SlideShare a Scribd company logo
CYBERSECURITY
& HACKING
By
Zayed
Munir
&
Omar
Rangara
(8BD)
Assalamu
Alaykum!
I am Zayed Munir
I’m currently in Grade 8 / Year 9. I’m studying CCNA, A+, Network+
and Security+.
You can find me at @imzayed_ on Instagram.
2
Topics covered in this session
⬡ What is Cyber Security?
⬡ Why is Cyber Security Important?
⬡ 5 Main Types of Cyber Security
⬡ How can we protect ourselves?
⬡ What is Malicious Hacking?
⬡ What is Ethical Hacking?
⬡ Why is Ethical Hacking Important?
⬡ Phishing Attack Demonstration
3
1.
Cyber Security
Let’s start off with Cyber Security
What is Cyber
Security?
Cyber Security refers to the
safeguarding of computer
systems and networks
against data leakage, theft, or
damage to their hardware,
software, or electronic data.
5
Why is Cyber
Security Important?
Cyber Security is important
because it protects all
categories of data from theft
and damage.
6
5 Main Types of Cyber Security
7
1 3 5
4
2
Critical infrastructure
security Network security
Internet of Things (IoT)
security
Application security Cloud security
How can we protect
ourselves?
⬡ Limit the personal information you share
online.
⬡ Don’t share PINs or passwords.
⬡ Do not click on links in texts or emails
from people you don’t know.
These are just some tips you can follow.
8
2.
Hacking
Let’s move onto Hacking.
What is Malicious
Hacking?
Malicious Hacking refers to the
misuse of devices like computers,
smartphones, tablets, and
networks to cause damage to or
corrupt systems, gather
information on users, steal data
and documents, or disrupt data-
related activity. 10
What is Ethical
Hacking?
Ethical hacking involves an
authorized attempt to gain
unauthorized access to a
computer system,
application, or data.
11
Why is Ethical
Hacking Important?
The primary benefit of ethical
hacking is to prevent data from
being stolen and misused by
malicious attackers, as well as:
Discovering vulnerabilities from an
attacker's POV so that weak points
can be fixed. Implementing a
secure network that prevents
12
Demonst
ration
Now, I am going to give a
demonstration on a Phishing
website using a tool called
Blackeye and Kali Linux.
13
14
Thanks!
Any questions?
You can find me at:
@imzayed_ on Instagram.
Or email me at: me@zayed.ga

More Related Content

What's hot

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Mukul Agarwal
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
Sweta Leena Panda
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Muhammad Irfan
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
ABHAY PATHAK
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
Dharmesh Makwana
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
KloudLearn
 
Phishing
PhishingPhishing
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
Slamet Ar Rokhim
 
Cyber crime
Cyber crimeCyber crime
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 

What's hot (20)

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Phishing
PhishingPhishing
Phishing
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 

Similar to Cyber-Security & Hacking

Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
amberkhan59
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
Ismail Oduoye CISSP,CISA, CCNP-ROUTE,CCNA, MCITP,MCTS
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
Michael File
 
Cyber Security and Ethical Hacking in System Network
Cyber Security and Ethical Hacking in System NetworkCyber Security and Ethical Hacking in System Network
Cyber Security and Ethical Hacking in System Network
hamnathps
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
Takshila Learning
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
 
Internet security
Internet securityInternet security
Internet security
Mohamed El-malki
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
 
Brief Introduction of Hackers
Brief Introduction of HackersBrief Introduction of Hackers
Brief Introduction of Hackers
Chintzy
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
DivithC
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
RAKESH SHARMA
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
Rashed Sayyed
 

Similar to Cyber-Security & Hacking (20)

Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
cyber crime
cyber crimecyber crime
cyber crime
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Cyber Security and Ethical Hacking in System Network
Cyber Security and Ethical Hacking in System NetworkCyber Security and Ethical Hacking in System Network
Cyber Security and Ethical Hacking in System Network
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
Internet security
Internet securityInternet security
Internet security
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Brief Introduction of Hackers
Brief Introduction of HackersBrief Introduction of Hackers
Brief Introduction of Hackers
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

Cyber-Security & Hacking

  • 2. Assalamu Alaykum! I am Zayed Munir I’m currently in Grade 8 / Year 9. I’m studying CCNA, A+, Network+ and Security+. You can find me at @imzayed_ on Instagram. 2
  • 3. Topics covered in this session ⬡ What is Cyber Security? ⬡ Why is Cyber Security Important? ⬡ 5 Main Types of Cyber Security ⬡ How can we protect ourselves? ⬡ What is Malicious Hacking? ⬡ What is Ethical Hacking? ⬡ Why is Ethical Hacking Important? ⬡ Phishing Attack Demonstration 3
  • 4. 1. Cyber Security Let’s start off with Cyber Security
  • 5. What is Cyber Security? Cyber Security refers to the safeguarding of computer systems and networks against data leakage, theft, or damage to their hardware, software, or electronic data. 5
  • 6. Why is Cyber Security Important? Cyber Security is important because it protects all categories of data from theft and damage. 6
  • 7. 5 Main Types of Cyber Security 7 1 3 5 4 2 Critical infrastructure security Network security Internet of Things (IoT) security Application security Cloud security
  • 8. How can we protect ourselves? ⬡ Limit the personal information you share online. ⬡ Don’t share PINs or passwords. ⬡ Do not click on links in texts or emails from people you don’t know. These are just some tips you can follow. 8
  • 10. What is Malicious Hacking? Malicious Hacking refers to the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data- related activity. 10
  • 11. What is Ethical Hacking? Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. 11
  • 12. Why is Ethical Hacking Important? The primary benefit of ethical hacking is to prevent data from being stolen and misused by malicious attackers, as well as: Discovering vulnerabilities from an attacker's POV so that weak points can be fixed. Implementing a secure network that prevents 12
  • 13. Demonst ration Now, I am going to give a demonstration on a Phishing website using a tool called Blackeye and Kali Linux. 13
  • 14. 14 Thanks! Any questions? You can find me at: @imzayed_ on Instagram. Or email me at: me@zayed.ga

Editor's Notes

  1. Mistaken, Misunderstood and Misinterpreted - those words describe the current knowledge of Hacking & Cyber Security in our school. We need to understand and talk more about these topics because as we move into the future, the technological field will be hugely dominating with artificial intelligence and smart assistants being a part of our daily life. That’s exactly why I’m here today - to clarify Cyber Security & Hacking.
  2. Assalamu Alaykum! My name is Zayed Munir. I’m currently in Grade 8 / Year 9 and I’m currently studying for my CCNA, A+, Network+ and Security+ Certifications. I’ve always had an interest in technology and today I’m here to give a speech about Cyber Security and Hacking – one of my passions -. You can also find me at @imzayed_ on Instagram.
  3. The topics that I will cover in this session are: What is Cyber Security? Why is Cyber Security Important? 5 Main Types of Cyber Security How can we protect ourselves? What is Malicious Hacking? What is Ethical Hacking? Why is Ethical Hacking Important? I will also demonstrate what a Phishing Attack looks like
  4. Let’s start off with talking about Cyber Security.
  5. - First things first, What is Cyber Security? - Read off. - Now, what does this mean? Let me elaborate more. - Cyber Security talks about the protection of any smart device including computers, your smartphones, your tablets, networks, etc. It teaches you about the dangers on the web. - It acts like a vaccine against a plague of malicious hackers.
  6. - Why is Cyber Security Important? - Read Off. - Buy Something online (Man-in-the-middle or Phishing), you wouldn’t even know. - I know what you’re thinking. You’re just kids, in what case would you need to purchase an item online? - This isn’t only about purchasing items online. - Let’s say you were to play a game or use social media but you need to sign up. - Someone could launch a social engineering attack on you. - The attacker tries to get your information through the social engineering attacks and steals all your personal information. - This is why learning about Cyber Security is important. To protect ourselves and others.
  7. These are the 5 main types of Cyber Security. I’ll briefly explain each of these. Critical infrastructure security, Basically, Critical infrastructure security is the protection of systems, networks and assets whose continuous operation and monitoring is required. - Critical infrastructure security is very essential to us. - Imagine DEWA, SEWA or other utility companies which provide us 24/7 services have a very important network; - Etisalat, Du Attack. So, there will be a break in the chain of services for a common person or even huge companies. - So, that is the reason that Critical infrastructure security is very important, and we need to protect this critical infrastructure. And this critical infrastructure can be protected through various layers and policies. Application Security, Application security is the process of adding and developing security features within applications to prevent security vulnerabilities. Network Security, Network Security protects your network and data from breaches, intrusions and other threats. Cloud Security, Cloud security refers to a lot of technologies, applications, and controls utilized to protect cloud computers. Some common cloud providers are Amazon AWS or Google Cloud. IoT Security, IoT security is the practice that keeps your IoT systems safe. IoT devices are devices such as: Smart Assistants, Smart Thermostats and Smart Light Bulbs.
  8. - Moving On, Let’s talk about how we can protect ourselves online. - We should start off with limiting the personal information you share online (any personal information that could be confidential.) - Next, DON’T share PINs or Passwords (key to getting information out of you.) - Imagine if someone had your online banking credentials. That could be horrible. - Another point is to never ever click on links that have been sent from an anonymous sender or from someone you don’t know. (Phishing) - Always check the links to see if they use HTTPS and the website is secured. If the website is HTTPS secured, it doesn’t mean the website is safe; It just basically means that your connection is encrypted. - Always use 2 factor authentication; This can come is formats such as receiving an OTP as an SMS or Call or even using an authenticator application such as Google Authenticator. - I also want to really stress this point. DON’T USE VPNs. VPNs bypass certain ports such as port 500, port 802, port 480 or 408. These ports are essential for network security, and VPNs open these ports. Let me explain this. - Let’s say you have a wall (firewall) that’s protecting you. Now let’s say you made a hole in that wall. Anyone can come through that hole and attack you. VPNs open these “holes” to the internet and anyone on the internet has free access to go through that hole and look at your network traffic. A VPN (typically free ones) expose and sell your data to the world wide web. - If you ever sign up to a website that doesn’t need much information from you; such as: a gaming website or a social media website. You don’t need to share much information with them at all. - Also, remember to never click suspicious links or open suspicious emails and to never visit a site unless you have to. - Additionally, remember to always use an anti-virus on your device and a firewall on your network.
  9. I know you all have been waiting for this, so now, let’s move onto Hacking.
  10. What is Malicious Hacking? Read off. These are the “hackers” that you’ve probably heard about. They are called Malicious Hackers, also known as Black Hat Hackers. These types of hackers try to steal, damage and sell your data, or they can even bring your whole network down through a DOS or DDOS attack. These hackers, are bad. Really bad. Malicious hackers are really dangerous if they have the right mindset and tools. They can do whatever they want and you probably wouldn’t even realize. An example of this, is someone creating an browser exploitation link and sharing the link with you. You open the link. Boom! They now have control of your browser. Yes, just by clicking a link.
  11. What is Ethical Hacking? Read Off. Let me explain. Ethical Hacking is when you get requested by an organization to hack them to test their security. So, you have permission to hack them and you try to put yourselves into Malicious hackers’ shoes by using the same type of attacks they would use to test the organization’s security. They might want you to test their security to protect against malicious hackers also known as black hat hackers. This is often referred to as Pen Testing or Penetration Testing. A lot of people choose Ethical Hacking as their field and they help secure a network or a computer system. They launch attacks and try to understand the vulnerabilities of the network and systems and help improve the security and reduce the amount of vulnerabilities.
  12. Why is Ethical Hacking Important? Read Off. Ethical Hacking is very important because without it, we would have the most unsecure networks and systems. Could you imagine everyone being able to see what you’re doing on the internet? Anyone could just steal your data or damage your systems. You wouldn’t want that, would you? Ethical Hacking is probably one of the most important fields in the world. Because of Ethical Hacking, we are able to safely browse the web.
  13. Now, I am going to give a demonstration on a Phishing website using a tool called Blackeye and Kali Linux.
  14. Does anyone have any questions? Thank you so much for the attention and have a good day. Jazakallahu Kharian