You are on page 1of 24

LET’S DISCUSS SECURITY !!

LOUMA MAKKOUK ,CYBERSECURITY.


OMAR RAJAB, CYBERSECURITY.
ABOUT US

OMAR RAJAB LOUMA MAKKOUK


• American University Of Science and • American University Of Science and Technology
Technology
• BS. Information and Communication • BS. Information and Communication technology
technology emphasized in Cybersecurity emphasized in Cybersecurity and Ethical
and Ethical hacking and Computer hacking and Computer Forensics.
Forensics. • Senior Security researcher
• Security researcher
• Extensive knowledge of security • Expertise with security and database information
vulnerabilities, solutions, and risks in IT management tools

• Highly organized and top attention to detail


OBJECTIVE:
• INTRO TO CYBERSECURITY
• WHY ITS IMPORTANT
• TRNDING TOPICS
• DISCUSSING CYBERSECURITY
• OPEN DEBATE
• HOW HACKERS ACCESS OUR PHONES, COMPUTERS, etc.….?
• COFEE BREAK
• HOW TO STOP HACKERS FROM HACKING US?
• SECURING YOUR COMPANY
• WHY RELIABILITY IS IMPORTANT?
• ADVANCED NETWORK’S SECURITY
• COULD WE STOP COMPANIES FROM STEALING OUR DATA?
• Q&A AND NETWORKING
INTRO TO CYBERSECURITY

• What is cybersecurity?
• Cybersecurity is the act of protecting digital devices and data from attacks and
theft, this is done by ensuring the presence of the CIAA.
• C: Confidentiality
• I: Integrity
• A: Authentication
• A: Authorization
• The cyberworld is filled with malicious software, viruses, harmful people
and many other threats that have for a main goal to obtain access t your
private information. this is done through various types of attacks such as
phishing, clickbait, brute forcing etc.…
• Why do people do this? The answer is simple data and information is
extremely valuable. More valuable than money nowadays.
• Cybersecurity is unfortunately being disregarded by many people and no one
realizes its importance until they’ve been breached.
SO WHY CYBERSECURITY IS IMPORTANT?
• It is important to implement cybersecurity in any system to prevent loss or
theft of data, cybersecurity can be achieved in many different ways and its
key goal is to provide protection to the system so that no unauthorized
personnel may access it and/or tamper with information.
TRENDING CYBERSECURITY TOPICS:

• AI and machine learning can boost cyber defenses


• Ransomware
WHAT ARE THE SYSTEM VULNERABILITIES?
• A vulnerable system is a weak system. It is a system that hackers can take
advantage of the system, steal data, plant viruses and much more.
• Vulnerabilities come in the form of:
• 1.Weak passwords
• 2.Poor firewall protocols
• 3.Downloading/accessing unsecure websites
• 4.Plugging in USB devices from unknown sources
• 5.Weak network
HOW DO HACKERS ACCESS OUR SYSTEM?
• There are different ways that an attacker may use to penetrate our system:
• Brute force: one of the simplest methods, the hacker will try to “guess” our
password and force his/her way into the system, can be easily countered with
long complex passwords that are changed periodically
• Using viruses shared via email or usb…
• Phishing attacks, sending false email or defacing a web page thus leading the
user to enter his/her credentials and storing them in his own database
• Social engineering, another form of phishing where the attacker will study
the target and assume a certain role in order to obtain the credentials
• Sniffing the network and intercepting packets, if the packets are not
encrypted the attacker can read everything and may even modify the data, is
countered by using encryption algorithms and hash values to insure integrity
and confidentiality
HOW TO STOP HACKERS FROM HACKING
US?
• Use of different and complex passwords
• Don’t share passwords
• Create firewalls
• Don’t access malicious websites
• Don’t open spam mail
• Be careful when clicking a link
• Know who has permission to do what
• Use encryption
• Use hashing
SECURING YOUR COMAPNY
WHY RELIABILITY IS IMPORTANT?
ADVANCED NETWORK’S SECURITY
COULD WE STOP COMPANIES FROM
STEALING OUR DATA?(PRIVACY INVASION)

You might also like