SlideShare a Scribd company logo
Prepared by
Jumanne Mtambalike
Tony Severine
CYBER SECURITY AND ETHICAL HACKING
WE ARE NOT DOING THIS……
THE SECURITY CROWD
CONTENTS
• Introduction to cyber-security
• Types of cyber crimes
• Understanding terminologies
• Documentation and Reports
• Cyber security Tanzania Perspective
• Cyber security Africa Perspective
• Global attack trends
• Overcoming Cyber Crimes
INTRODUCTION TO CYBER-SECURITY
•What is cyber
security
TYPES OF CYBERCRIMES
• Phishing
• Hacking
• Vishing
• Cyber stalking
• Cross site scripting (XSS)
• Bot Networks
• Cyber squatting
UNDERSTANDING TERMINOLOGIES
• Malicious codes
• Spam
• Intrusion
• Scam
• Phishing site
• Hacker
• Denial of Service (DOS)
• Cyber terminologies (Cyber terrorism, Cyber wars, etc.)
• Offensive and Defensive security
• Virus, malware, worms and spyware
• Cyber Espionage
DOCUMENTATION AND REPORTS
• Cyber Security IEEE Report by Jumanne Mtambalike
• Crime Scenario in India by Dr. B. Muthukumaran
• Cybercrime Report Tanzania
• Ethical Hacking Presentation by Pratheeba Murugesan
CYBER SECURITY @ TANZANIA PERSPECTIVE
• News Report
• Reference Documents
• Governments Initiative
• Cyber laws and Implementation
• Statistics and Records
• Government Position
• The future
CYBER SECURITY @ AFRICAN PERSPECTIVE
• Overview
• Statistics and Report
• Associations
• On the News
• The future
GLOBAL CYBER SECURITY TRENDS
• Europe
• South America
• North America
• Asia
• Australia
OVERCOMING CYBERCRIMES
• Security Policy and Legal Framework
• Law Enforcement Agency
• Research and Development
• International Collaboration
FUTURE OF CYBER SECURITY OPEN DISCUSSION
PRACTICAL SESSION
• PRACTICAL #1: EXPLORING PHISHING SITES
• PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS
• PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM
• PRACTICAL #4: EXPLORING SOCIAL ENGINEERING
• PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK
• PRACTICAL #6: HACKING WEBMAILS ACCOUNTS
• PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM
• PRACTICAL #8: FACEBOOK HACKING
• PRACTICAL #9: WINDOW COMMAND PROMPT HACKING
• PRACTICAL #10: CREATING VIRUSES AND PREVENTION
THANK YOU!!!!!

More Related Content

What's hot

Hacking - A Technical Threat
Hacking - A Technical ThreatHacking - A Technical Threat
Hacking - A Technical Threat
Md. Musfiqur Rahman Foysal
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Badgujar
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
KeshavBhardwaj19
 
Internet security
Internet securityInternet security
Internet security
Reisn Felicite
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO_Presentations
 
Key and cipher overview
Key and cipher overviewKey and cipher overview
Key and cipher overview
503416
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
Mohammed Adam
 
Security tips
Security tips Security tips
Security tips
Diana López Pérez
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
iuvmtech
 
GroupProtectionM6A1
GroupProtectionM6A1GroupProtectionM6A1
GroupProtectionM6A1
JeremiahMcKinley
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
Cyren, Inc
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
Mohammad Ashfaqur Rahman
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
 
Interop 2007 Keynote Teaser
Interop 2007 Keynote TeaserInterop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
 

What's hot (15)

Hacking - A Technical Threat
Hacking - A Technical ThreatHacking - A Technical Threat
Hacking - A Technical Threat
 
Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Internet security
Internet securityInternet security
Internet security
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
 
Key and cipher overview
Key and cipher overviewKey and cipher overview
Key and cipher overview
 
Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Security tips
Security tips Security tips
Security tips
 
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
 
GroupProtectionM6A1
GroupProtectionM6A1GroupProtectionM6A1
GroupProtectionM6A1
 
Webinar: A deep dive on ransomware
Webinar: A deep dive on ransomwareWebinar: A deep dive on ransomware
Webinar: A deep dive on ransomware
 
Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2Cyber Security Awareness - file 2 of 2
Cyber Security Awareness - file 2 of 2
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Interop 2007 Keynote Teaser
Interop 2007 Keynote TeaserInterop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
 

Similar to Cybersecurity

Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
Faizan Janjua
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT CollegesPotato
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
Hîmãlåy Làdhä
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
KharimMchatta
 
Cybersecurity and its oppoutinities
Cybersecurity and its oppoutinitiesCybersecurity and its oppoutinities
Cybersecurity and its oppoutinities
LAVANS2
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Sheetal Kandhare
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
AbhishekPadul1
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
Reeshabh Chaudhary
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
lichuyuliting
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
lichuyuliting
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around uslichuyuliting
 
Cyber crime is around us
Cyber crime is around usCyber crime is around us
Cyber crime is around us
lichuyuliting
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
RahulDhanware2
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
hm5314581
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
KhushiLodhi1
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
Deepam Aggarwal
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
KharimMchatta
 
Cyber Security
Cyber SecurityCyber Security

Similar to Cybersecurity (20)

Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Cyber Security - ICCT Colleges
Cyber Security - ICCT CollegesCyber Security - ICCT Colleges
Cyber Security - ICCT Colleges
 
Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)Cyber crime final round (3rd rank)
Cyber crime final round (3rd rank)
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
Cybersecurity and its oppoutinities
Cybersecurity and its oppoutinitiesCybersecurity and its oppoutinities
Cybersecurity and its oppoutinities
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
Cyber crime’s
Cyber crime’sCyber crime’s
Cyber crime’s
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber Crime is around us
Cyber Crime is around usCyber Crime is around us
Cyber Crime is around us
 
Cyber crime is around us
Cyber crime is around usCyber crime is around us
Cyber crime is around us
 
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptxcybercrimeandsecurityppt-140210064917-phpapp02.pptx
cybercrimeandsecurityppt-140210064917-phpapp02.pptx
 
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.pptCyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023Importance of cybersecurity in digital transformation | 2023
Importance of cybersecurity in digital transformation | 2023
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from jumanne rajabu

Hdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up TanzaniaHdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up Tanzania
jumanne rajabu
 
Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.
jumanne rajabu
 
How to make a great Pitch
How to make a great PitchHow to make a great Pitch
How to make a great Pitch
jumanne rajabu
 
E learning tanzania
E learning tanzaniaE learning tanzania
E learning tanzania
jumanne rajabu
 
Innovation ecosystem in tanzani
Innovation ecosystem in tanzaniInnovation ecosystem in tanzani
Innovation ecosystem in tanzani
jumanne rajabu
 
Manufacturing in tanzania (1)
Manufacturing in  tanzania (1)Manufacturing in  tanzania (1)
Manufacturing in tanzania (1)
jumanne rajabu
 
Hivos Energy Safari Building Cases
Hivos Energy Safari Building CasesHivos Energy Safari Building Cases
Hivos Energy Safari Building Casesjumanne rajabu
 
Manufacturing in tanzania
Manufacturing in  tanzaniaManufacturing in  tanzania
Manufacturing in tanzania
jumanne rajabu
 
Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania
jumanne rajabu
 
Branding 4 start ups
 Branding 4 start ups  Branding 4 start ups
Branding 4 start ups
jumanne rajabu
 
Innovation ecosystem tanzania
Innovation ecosystem tanzaniaInnovation ecosystem tanzania
Innovation ecosystem tanzania
jumanne rajabu
 
Tanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity ExchangeTanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity Exchange
jumanne rajabu
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
jumanne rajabu
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
jumanne rajabu
 
Azam TV prototype
Azam TV prototype Azam TV prototype
Azam TV prototype
jumanne rajabu
 
Open data day presentation
Open data day presentationOpen data day presentation
Open data day presentation
jumanne rajabu
 
Social media markerting
Social media markertingSocial media markerting
Social media markertingjumanne rajabu
 
Social Media Basics
Social Media BasicsSocial Media Basics
Social Media Basics
jumanne rajabu
 

More from jumanne rajabu (20)

Hdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up TanzaniaHdif innovation week, ecosystem meet-up Tanzania
Hdif innovation week, ecosystem meet-up Tanzania
 
Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.Mobile Technologies For Socio-economic development Tanzania.
Mobile Technologies For Socio-economic development Tanzania.
 
How to make a great Pitch
How to make a great PitchHow to make a great Pitch
How to make a great Pitch
 
E learning tanzania
E learning tanzaniaE learning tanzania
E learning tanzania
 
Innovation ecosystem in tanzani
Innovation ecosystem in tanzaniInnovation ecosystem in tanzani
Innovation ecosystem in tanzani
 
Manufacturing in tanzania (1)
Manufacturing in  tanzania (1)Manufacturing in  tanzania (1)
Manufacturing in tanzania (1)
 
Hivos Energy Safari Building Cases
Hivos Energy Safari Building CasesHivos Energy Safari Building Cases
Hivos Energy Safari Building Cases
 
Manufacturing in tanzania
Manufacturing in  tanzaniaManufacturing in  tanzania
Manufacturing in tanzania
 
Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania Innovation & entrepreneurship tanzania
Innovation & entrepreneurship tanzania
 
Branding 4 start ups
 Branding 4 start ups  Branding 4 start ups
Branding 4 start ups
 
Innovation ecosystem tanzania
Innovation ecosystem tanzaniaInnovation ecosystem tanzania
Innovation ecosystem tanzania
 
Tanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity ExchangeTanzania Agriculture Commodity Exchange
Tanzania Agriculture Commodity Exchange
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
 
Buni version 2.0 presentation
Buni version 2.0 presentation Buni version 2.0 presentation
Buni version 2.0 presentation
 
Azam TV prototype
Azam TV prototype Azam TV prototype
Azam TV prototype
 
T good trainer
T good trainerT good trainer
T good trainer
 
Power of google
Power of googlePower of google
Power of google
 
Open data day presentation
Open data day presentationOpen data day presentation
Open data day presentation
 
Social media markerting
Social media markertingSocial media markerting
Social media markerting
 
Social Media Basics
Social Media BasicsSocial Media Basics
Social Media Basics
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Cybersecurity

  • 1.
  • 2. Prepared by Jumanne Mtambalike Tony Severine CYBER SECURITY AND ETHICAL HACKING
  • 3. WE ARE NOT DOING THIS……
  • 5. CONTENTS • Introduction to cyber-security • Types of cyber crimes • Understanding terminologies • Documentation and Reports • Cyber security Tanzania Perspective • Cyber security Africa Perspective • Global attack trends • Overcoming Cyber Crimes
  • 7. TYPES OF CYBERCRIMES • Phishing • Hacking • Vishing • Cyber stalking • Cross site scripting (XSS) • Bot Networks • Cyber squatting
  • 8. UNDERSTANDING TERMINOLOGIES • Malicious codes • Spam • Intrusion • Scam • Phishing site • Hacker • Denial of Service (DOS) • Cyber terminologies (Cyber terrorism, Cyber wars, etc.) • Offensive and Defensive security • Virus, malware, worms and spyware • Cyber Espionage
  • 9. DOCUMENTATION AND REPORTS • Cyber Security IEEE Report by Jumanne Mtambalike • Crime Scenario in India by Dr. B. Muthukumaran • Cybercrime Report Tanzania • Ethical Hacking Presentation by Pratheeba Murugesan
  • 10. CYBER SECURITY @ TANZANIA PERSPECTIVE • News Report • Reference Documents • Governments Initiative • Cyber laws and Implementation • Statistics and Records • Government Position • The future
  • 11. CYBER SECURITY @ AFRICAN PERSPECTIVE • Overview • Statistics and Report • Associations • On the News • The future
  • 12. GLOBAL CYBER SECURITY TRENDS • Europe • South America • North America • Asia • Australia
  • 13. OVERCOMING CYBERCRIMES • Security Policy and Legal Framework • Law Enforcement Agency • Research and Development • International Collaboration
  • 14. FUTURE OF CYBER SECURITY OPEN DISCUSSION
  • 15. PRACTICAL SESSION • PRACTICAL #1: EXPLORING PHISHING SITES • PRACTICAL #2: EXPLORING SPAM LETTERS AND JUNK MAILS • PRACTICAL #3: SPYING ONLINE ACTIVITIES OF A VICTIM • PRACTICAL #4: EXPLORING SOCIAL ENGINEERING • PRACTICAL #5: TESTING VULNERABILITY OF A NETWORK • PRACTICAL #6: HACKING WEBMAILS ACCOUNTS • PRACTICAL #7: CREATING ADVANCED LOGIN SYSTEM • PRACTICAL #8: FACEBOOK HACKING • PRACTICAL #9: WINDOW COMMAND PROMPT HACKING • PRACTICAL #10: CREATING VIRUSES AND PREVENTION