0% found this document useful (0 votes)
71 views24 pages

Let'S Discuss Security !!: Louma Makkouk, Cybersecurity. Omar Rajab, Cybersecurity

This document discusses an introduction to cybersecurity presented by Louma Makkouk and Omar Rajab. The presentation covers: - Defining cybersecurity as protecting digital devices and data from attacks through ensuring confidentiality, integrity, authentication, and authorization. - Explaining why cybersecurity is important to prevent data loss or theft and can be achieved through various methods to protect systems from unauthorized access or tampering. - Discussing trending cybersecurity topics like AI/machine learning and ransomware. The presentation then goes into details about system vulnerabilities, how hackers access systems, and how to stop hackers through strategies like using complex unique passwords, firewalls, encryption, and more. It also

Uploaded by

omar rajab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views24 pages

Let'S Discuss Security !!: Louma Makkouk, Cybersecurity. Omar Rajab, Cybersecurity

This document discusses an introduction to cybersecurity presented by Louma Makkouk and Omar Rajab. The presentation covers: - Defining cybersecurity as protecting digital devices and data from attacks through ensuring confidentiality, integrity, authentication, and authorization. - Explaining why cybersecurity is important to prevent data loss or theft and can be achieved through various methods to protect systems from unauthorized access or tampering. - Discussing trending cybersecurity topics like AI/machine learning and ransomware. The presentation then goes into details about system vulnerabilities, how hackers access systems, and how to stop hackers through strategies like using complex unique passwords, firewalls, encryption, and more. It also

Uploaded by

omar rajab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

LET’S DISCUSS SECURITY !!

LOUMA MAKKOUK ,CYBERSECURITY.


OMAR RAJAB, CYBERSECURITY.
ABOUT US

OMAR RAJAB LOUMA MAKKOUK


• American University Of Science and • American University Of Science and Technology
Technology
• BS. Information and Communication • BS. Information and Communication technology
technology emphasized in Cybersecurity emphasized in Cybersecurity and Ethical
and Ethical hacking and Computer hacking and Computer Forensics.
Forensics. • Senior Security researcher
• Security researcher
• Extensive knowledge of security • Expertise with security and database information
vulnerabilities, solutions, and risks in IT management tools

• Highly organized and top attention to detail


OBJECTIVE:
• INTRO TO CYBERSECURITY
• WHY ITS IMPORTANT
• TRNDING TOPICS
• DISCUSSING CYBERSECURITY
• OPEN DEBATE
• HOW HACKERS ACCESS OUR PHONES, COMPUTERS, etc.….?
• COFEE BREAK
• HOW TO STOP HACKERS FROM HACKING US?
• SECURING YOUR COMPANY
• WHY RELIABILITY IS IMPORTANT?
• ADVANCED NETWORK’S SECURITY
• COULD WE STOP COMPANIES FROM STEALING OUR DATA?
• Q&A AND NETWORKING
INTRO TO CYBERSECURITY

• What is cybersecurity?
• Cybersecurity is the act of protecting digital devices and data from attacks and
theft, this is done by ensuring the presence of the CIAA.
• C: Confidentiality
• I: Integrity
• A: Authentication
• A: Authorization
• The cyberworld is filled with malicious software, viruses, harmful people
and many other threats that have for a main goal to obtain access t your
private information. this is done through various types of attacks such as
phishing, clickbait, brute forcing etc.…
• Why do people do this? The answer is simple data and information is
extremely valuable. More valuable than money nowadays.
• Cybersecurity is unfortunately being disregarded by many people and no one
realizes its importance until they’ve been breached.
SO WHY CYBERSECURITY IS IMPORTANT?
• It is important to implement cybersecurity in any system to prevent loss or
theft of data, cybersecurity can be achieved in many different ways and its
key goal is to provide protection to the system so that no unauthorized
personnel may access it and/or tamper with information.
TRENDING CYBERSECURITY TOPICS:

• AI and machine learning can boost cyber defenses


• Ransomware
WHAT ARE THE SYSTEM VULNERABILITIES?
• A vulnerable system is a weak system. It is a system that hackers can take
advantage of the system, steal data, plant viruses and much more.
• Vulnerabilities come in the form of:
• 1.Weak passwords
• 2.Poor firewall protocols
• 3.Downloading/accessing unsecure websites
• 4.Plugging in USB devices from unknown sources
• 5.Weak network
HOW DO HACKERS ACCESS OUR SYSTEM?
• There are different ways that an attacker may use to penetrate our system:
• Brute force: one of the simplest methods, the hacker will try to “guess” our
password and force his/her way into the system, can be easily countered with
long complex passwords that are changed periodically
• Using viruses shared via email or usb…
• Phishing attacks, sending false email or defacing a web page thus leading the
user to enter his/her credentials and storing them in his own database
• Social engineering, another form of phishing where the attacker will study
the target and assume a certain role in order to obtain the credentials
• Sniffing the network and intercepting packets, if the packets are not
encrypted the attacker can read everything and may even modify the data, is
countered by using encryption algorithms and hash values to insure integrity
and confidentiality
HOW TO STOP HACKERS FROM HACKING
US?
• Use of different and complex passwords
• Don’t share passwords
• Create firewalls
• Don’t access malicious websites
• Don’t open spam mail
• Be careful when clicking a link
• Know who has permission to do what
• Use encryption
• Use hashing
SECURING YOUR COMAPNY
WHY RELIABILITY IS IMPORTANT?
ADVANCED NETWORK’S SECURITY
COULD WE STOP COMPANIES FROM
STEALING OUR DATA?(PRIVACY INVASION)

You might also like