SlideShare a Scribd company logo
Online hacking
and Cybercrime
Presented by: Hamad Ibrahim
Overview of Online Hacking in the
UAE:
• Online hacking is a big problem in the UAE. This happens when some
people try to get into your online things without permission, causing
trouble for many people. Hacking can mess up the internet and even
steal personal information, which is not good and can make things
difficult.
Causes/Effects:
• The main reason for online hacking is
that there are many hackers around.
During the COVID-19 pandemic,
hacking got worse, especially a type
called ransomware. This kind makes it
hard for the UAE to keep its internet
safe. Bad guys doing this, called
cybercriminals, are getting smarter.
They use tricky tactics that are hard to
stop and can cause lots of trouble.
Suggested Solutions:
1. Spreading awareness means letting people in the UAE know about
hacking and how to stay safe on the internet. This involves sharing
important information and making announcements so that everyone can
learn how to protect themselves from hackers. The goal is to ensure that
people are aware of online threats and know the steps to take to stay
secure online. (Cyber Safety and Digital Security | the Official Portal of
the UAE Government, n.d, 2015)
2. 2- Encouraging the use of strong passwords is like putting a super-strong
lock on the door to your online world. Just like we lock our homes to
keep intruders out, having a strong password helps protect our digital
stuff from sneaky hackers. (Joe, M. M., 2015)
So, what's a strong password? It's like creating a secret code that only you
know. Instead of using easy-to-guess things like your name or birthday,
mix it up! Combine uppercase and lowercase letters, add numbers, and
throw in some symbols. This makes your password like a tough puzzle for
hackers to solve.
Why does this matter? Well, hackers are like digital detectives trying to
crack codes. If your password is too simple, it's like leaving your front
door wide open. But if it's strong and complex, it's like having a high-tech
security system protecting your valuable information.
Talking to everyone about hacking is a smart way to make sure people know how to
stay safe on the internet. The UAE government is taking this seriously and has created
rules and laws to keep everyone protected online. They've even come up with cool
projects, like UAE Pass, to make using the internet safer and easier for everyone.
• UAE Pass Project: This is a special project by the UAE government to help people
use the internet safely. They made an app called UAE Pass to make it easier for
everyone.
• Kid Safety Programs: The UAE is also working on plans to teach kids how to be
safe on the internet. This is important because kids need extra help to
understand and avoid online dangers.
To really deal with online hacking, it's like using a mix of spreading the word and having
strong passwords. Imagine it's teamwork against the bad guys on the internet!
Spreading Awareness
•First, let's make sure everyone knows about
hacking and how to stay safe online. It's like
when we tell our friends about a cool game. We
want everyone to know the rules to play it
safely.
•If people know the dangers and how to protect
themselves, it's like having a shield against
hackers. Just like superheroes need their gear,
we need to know how to defend ourselves.
Using strong passwords
•Next, let's talk about strong passwords. Think of
them as locks for your online stuff. When we use
passwords that are hard to guess, it's like putting a
giant lock on the door. Bad guys won't easily break
in because the lock is too tricky for them.
•So, when we combine knowing about hacking and
using strong passwords, it's like having a superhero
team defending our online world. The bad guys
find it really hard to cause problems because we've
built a strong defense.
How it works
(The two combined)
• It's like having a superhero team defending our online
world. The bad guys find it really hard to cause
problems because we've built a strong defense.
• Think of it like playing a game. We know the rules
(spreading awareness) and have the right gear (strong
passwords). When we play together, it's much harder
for the bad guys to win. Teamwork makes us strong!
• So, when we use this combo of spreading the word
and having strong passwords, it's like creating a
powerful shield against online hacking. It's all about
working together to keep our online world safe and
sound. Teamwork makes the dream work!
conclusion
In conclusion, online hacking is a challenge in the UAE, but there's a plan to
tackle it. It's like solving a puzzle – first by spreading awareness about online
safety and then by using strong passwords as protective keys. By combining
these efforts, we create a strong defense against cyber threats.
•
•
https://www.mei.edu/publications/ransomware-uae-evolving-threatsand-expanding-responses
•
https://www.academia.edu/10360309/Enhancing_Security_Module_to_
Prevent_Data_Hacking_in_Online_Social_Networks
• https://u.ae/en/information-and-
services/justicesafety-and-the-law/cyber-safety-and-digital-security

More Related Content

Similar to hamad.pwrpoint.pdf

The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
jram2113
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
SrijanMukhopadhyay1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Tushar Nikam
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
Steve Poole
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
Takshila Learning
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
Joan Dembowski
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
Kazi Sarwar Hossain
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
Nader Alkeinay
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
NRC
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
Syed Rizwan Ali
 
Aste 2012 slideshow
Aste 2012 slideshowAste 2012 slideshow
Aste 2012 slideshowtweisz
 

Similar to hamad.pwrpoint.pdf (20)

The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 
Sept 2014 cloud security presentation
Sept 2014   cloud security presentationSept 2014   cloud security presentation
Sept 2014 cloud security presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Aste 2012 slideshow
Aste 2012 slideshowAste 2012 slideshow
Aste 2012 slideshow
 

Recently uploaded

IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
Aine Greaney Ellrott
 
A Brief Introduction About Hadj Ounis
A Brief  Introduction  About  Hadj OunisA Brief  Introduction  About  Hadj Ounis
A Brief Introduction About Hadj Ounis
Hadj Ounis
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
luforfor
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
iraqartsandculture
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
CristianMestre
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
taqyed
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
Sandhya J.Nair
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
zvaywau
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
SuryaKalyan3
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
zeyhe
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
ClaireWilson398082
 
Fed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine ZorbaFed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine Zorba
mariavlachoupt
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
ZackSpencer3
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
luforfor
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
zvaywau
 
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
zeyhe
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
aditiyad2020
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
SuryaKalyan3
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
angelicafronda7
 

Recently uploaded (19)

IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
 
A Brief Introduction About Hadj Ounis
A Brief  Introduction  About  Hadj OunisA Brief  Introduction  About  Hadj Ounis
A Brief Introduction About Hadj Ounis
 
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单如何办理
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
 
Fed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine ZorbaFed by curiosity and beauty - Remembering Myrsine Zorba
Fed by curiosity and beauty - Remembering Myrsine Zorba
 
Codes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new newCodes n Conventionss copy (2).pptx new new
Codes n Conventionss copy (2).pptx new new
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
 
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
一比一原版(UniSA毕业证)南澳大学毕业证成绩单如何办理
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
 

hamad.pwrpoint.pdf

  • 2. Overview of Online Hacking in the UAE: • Online hacking is a big problem in the UAE. This happens when some people try to get into your online things without permission, causing trouble for many people. Hacking can mess up the internet and even steal personal information, which is not good and can make things difficult.
  • 3. Causes/Effects: • The main reason for online hacking is that there are many hackers around. During the COVID-19 pandemic, hacking got worse, especially a type called ransomware. This kind makes it hard for the UAE to keep its internet safe. Bad guys doing this, called cybercriminals, are getting smarter. They use tricky tactics that are hard to stop and can cause lots of trouble.
  • 4. Suggested Solutions: 1. Spreading awareness means letting people in the UAE know about hacking and how to stay safe on the internet. This involves sharing important information and making announcements so that everyone can learn how to protect themselves from hackers. The goal is to ensure that people are aware of online threats and know the steps to take to stay secure online. (Cyber Safety and Digital Security | the Official Portal of the UAE Government, n.d, 2015) 2. 2- Encouraging the use of strong passwords is like putting a super-strong lock on the door to your online world. Just like we lock our homes to keep intruders out, having a strong password helps protect our digital stuff from sneaky hackers. (Joe, M. M., 2015) So, what's a strong password? It's like creating a secret code that only you know. Instead of using easy-to-guess things like your name or birthday, mix it up! Combine uppercase and lowercase letters, add numbers, and throw in some symbols. This makes your password like a tough puzzle for hackers to solve. Why does this matter? Well, hackers are like digital detectives trying to crack codes. If your password is too simple, it's like leaving your front door wide open. But if it's strong and complex, it's like having a high-tech security system protecting your valuable information.
  • 5. Talking to everyone about hacking is a smart way to make sure people know how to stay safe on the internet. The UAE government is taking this seriously and has created rules and laws to keep everyone protected online. They've even come up with cool projects, like UAE Pass, to make using the internet safer and easier for everyone. • UAE Pass Project: This is a special project by the UAE government to help people use the internet safely. They made an app called UAE Pass to make it easier for everyone. • Kid Safety Programs: The UAE is also working on plans to teach kids how to be safe on the internet. This is important because kids need extra help to understand and avoid online dangers.
  • 6. To really deal with online hacking, it's like using a mix of spreading the word and having strong passwords. Imagine it's teamwork against the bad guys on the internet! Spreading Awareness •First, let's make sure everyone knows about hacking and how to stay safe online. It's like when we tell our friends about a cool game. We want everyone to know the rules to play it safely. •If people know the dangers and how to protect themselves, it's like having a shield against hackers. Just like superheroes need their gear, we need to know how to defend ourselves. Using strong passwords •Next, let's talk about strong passwords. Think of them as locks for your online stuff. When we use passwords that are hard to guess, it's like putting a giant lock on the door. Bad guys won't easily break in because the lock is too tricky for them. •So, when we combine knowing about hacking and using strong passwords, it's like having a superhero team defending our online world. The bad guys find it really hard to cause problems because we've built a strong defense.
  • 7. How it works (The two combined) • It's like having a superhero team defending our online world. The bad guys find it really hard to cause problems because we've built a strong defense. • Think of it like playing a game. We know the rules (spreading awareness) and have the right gear (strong passwords). When we play together, it's much harder for the bad guys to win. Teamwork makes us strong! • So, when we use this combo of spreading the word and having strong passwords, it's like creating a powerful shield against online hacking. It's all about working together to keep our online world safe and sound. Teamwork makes the dream work!
  • 8. conclusion In conclusion, online hacking is a challenge in the UAE, but there's a plan to tackle it. It's like solving a puzzle – first by spreading awareness about online safety and then by using strong passwords as protective keys. By combining these efforts, we create a strong defense against cyber threats. • • https://www.mei.edu/publications/ransomware-uae-evolving-threatsand-expanding-responses • https://www.academia.edu/10360309/Enhancing_Security_Module_to_ Prevent_Data_Hacking_in_Online_Social_Networks • https://u.ae/en/information-and- services/justicesafety-and-the-law/cyber-safety-and-digital-security