Prepared by
Jumanne Mtambalike
Tony Severine
CYBER SECURITY AND ETHICAL HACKING
WE ARE NOT DOING THIS……
THE SECURITY CROWD
CONTENTS
• Introduction to cyber-security
• Types of cyber crimes
• Understanding terminologies
• Documentation and Reports
• Cyber security Tanzania Perspective
• Cyber security Africa Perspective
• Global attack trends
• Overcoming Cyber Crimes
INTRODUCTION TO CYBER-SECURITY
•What is cyber
security
TYPES OF CYBERCRIMES
• Phishing
• Hacking
• Vishing
• Cyber stalking
• Cross site scripting (XSS)
• Bot Networks
• Cyber squatting
UNDERSTANDING TERMINOLOGIES
• Malicious codes
• Spam
• Intrusion
• Scam
• Phishing site
• Hacker
• Denial of Service (DOS)
• Cyber terminologies (Cyber terrorism, Cyber wars, etc.)
• Offensive and Defensive security
• Virus, malware, worms and spyware
• Cyber Espionage
DOCUMENTATION AND REPORTS
• Cyber Security IEEE Report by Jumanne Mtambalike
• Crime Scenario in India by Dr. B. Muthukumaran
• Cybercrime Report Tanzania
• Ethical Hacking Presentation by Pratheeba Murugesan
CYBER SECURITY @ TANZANIA PERSPECTIVE
• News Report
• Reference Documents
• Governments Initiative
• Cyber laws and Implementation
• Statistics and Records
• Government Position
• The future
CYBER SECURITY @ AFRICAN PERSPECTIVE
• Overview
• Statistics and Report
• Associations
• On the News
• The future
GLOBAL CYBER SECURITY TRENDS
• Europe
• South America
• North America
• Asia
• Australia
OVERCOMING CYBERCRIMES
• Security Policy and Legal Framework
• Law Enforcement Agency
• Research and Development
• International Collaboration
FUTURE OF CYBER SECURITY OPEN DISCUSSION
PRACTICAL SESSION
• PRACTICAL #1: EXPLORING PHISHING SITES
• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS
• PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM
• PRACTICAL #4: EXPLORING SOCIAL ENGINEERING
• PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK
• PRACTICAL #6: HACKING WEBMAILS ACCOUNTS
• PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM
• PRACTICAL #8: FACEBOOK HACKING
• PRACTICAL #9: WINDOW COMMAND PROMPT HACKING
• PRACTICAL #10: CREATING VIRUSES AND PREVENTION
THANK YOU!!!!!

Cybersecurity

  • 2.
    Prepared by Jumanne Mtambalike TonySeverine CYBER SECURITY AND ETHICAL HACKING
  • 3.
    WE ARE NOTDOING THIS……
  • 4.
  • 5.
    CONTENTS • Introduction tocyber-security • Types of cyber crimes • Understanding terminologies • Documentation and Reports • Cyber security Tanzania Perspective • Cyber security Africa Perspective • Global attack trends • Overcoming Cyber Crimes
  • 6.
  • 7.
    TYPES OF CYBERCRIMES •Phishing • Hacking • Vishing • Cyber stalking • Cross site scripting (XSS) • Bot Networks • Cyber squatting
  • 8.
    UNDERSTANDING TERMINOLOGIES • Maliciouscodes • Spam • Intrusion • Scam • Phishing site • Hacker • Denial of Service (DOS) • Cyber terminologies (Cyber terrorism, Cyber wars, etc.) • Offensive and Defensive security • Virus, malware, worms and spyware • Cyber Espionage
  • 9.
    DOCUMENTATION AND REPORTS •Cyber Security IEEE Report by Jumanne Mtambalike • Crime Scenario in India by Dr. B. Muthukumaran • Cybercrime Report Tanzania • Ethical Hacking Presentation by Pratheeba Murugesan
  • 10.
    CYBER SECURITY @TANZANIA PERSPECTIVE • News Report • Reference Documents • Governments Initiative • Cyber laws and Implementation • Statistics and Records • Government Position • The future
  • 11.
    CYBER SECURITY @AFRICAN PERSPECTIVE • Overview • Statistics and Report • Associations • On the News • The future
  • 12.
    GLOBAL CYBER SECURITYTRENDS • Europe • South America • North America • Asia • Australia
  • 13.
    OVERCOMING CYBERCRIMES • SecurityPolicy and Legal Framework • Law Enforcement Agency • Research and Development • International Collaboration
  • 14.
    FUTURE OF CYBERSECURITY OPEN DISCUSSION
  • 15.
    PRACTICAL SESSION • PRACTICAL#1: EXPLORING PHISHING SITES • PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS • PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM • PRACTICAL #4: EXPLORING SOCIAL ENGINEERING • PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK • PRACTICAL #6: HACKING WEBMAILS ACCOUNTS • PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM • PRACTICAL #8: FACEBOOK HACKING • PRACTICAL #9: WINDOW COMMAND PROMPT HACKING • PRACTICAL #10: CREATING VIRUSES AND PREVENTION
  • 16.