة الت...
#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي  بعنوان "مبادرة الت...#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي  بعنوان "مبادرة الت...
#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي بعنوان "مبادرة الت...Egyptian Engineers Association
 
المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية بعنوان "اعتماد المتحف المصري ا...
 المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية  بعنوان "اعتماد المتحف المصري ا... المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية  بعنوان "اعتماد المتحف المصري ا...
المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية بعنوان "اعتماد المتحف المصري ا...Egyptian Engineers Association
 
المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ...
 المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ... المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ...
المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ...Egyptian Engineers Association
 

Mehr von Egyptian Engineers Association (20)

المحاضرة رقم 209 دكتور / يسرا الدسوقي عنوان المحاضرة Data Driven Management
 المحاضرة رقم 209 دكتور / يسرا الدسوقي  عنوان المحاضرة  Data Driven Management المحاضرة رقم 209 دكتور / يسرا الدسوقي  عنوان المحاضرة  Data Driven Management
المحاضرة رقم 209 دكتور / يسرا الدسوقي عنوان المحاضرة Data Driven Management
 
المحاضرة رقم 208 مهندس / محمد ماجد حجازي عنوان المحاضرة Performance Measur...
 المحاضرة رقم 208 مهندس / محمد ماجد حجازي  عنوان المحاضرة  Performance Measur... المحاضرة رقم 208 مهندس / محمد ماجد حجازي  عنوان المحاضرة  Performance Measur...
المحاضرة رقم 208 مهندس / محمد ماجد حجازي عنوان المحاضرة Performance Measur...
 
مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...
مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...
مبادرة #تواصل_تطوير المحاضرة رقم 205 م / محمود السعود استشاري إدارة مكاتب الم...
 
تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة عنوان المحاضرة Establish an...
تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة  عنوان المحاضرة Establish an...تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة  عنوان المحاضرة Establish an...
تواصل_تطوير المحاضرة رقم 203 مستشار / محمد خليفة عنوان المحاضرة Establish an...
 
مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...
مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...
مبادرة #تواصل_تطوير المحاضرة رقم 200 أ. د/ هانىء محمود النقراشي عضو المجلس ال...
 
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب  عنوان المحاضرة Enterprise A...
تواصل_تطوير المحاضرة رقم 199 مهندس / محمود الديب عنوان المحاضرة Enterprise A...
 
#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي عنوان المحاضرة أمن المعلوم...
#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي  عنوان المحاضرة أمن المعلوم...#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي  عنوان المحاضرة أمن المعلوم...
#تواصل_تطوير المحاضرة رقم 197 مهندس / محمد الشامي عنوان المحاضرة أمن المعلوم...
 
تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين عنوان المحاضرة "The Era of Fr...
تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين  عنوان المحاضرة "The Era of Fr...تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين  عنوان المحاضرة "The Era of Fr...
تواصل_تطوير المحاضرة رقم 195 مهندس / أحمد أمين عنوان المحاضرة "The Era of Fr...
 
تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...
تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...
تواصل_تطوير المحاضرة رقم 194 دكتور / هشام ندا المدير الدولي لقسم الكباري بشرك...
 
تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...
تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...
تواصل_تطوير المحاضرة رقم 193 المهندس / أكرم النجار استشاري إدارة المشاريع عنو...
 
تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة عنوان المحاضرة " Supply Cha...
تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة  عنوان المحاضرة " Supply Cha...تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة  عنوان المحاضرة " Supply Cha...
تواصل_تطوير المحاضرة رقم 191 المهندس / تامر فودة عنوان المحاضرة " Supply Cha...
 
تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير عنوان المحاضرة "إستراتيجيات...
تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير  عنوان المحاضرة "إستراتيجيات...تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير  عنوان المحاضرة "إستراتيجيات...
تواصل_تطوير المحاضرة رقم 190 المهندس / أشرف نصير عنوان المحاضرة "إستراتيجيات...
 
المحاضرة رقم 189 المهندس / محمد العربي بعنوان "Digital Disruption Act- From...
 المحاضرة رقم 189 المهندس / محمد العربي  بعنوان "Digital Disruption Act- From... المحاضرة رقم 189 المهندس / محمد العربي  بعنوان "Digital Disruption Act- From...
المحاضرة رقم 189 المهندس / محمد العربي بعنوان "Digital Disruption Act- From...
 
#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...
#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...
#تواصل_تطوير المحاضرة رقم 188 الاستاذ الدكتور / أكرم حسن استاذ واستشاري إدارة...
 
ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...
ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...
ilovepdf_#تواصل_تطوير المحاضرة رقم 187 أستاذ دكتور / مدحت كمال عبدالله عنوان ...
 
ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...
ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...
ilovepdf_ المحاضرة رقم 186 دكتور / اشرف حمدان بمشاركة الاستاذة /سارة سالم عنو...
 
تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي بعنوان "Between Environme...
تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي  بعنوان "Between Environme...تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي  بعنوان "Between Environme...
تواصل_تطوير المحاضرة رقم 185 دكتور / هبة محروس علي بعنوان "Between Environme...
 
#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي بعنوان "مبادرة الت...
#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي  بعنوان "مبادرة الت...#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي  بعنوان "مبادرة الت...
#تواصل_تطوير المحاضرة رقم 184 دكتور / شيماء محمد الشرقاوي بعنوان "مبادرة الت...
 
المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية بعنوان "اعتماد المتحف المصري ا...
 المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية  بعنوان "اعتماد المتحف المصري ا... المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية  بعنوان "اعتماد المتحف المصري ا...
المحاضرة رقم 183 الاستاذ الدكتور / طارق عطية بعنوان "اعتماد المتحف المصري ا...
 
المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ...
 المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ... المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ...
المحاضرة رقم 182 الدكتور / أسامة أبوالمكارم مستشار التغيير والابداع المؤسسي ...
 

Kürzlich hochgeladen

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 

Kürzlich hochgeladen (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 

م.50-مبادرة#تواصل_تطوير-م.أشرف صلاح الدين إبراهيم-كيف تبقى آمناً وتحمى معلوماتك فى العصر الرقمى

  • 1.
  • 2. ‫فى‬ ‫وهويتك‬ ‫معلوماتك‬ ‫وتحمى‬ ‫آمنا‬ ‫تبقى‬ ‫كيف‬ ‫الرقمى‬ ‫العصر‬ ‫مهندس‬:‫الدٌن‬ ‫صالح‬ ‫أشرف‬ ‫وكندا‬ ‫أمرٌكا‬ ‫فى‬ ‫المصرٌٌن‬ ‫العلماء‬ ‫رابطة‬ ‫عضو‬ ‫الرقمى‬ ‫والتحول‬ ‫المعلومات‬ ‫أمن‬ ‫إستشارى‬
  • 3. Agenda • What is information security • Why should we care • Modern threads • Phishing • Password • How you can protect yourself • Privacy and social media • How you can protect yourself online • Encryption • Social engineering • Practical session
  • 5. SECURITY VISION FOR THE 2020S ‫بأ‬ ‫خبصة‬ ‫واضحة‬ ‫رؤية‬ ‫لىضع‬ ‫بحبجة‬ ‫نحن‬ ‫لمبرا‬‫المعلىمبت‬ ‫من‬ Virtually everything is on the table as we enter a new decade that will be defined by global innovation and technology breakthroughs. Companies and governments worldwide are jockeying for position to define the new technology landscape. ‫مع‬ ‫واقعا‬ ‫أصبح‬ ‫شًء‬ ‫كل‬ ‫فى‬ ‫رقمٌا‬ ‫التحول‬ ‫خالل‬ ‫من‬ ‫تحدٌده‬ ‫سٌتم‬ ‫ًا‬‫د‬ٌ‫جد‬ ‫ًا‬‫د‬‫عق‬ ‫دخولنا‬ ‫الحدٌثة‬ ‫التقنٌات‬ ‫ووتوغل‬ ً‫العالم‬ ‫االبتكار‬ ‫التكنولوجٌة‬. ‫أنحاء‬ ‫جمٌع‬ ً‫ف‬ ‫والحكومات‬ ‫الشركات‬ ‫وتنافس‬ ‫المشهد‬ ‫لتحدٌد‬ ‫موقع‬ ‫على‬ ‫للحصول‬ ‫العالم‬ ‫الجدٌد‬ ً‫التكنولوج‬.
  • 6. What is Information Security? • Protects the confidentiality, integrity, and availability of important data • Controls can be Physical or Technical • Locks and safes – encryption and passwords • Technology has made our lives easier in many ways, but this convenience has also increased our exposure to threats • Thieves and attackers can also work more effectively •‫الهامة‬ ‫البٌانات‬ ‫وتوافر‬ ‫وسالمة‬ ‫سرٌة‬ ً‫ٌحم‬ •‫فنٌة‬ ‫أو‬ ‫مادٌة‬ ‫التحكم‬ ‫عناصر‬ ‫تكون‬ ‫أن‬ ‫ٌمكن‬ •‫وخزائن‬ ‫أقفال‬-‫مرور‬ ‫وكلمات‬ ‫تشفٌر‬ •، ‫كثٌرة‬ ‫نواح‬ ‫من‬ ‫أسهل‬ ‫حٌاتنا‬ ‫التكنولوجٌا‬ ‫جعلت‬ ‫للتهدٌدات‬ ‫تعرضنا‬ ‫من‬ ‫ا‬ً‫ض‬ٌ‫أ‬ ‫زادت‬ ‫الراحة‬ ‫هذه‬ ‫ولكن‬ •‫والمهاجمٌن‬ ‫اللصوص‬ ‫مكنت‬ ‫التكنولوجٌا‬ ‫وسرعة‬ ‫فعالٌة‬ ‫أكثر‬ ‫بشكل‬ ‫العمل‬ ‫ا‬ً‫ض‬ٌ‫أ‬ ‫والمخربٌن‬
  • 7. Why Should We Care? • Theft is becoming increasingly digital • Ease of identity, account, and credential theft makes everyone an ideal target • Applies to organizations that house such data or individuals themselves • Compromise may affect customers, coworkers, friends, and family •‫فى‬ ‫اإللكترونٌة‬ ‫والجرائم‬ ‫السرقات‬ ‫أصبحت‬ ‫مستمر‬ ‫تزاٌد‬ •‫وبٌانات‬ ‫والحساب‬ ‫الهوٌة‬ ‫سرقة‬ ‫سهولة‬ ‫ا‬ًٌ‫مثال‬ ‫ا‬ً‫ف‬‫هد‬ ‫الجمٌع‬ ‫تجعل‬ ‫اإلئتمان‬ ‫بطاقات‬ •‫هذه‬ ‫مثل‬ ‫تضم‬ ً‫الت‬ ‫المنظمات‬ ‫على‬ ‫ٌنطبق‬ ‫هذا‬ ‫أنفسهم‬ ‫األفراد‬ ‫أو‬ ‫البٌانات‬ •‫وزمالء‬ ‫العمالء‬ ‫على‬ ‫ٌؤثر‬ ‫قد‬ ‫التأثٌر‬ ‫هذا‬ ‫والعائلة‬ ‫واألصدقاء‬ ‫العمل‬
  • 8. Historical Perspective • Many historical methods of monetary theft • Stagecoach Robberies • Train Hijacking • Armed Assault • “Inside Jobs” • Losses from tens of thousands of dollars, up into the millions • Today, most banks do not house “millions of dollars” on- premises • Liquid economy • Data is the new commodity
  • 9. Modern Threats - ‫الحذيثة‬ ‫التهذيبت‬ • Viruses, Trojans, Worms, and Root Kits • Adware/Spyware • Spam, Phishing, and other Email attacks • Identity Theft • Social Engineering ‫ومجموعات‬ ‫والدٌدان‬ ‫طروادة‬ ‫وأحصنة‬ ‫الفٌروسات‬ ‫نفسه‬ ‫الكود‬ ‫على‬ ‫العمل‬Root kits ‫المزعجة‬ ‫الموجهة‬ ‫اإلعالنات‬/‫التجسس‬ ‫برامج‬ ً‫اإللكترون‬ ‫البرٌد‬ ‫وهجمات‬ ‫والتصٌد‬ ً‫العشوائ‬ ‫البرٌد‬ ‫األخرى‬ ‫الهوٌة‬ ‫سرقة‬ ‫اجتماعٌة‬ ‫هندسة‬
  • 10. How do we do It
  • 11. Frauds committed internally and externally across Europe European Economic Crime Survey 2019 PriceWaterhouseCoopers External fraud 41%Internal fraud 59% External fraud 41%Internal fraud 59%
  • 13. Viruses • Viruses are malicious programs that hide themselves on your computer • Usually very small • May have access to view or delete your information • Often contracted through a website, email, or p2p applications • May destroy your documents, format your hard drive, send emails from your computer or a variety of other nefarious actions – it just depends on the strain! • Viruses are created for the sole purpose of causing trouble • Taking revenge, political statements, etc… • Most modern viruses are financially motivated – may hold data for ransom or steal information Just like real viruses, computer viruses spread to others… Other computers on the network Sending out email replications of itself Always use anti-virus protection! Famous viruses: Love Bug Code Red Ransamware
  • 14. Worms, Trojans, and Root Kits • Trojan appears as a legitimate program • Possible to repackage Trojans with legitimate programs • Worms are self-replicating • Typically propagate through un-patched systems • Blaster • Sasser • Root Kits • Low level programs that embed themselves in the operating system itself • Difficult if not impossible to detect •ً‫شرع‬ ‫كبرنامج‬ ‫طروادة‬ ‫حصان‬ ‫ٌظهر‬ •‫البرامج‬ ‫مع‬ ‫طروادة‬ ‫أحصنة‬ ‫حزم‬ ‫إعادة‬ ‫الممكن‬ ‫من‬ ‫الشرعٌة‬ •‫التكاثر‬ ‫ذاتٌة‬ •‫مصححة‬ ‫غٌر‬ ‫أنظمة‬ ‫خالل‬ ‫من‬ ‫عادة‬ ‫ٌنتشر‬ •‫مكبر‬ •‫ساسر‬ •‫التشغٌل‬ ‫نظام‬ ‫مستوى‬ ‫على‬ ‫تعمل‬ ‫خبٌثة‬ ‫برامج‬ •‫نظام‬ ً‫ف‬ ‫نفسها‬ ‫تدمج‬ ً‫الت‬ ‫المنخفض‬ ‫المستوى‬ ‫ذات‬ ‫البرامج‬ ‫نفسه‬ ‫التشغٌل‬ •‫اكتشافه‬ ‫المستحٌل‬ ‫من‬ ‫ٌكن‬ ‫لم‬ ‫إن‬ ‫صعب‬
  • 15. Adware/Spyware •‫جمع‬ ‫أو‬ ‫إنتباهك‬ ‫لجذب‬ ‫الضارة‬ ‫البرامج‬ ‫بعض‬ ‫تصمٌم‬ ‫تم‬ ‫الحاسوبٌة‬ ‫عاداتك‬ ‫حول‬ ‫معلومات‬ •‫تزورها؟‬ ً‫الت‬ ‫المواقع‬ ‫ما‬ •‫وقت؟‬ ‫باي‬ ‫متً؟‬ •‫تشتري؟‬ ‫ماذا‬ •‫الموقع؟‬ ‫تصفح‬ ‫تستغرق‬ ‫الوقت‬ ‫من‬ ‫كم‬ •‫بك؟‬ ‫الخاص‬ ‫الكمبٌوتر‬ ‫جهاز‬ ‫تستخدم‬ ‫ماذا‬ ‫أو‬ ‫كٌف‬ •‫مثال‬:Sony "Root Kit" •‫مخصص‬"‫التسوٌق‬ ‫ألغراض‬" •‫برامج‬ ‫مع‬ ‫شائع‬ ‫بشكل‬ ‫تثبٌته‬ ‫ٌتم‬p2p‫مجانٌة‬ ‫برامج‬ ‫أو‬ •‫ضرر‬ ‫أي‬ ‫ٌسبب‬ ‫وال‬ ‫إزعاج‬ ‫مصدر‬ ‫فقط‬ ‫ٌكون‬ ‫قد‬ •‫اإلعالنٌة؟‬ ‫البرامج‬ ‫بجانب‬ ‫تثبٌتها‬ ‫ٌمكن‬ ً‫الت‬ ‫األخرى‬ ‫األشٌاء‬ ‫ما‬ • Some malware is designed to solicit you, or gather information about your computing habits • Which websites you visit? • When? What times? • What are you purchasing? • How long do spend surfing the website? • How or what do you use your computer for? • Example: Sony “Root Kit” • Intended for “Marketing Purposes” • Commonly installed with p2p or free software • May be only an annoyance and cause no harm • What else may be installed alongside adware?
  • 16. Email • Common Attacks • Phishing • Malicious attachments • Hoaxes • Spam • Scams (offers too good to be true) • Best Practices • Don’t open suspicious attachments • Don’t follow links • Don’t attempt to “unsubscribe” •‫الشائعة‬ ‫الهجمات‬ •‫التصٌد‬ •‫الخبٌثة‬ ‫المرفقات‬ •‫خدع‬ •‫مؤذي‬ ‫برٌد‬ •‫الخداع‬(‫ٌصعب‬ ‫لدرجة‬ ‫ا‬ً‫د‬‫ج‬ ‫جٌدة‬ ‫عروض‬ ‫تصدٌقها‬) •‫الممارسات‬ ‫أفضل‬ •‫المشبوهة‬ ‫المرفقات‬ ‫تفتح‬ ‫ال‬ •‫الروابط‬ ‫تتبع‬ ‫ال‬ •‫تحاول‬ ‫ال‬"‫االشتراك‬ ‫إلغاء‬"
  • 20. Phishing ، ‫مكان‬ ‫كل‬ ً‫ف‬ ‫اإلنترنت‬ ‫مجرمو‬ ‫ٌتربص‬ ‫عن‬ ‫وتتخلى‬ ‫عم‬ُ‫الط‬ ‫تأخذ‬ ‫أن‬ ‫أمل‬ ‫على‬ ‫الشخصٌة‬ ‫معلوماتك‬.
  • 21. •‫إلى‬ ‫المستخدمٌن‬ ‫لدفع‬ ‫المخادعة‬ ً‫اإللكترون‬ ‫البرٌد‬ ‫رسائل‬ ‫الضارة‬ ‫الروابط‬ ‫فوق‬ ‫النقر‬ •‫الحساسة‬ ‫المعلومات‬ ‫أدخل‬ •‫التطبٌقات‬ ‫بتشغٌل‬ ‫قم‬ •‫الشرعٌة‬ ً‫اإللكترون‬ ‫البرٌد‬ ‫رسائل‬ ‫مع‬ ‫متطابقة‬ ‫تبدو‬ •‫بك‬ ‫الخاص‬ ‫البنك‬ •‫بال‬ ‫باي‬ •‫حكومة‬ •‫المتغٌرات‬ •ً‫الصوت‬ ‫التصٌد‬-‫بصوت‬ ‫ولكن‬ ‫المفهوم‬ ‫نفس‬ •‫النظام‬ ً‫ف‬ ‫لالتصال‬ ‫المستخدم‬ ‫تعلٌمات‬ •‫العادي‬ ‫والبرٌد‬ ‫النصٌة‬ ‫الرسائل‬ Phishing ‫التصيذ‬‫خبدعة‬ ‫برسبئل‬ • Deceptive emails to get users to click on malicious links • Enter sensitive information • Run applications • Look identical to legitimate emails • Your Bank • PayPal • Government • Variants • Vishing – same concept but with voice • User instructed to call into system • Text messages and postal mail
  • 24. •‫حساسة‬ ‫معلومات‬ ‫على‬ ‫الحصول‬ ‫محاولة‬(‫اسم‬ ‫االئتمان‬ ‫وبطاقة‬ ‫المرور‬ ‫وكلمة‬ ‫المستخدم‬-‫النهاٌة‬ ً‫ف‬ $$) •‫بالثقة‬ ‫جدٌر‬ ‫ككٌان‬ ً‫الجنائ‬ ‫التنكر‬(، ‫بنك‬ ، ‫جامعة‬ ‫حكومى‬ ‫موقع‬ ‫أو‬ ‫رسالة‬) •، ‫الفورٌة‬ ‫والرسائل‬ ، ً‫اإللكترون‬ ‫البرٌد‬ ‫عبر‬ ‫األخرى‬ ‫اإللكترونٌة‬ ‫واالتصاالت‬( .‫البرٌد‬ ‫عبر‬ ‫واالتصاالت‬ ، ‫الفورٌة‬ ‫والرسائل‬ ، ً‫اإللكترون‬ ‫األخرى‬ ‫اإللكترونٌة‬) What is Phishing ‫التصيد‬‫برسائل‬ ‫خادعة‬ Attempt to obtain sensitive information (username, password, credit card – ultimately $$) Criminal Masquerades as a trustworthy entity (University, Bank, Canadian Government) Via email, instant message, other electronic comm. (via email, instant message, other electronic communication)
  • 25. •ً‫اإللكترون‬ ‫البرٌد‬ ‫ٌبدو‬/‫ًا‬ٌ‫شرع‬ ‫النص‬(‫توقٌع‬ ‫على‬ ‫ٌحتوي‬ ‫رسومات‬ ‫ٌتضمن‬ ‫وقد‬ ، ‫المظهر‬ ‫صالح‬) •‫رابط‬ ‫على‬ ‫الضغط‬ ‫منك‬ ‫ٌطلب‬(‫التحقق‬ ، ‫المثال‬ ‫سبٌل‬ ‫على‬ ‫حسابك‬ ‫تفعٌل‬ ‫أو‬ ‫اإلجراءات‬ ‫بعض‬ ‫اتخاذ‬ ‫أو‬ ‫الحساب‬ ‫من‬) •‫االعتماد‬ ‫بٌانات‬ ‫بإدخال‬ ‫تقوم‬ ‫مزٌف‬ ‫موقع‬ ‫إلى‬ ‫الرابط‬ ‫ٌنتقل‬ ‫بك‬ ‫الخاصة‬(‫أخرى‬ ‫ومعلومات‬) •‫المفاتٌح‬ ‫مسجل‬ ‫مثل‬ ، ‫ضارة‬ ‫برامج‬ ‫تثبٌت‬ ‫للمرفقات‬ ‫ٌمكن‬ ‫الفٌروسات‬ ‫أو‬ •‫هاتفك‬ ‫ٌحتوي‬ ‫المحمول‬ ‫الجهاز‬ ‫من‬ ‫الفورٌة‬ ‫الرسائل‬ ‫مكانك‬ ‫حول‬ ‫معلومات‬ ‫على‬ ‫المحمول‬... How does it Work?Email/text looks legitimate (contains valid-looking signature, may include graphics) Asks you to click on a link (e.g., verify account, or take some action) Link goes to fake website You enter your credentials (and other info) Attachments Can install malware, such as key logger or virus IM from mobile device Your mobile contains information about where you are…
  • 26. •‫عناوٌن‬URL‫المزٌفة‬-‫من‬ ‫قرٌبة‬ ‫تبدو‬ ً‫الت‬ ‫الروابط‬ ‫المثال‬ ‫سبٌل‬ ‫على‬ ،‫األصلٌة‬ ‫المواقع‬"payapl.com" •‫عاجل‬ ‫إجراء‬ ‫مطلوب‬/‫فوري‬-‫حسابك‬ ‫صالحٌة‬ ً‫ستنته‬ ‫إلخ‬ ،. •‫االسم‬/‫المثال‬ ‫سبٌل‬ ‫على‬ ، ‫السبر‬ ً‫الرسم‬ ‫التوقٌع‬"‫إدارة‬ ‫ماكجٌل‬ ‫جامعة‬" •‫الشعار‬-‫الشركات‬ ‫مواقع‬ ‫من‬ ‫النسخ‬ ‫سهل‬/‫المؤسسات‬ ‫الحقٌقٌة‬ •‫الجائزة‬/‫لـ‬ ‫اختٌارك‬ ‫تم‬ ‫لقد‬ ‫المثال‬ ‫سبٌل‬ ‫على‬ ‫االعتراف‬ ... •‫مثل‬ ‫المحتوى‬ ‫مشاركة‬ ‫تطبٌقات‬OneDrive‫و‬Google Drive Watch out for Fake URLs – Links that look close to legit sites, e.g. "payapl.com" Urgent / immediate action required – Your account will expire, etc. Official sounding Name/Signature e.g. "McGill University Admin" Logo – Easy to copy from real corporate/institutional websites Prize / recognition e.g. you have been selected for … Content sharing apps e.g., OneDrive, Google Drive
  • 27.
  • 28. Watch this video then let us discuss
  • 29. Common Practice  Website used to create temporary email accounts  Click here  Website used to create fake social media chat, messages . ..etc  Click here
  • 30.
  • 31.
  • 32. Applications to create fake social media chats
  • 33.
  • 35. Today’s world Do you know how many passwords you have?
  • 36. Why we use passwords • Authentication is the first line of defense against bad guys • Logins and passwords authenticate you to the system you wish to access • Never share your password with others! • If someone using your login credentials does something illegal or inappropriate, you will be held responsible • The stronger the password, the less likely it will be cracked • Cracking: Using computers to guess the password through “brute-force” methods or by going through entire dictionary lists to guess the password •‫المخربٌن‬ ‫ضد‬ ‫األول‬ ‫الدفاع‬ ‫خط‬ ً‫ه‬ ‫الدخول‬ ‫بٌانات‬ ‫على‬ ‫المصادقة‬ •‫الذي‬ ‫النظام‬ ‫على‬ ‫المرور‬ ‫وكلمات‬ ‫الدخول‬ ‫تسجٌل‬ ‫عملٌات‬ ‫تصادقك‬ ‫إلٌه‬ ‫الوصول‬ ً‫ف‬ ‫ترغب‬ •‫اآلخرٌن‬ ‫مع‬ ‫مرورك‬ ‫كلمة‬ ‫تشارك‬ ‫ال‬! •‫الخاصة‬ ‫الدخول‬ ‫تسجٌل‬ ‫اعتماد‬ ‫بٌانات‬ ‫باستخدام‬ ‫ما‬ ‫شخص‬ ‫قام‬ ‫إذا‬ ‫المسؤولٌة‬ ‫فستتحمل‬ ، ‫مناسب‬ ‫غٌر‬ ‫أو‬ ً‫قانون‬ ‫غٌر‬ ‫شًء‬ ‫بعمل‬ ‫بك‬ •‫اختراقها‬ ‫احتمال‬ ‫قل‬ ، ‫أقوى‬ ‫المرور‬ ‫كلمة‬ ‫كانت‬ ‫كلما‬ •‫االختراق‬:‫خالل‬ ‫من‬ ‫المرور‬ ‫كلمة‬ ‫لتخمٌن‬ ‫الكمبٌوتر‬ ‫أجهزة‬ ‫استخدام‬ ‫أسالٌب‬"‫الغاشمة‬ ‫القوة‬"‫بالكامل‬ ‫القاموس‬ ‫قوائم‬ ‫تصفح‬ ‫خالل‬ ‫من‬ ‫أو‬ ‫المرور‬ ‫كلمة‬ ‫لتخمٌن‬
  • 37. Strong password • Strong passwords should be: • A minimum of 8 characters in length • Include numbers, symbols, upper and lowercase letters (!,1,a,B) • Not include personal information, such as your name, previously used passwords, anniversary dates, pet names, or credit-union related words Examples: Strong Password: H81h@x0rZ -Micr@$@ft234 Weak Password: jack1 Pass Phrase: 33PurpleDoves@Home? - Long, complex, easy to recall
  • 38. What are the dangers? ‫الهوٌة‬ ‫سرقة‬ ً‫المال‬ ‫االحتٌال‬ ‫ابتزاز‬ ‫انتقام‬ Identity theft Financial fraud Extortion Revenge
  • 39. •‫الفدٌة‬ ‫برامج‬ •‫البٌانات‬ ‫سرقة‬ •ً‫الصناع‬ ‫التجسس‬ •‫المالٌة‬ ‫الخسائر‬ Ransomware Data theft Industrial espionage Financial losses
  • 40. Know your enemy •‫قاموس‬ •‫الغاشمة‬ ‫القوة‬ •‫اجتماعٌة‬ ‫هندسة‬ •‫التصٌد‬ Dictionary Brute-force Social engineering phishing
  • 41. Common mistakes •‫جدا‬ ‫قصٌر‬ •‫جدا‬ ‫شائعة‬ •‫جدا‬ ‫قدٌم‬ •‫التخمٌن‬ ‫سهل‬ •ً‫إفتراض‬ Too short Too common Too old Easy to guess Default
  • 42. •‫استخدامها‬ ‫معاد‬ •‫سًء‬ ‫بشكل‬ ‫تخزٌنها‬ •‫مؤمن‬ ‫غٌر‬ ‫جهاز‬ •‫مشترك‬ Reused Poorly stored Unsecured Device shared
  • 43. Use a long password: 12 characters or more Use a combination of: Lowercase letters Uppercase letters Numbers Symbols don’t use a common password: Remember Spaceballs? How you can protect yourself
  • 44. don’t base it on personal information: Social security number Name of a relative/pet Favorite things (book, team, etc.) Change the Default How you can protect yourself
  • 45. Never reuse a password Store it securely: Don’t write it down Secure your Device Never share a password How you can protect yourself
  • 46. How you can protect yourself The math behind password length & complexity Lowercase letters = 26 possibilities Uppercase letters = 26 possibilities Numbers = 10 possibilities Special characters = 33 possibilities Using them all provides 95 possibilities (26+26+10+33) for each character in a password (Also, there are 65,000 different Unicode characters…)
  • 47. How you can protect yourself 8 character password with lowercase only: 268 = 208,827,064,576 For fun: 8 character password with Unicode characters: 650008 = 318,644,812,890,625,000,000,000,000,000,000,000,000 (3.18 x 1038) The math behind password length & complexity 2 character password with all possibilities: 95*95 = 9025 8 character password with all possibilities: 958 = 6,634,204,312,890,625 2 character password with lowercase only: 26*26 = 676
  • 50. Use a password manager Helps generating secure passwords No need to remember them all Work across platforms Cloud based or desktop Many are free How you can protect yourself
  • 53. What are the dangers? Identity theft Location tracking & sharing apps Social Engineering Phishing
  • 54. Know your ‘Legal’ enemy How much money did Facebook make from you in Q1’2019? 3 billion Monthly Active Users 98% revenue from Advertising In US and Canada, average revenue per user: $39.38
  • 55. Common mistakes Provide your personal info Post when you aren’t home Ignore privacy settings Use easy-to-guess password
  • 56. How you can protect yourself You Be mindful about what you share Think twice before clicking links & installing apps Don’t accept unknown connection / friend requests
  • 57.
  • 58. Avoid third party applications
  • 59.
  • 60.
  • 62.
  • 63.
  • 64.
  • 65. How you can protect yourself Your account(s) Check your privacy settings Practice password hygiene Secure with two-Factor Authentication https://twofactorauth.org/
  • 66.
  • 67. How you can protect yourself Your device(s) Lock it Keep OS, browser & software updated Antivirus
  • 68. Socialization Safety Guidelines: Improve your privacy and security settings Facebook: https://www.facebook.com/settings?tab=privacy Snapchat: https://support.snapchat.com/en-US/a/privacy-settings Google: https://myaccount.google.com/intro/privacycheckup LinkedIn: https://www.linkedin.com/psettings/privacy Twitter: https://twitter.com/settings/safety Apple: https://www.apple.com/ca/privacy/manage-your-privacy/ Microsoft: https://account.microsoft.com/account/privacy
  • 70.
  • 71. Encryption  Encryption allows confidential or sensitive data to be scrambled when stored on media or transmitted over public networks (such as the Internet)  Many services, such as web and email, use unencrypted protocols by default  Your messages can be read by anyone who intercepts the message  For example, think of shouting a secret to one person in a crowded room of people  Always use encryption when storing or transferring confidential material  For Business use - Ask IT for assistance with encryption  For Personal use - Free programs, such as TrueCrypt, allow you to encrypt hard drives, flash drives, CompactFlash/SD cards and more  When purchasing online or using online banking, ensure that you are using an encrypted connection  Secure URLs begin with HTTPS://  Most browsers notify you that you are entering an encrypted transmission – be very cautious of warnings!  Padlock in bottom, right-hand corner of browser
  • 72. Digital Threats: Protect Yourself  Never disable anti-virus programs or your firewall  This causes a lapse in security  Never download documents or files without the express permission of a supervisor, or unless otherwise stated in IT Policies  Could contain malware/spyware, viruses, or Trojans  Don’t open unexpected email attachments  Make sure it’s a file you were expecting and from someone you know  Never share login or password information  Anyone with your credentials can masquerade as you!  Do not ever send confidential information or customer data over unencrypted channels  Email  Instant Messaging  If you suspect you have been a victim of fraud, theft, or a hacking attempt, notify the IT Department immediately!
  • 73. Social Engineering  People are often the weakest links  All the technical controls in the world are worthless if you share your password or hold the door open  Attempts to gain  Confidential information or credentials  Access to sensitive areas or equipment  Can take many forms  In person  Email  Phone  Postal Mail
  • 74. One Man’s Trash…  Dumpster diving is the act of sorting through garbage to find documents and information that has been improperly discarded  Customer information  Internal records  Applications  Some things we’ve found:  Credit cards  Technical documentation  Backup tapes  Loan applications  Floor plans/schematics  Copies of identification  Lots of banana peels and coffee cups
  • 75. Your Workstation  Access to a personal computer allows you to complete work more efficiently  Email  Word processing software  Online resources  Someone with access to your workstation now has access to your resources:  Databases  Customer records  Personal data  Email  Lock your workstation when you leave – even if you will be gone briefly!  Critical Data can be stolen in a matter of seconds Windows Key + L lock your computer This will prevent somebody from “volunteering” you for the lunch tab tomorrow!
  • 76. Wireless • Common Attacks • WEP Cracking • Sniffing • Fake Access Points • Beware of the WiFi Pineapple! • Best Practices • WPA/WPA2 • VPN
  • 77. Social Networking  Sites that allow users to post profiles, pictures and group together by similar interests  MySpace  Facebook  Livejournal  Some sites “enforce” age limitations, but no verification process exists to determine a user’s actual age  This means there are no barriers in place to prevent children from registering  Often lists personal details like name, age, location, pictures or place of business  Photos entice stalkers  Don’t list personal details on public websites  Popular with teenagers and young adults  False sense of anonymity – anyone can access this information  College admissions offices and employers are now utilizing social networking websites to perform background checks
  • 78. Portable Devices  Easy to lose, easy to steal  Always keep them within sight, or lock away when not in use  Use caution when in crowded areas  PacSafe bags are cost-effective, great ways to secure your mobile computing devices  http://www.pacsafe.com  Report lost or stolen items immediately  Sometimes carry confidential information  Use strong passwords!  Require the device to lock after a period of inactivity  Use encryption  TrueCrypt: http://www.truecrypt.org  Always cleanly wipe portable devices before disposal  Eraser: http://www.heidi.ie/eraser/  Usually very valuable – you don’t want to pay for a new one!  As expensive as devices these devices are, the information on them is often worth much more.  Your daughter’s piano recital pictures, your tax returns or bank statements, or that dissertation or thesis you’ve been working on for a year!
  • 79. Personal Protection  Always use antivirus, anti-spyware, and firewall  Educate your family on the dangers of the Internet  Stalkers, sexual predators, crooks and con-men have access to computers too  Be selective in the sites you visit  Some downloads have Adware or Spyware bundled with the file  Monitor children’s internet usage  Encrypt stored data and dispose of data properly
  • 80. Top Ten Tips  Never write down or share your passwords  Don’t click on links or open attachments in email  Use antivirus, anti-spyware, and firewall and don’t disable  Don’t send sensitive data over unencrypted channels  Dispose of data properly  Cross-cut shredding  Multiple-wipe or physically destroy hard drives
  • 81. Top Ten Tips  Don’t run programs from un-trusted sources  Lock your machine if you step away  Properly secure information  Safes, locked drawers for physical documents  Encryption for digital information  Verify correct person, website, etc.  If something seems too good to be true, it probably is
  • 82. ‫تعرضى‬ ‫حال‬ ‫فى‬ ‫أتصرف‬ ‫كيف‬ ‫الرقمية‬ ‫هويتى‬ ‫لسرقة‬ Victim of Identity Theft? • Place a fraud alert on your credit reports • Close the accounts you know or believe to have been compromised • File a complaint with the Federal Trade Commission • File a report with your local police • For more information, visit the FTC’s website: http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
  • 84. Further Education  Microsoft:  http://www.microsoft.com/protect/fraud/default.aspx  CERT:  http://www.cert.org/tech_tips/home_networks.html  McAfee:  http://home.mcafee.com/AdviceCenter/Default.aspx  US CERT:  http://www.us-cert.gov/cas/tips/  Trace Security  http://tracesecurity.com (videos on lower-right)  Wikipedia and Google  Research is fun!
  • 85. Alerts and Advisories  US CERT:  http://www.us-cert.gov/  Microsoft:  http://www.microsoft.com/security/  Security Focus:  http://www.securityfocus.com/  PayPal, your bank, and other popular websites will typically address scams or security problems on their home page