0% found this document useful (0 votes)
60 views34 pages

Let'S Discuss Security !!: Louma Makkouk, Cybersecurity. Omar Rajab, Cybersecurity

This document summarizes a discussion on cybersecurity topics between Omar Rajab and Louma Makkouk. It begins with introductions and backgrounds of Omar and Louma. The objective is then outlined, which includes discussing the importance of cybersecurity, trending topics like AI and ransomware, how hackers access systems, and how to secure networks and stop data theft. Key points that will be debated include the ethics of AI that tracks users and how to implement stronger privacy laws. The discussion aims to help attendees better understand security challenges and find solutions.

Uploaded by

omar rajab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views34 pages

Let'S Discuss Security !!: Louma Makkouk, Cybersecurity. Omar Rajab, Cybersecurity

This document summarizes a discussion on cybersecurity topics between Omar Rajab and Louma Makkouk. It begins with introductions and backgrounds of Omar and Louma. The objective is then outlined, which includes discussing the importance of cybersecurity, trending topics like AI and ransomware, how hackers access systems, and how to secure networks and stop data theft. Key points that will be debated include the ethics of AI that tracks users and how to implement stronger privacy laws. The discussion aims to help attendees better understand security challenges and find solutions.

Uploaded by

omar rajab
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

LET’S DISCUSS SECURITY !!

LOUMA MAKKOUK ,CYBERSECURITY.


OMAR RAJAB, CYBERSECURITY.
ABOUT US

OMAR RAJAB LOUMA MAKKOUK


• American University Of Science and • American University Of Science and Technology
Technology
• BS. Information and Communication • BS. Information and Communication technology
technology emphasized in Cybersecurity emphasized in Cybersecurity and Ethical
and Ethical hacking and Computer hacking and Computer Forensics.
Forensics. • Senior Security researcher
• Security researcher
• Extensive knowledge of security • Expertise with security and database information
vulnerabilities, solutions, and risks in IT management tools

• Highly organized and top attention to detail


OBJECTIVE:
• INTRO TO CYBERSECURITY
• WHY ITS IMPORTANT
• TRNDING TOPICS
• DISCUSSING CYBERSECURITY
• OPEN DEBATE
• HOW HACKERS ACCESS OUR PHONES, COMPUTERS, etc.….?
• COFEE BREAK
• HOW TO STOP HACKERS FROM HACKING US?
• SECURING YOUR COMPANY
• WHY RELIABILITY IS IMPORTANT?
• ADVANCED NETWORK’S SECURITY
• COULD WE STOP COMPANIES FROM STEALING OUR DATA?
• Q&A AND NETWORKING
INTRO TO CYBERSECURITY

• What is cybersecurity?
• Cybersecurity is the act of protecting digital devices and data from attacks and
theft, this is done by ensuring the presence of the CIAA.
• C: Confidentiality
• I: Integrity
• A: Authentication
• A: Authorization
• The cyberworld is filled with malicious software, viruses, harmful people
and many other threats that have for a main goal to obtain access t your
private information. this is done through various types of attacks such as
phishing, clickbait, brute forcing etc.…
• Why do people do this? The answer is simple data and information is
extremely valuable. More valuable than money nowadays.
• Cybersecurity is unfortunately being disregarded by many people and no one
realizes its importance until they’ve been breached.
SO WHY CYBERSECURITY IS IMPORTANT?
• It is important to implement cybersecurity in any system to prevent loss or
theft of data, cybersecurity can be achieved in many different ways and its
key goal is to provide protection to the system so that no unauthorized
personnel may access it and/or tamper with information.
TRENDING CYBERSECURITY TOPICS:
• AI and machine learning can boost cyber defenses
• Ransomware
• The IoT is a weak link
• Data breaches
• Identity Theft Online
DISCUSSING TOPICS:

• AI and machine learning can boost cyber defenses: As artificial intelligence


and machine learning gathers pace, and starts to impact more and more
industries, it’s sure to play a bigger role in cybersecurity. Because the battle
with cyber criminals moves so quickly, machine learning models that can
predict and accurately identify attacks swiftly could be a real boon for InfoSec
professionals. In the year ahead, these models need to be trained and honed.
However, there is also a risk that AI and machine learning may be exploited by
attackers. 
• Ransomware: is a form of malicious software (or malware) that, once it's taken
over your computer, threatens you with harm, usually by denying you access to
your data. The attacker demands a ransom from the victim, promising — not
always truthfully — to restore access to the data upon payment. 
• Users are shown instructions for how to pay a fee to get the decryption key. The
costs can range from a few hundred dollars to thousands, payable to
cybercriminals in Bitcoin.
• The IOT is a weak link: Internet of Things remains a major weak point for
defenses. All too often these devices lack basic security features, or they
aren’t properly configured and rely upon default passwords that can give
attackers easy access. This in turn is giving rise to botnets, which can be used
for volumetric attacks, to exfiltrate stolen data, to identify further
vulnerabilities, or for brute force attacks. We need to properly secure the IoT
or it will continue to be a big issue in 2018. 
• Identity Theft Online: is the deliberate use of someone else's identity, usually
as a method to gain a financial advantage or obtain credit and other benefits
in the other person's name, and perhaps to the other person's disadvantage or
loss.
OPEN DEBATE:

• What Do you Think About AI That Track Us?


• Is saving our data ethical?
• Does DATA is valuable?
• Any idea about stopping WannaCry Ransomware?
• Do you think by 2020 all of our data will be sold?
• Should we implement CYBERCRIMES LAW?
• How can we secure IOT?
WHAT ARE THE SYSTEM VULNERABILITIES?
• A vulnerable system is a weak system. It is a system that hackers can take
advantage of the system, steal data, plant viruses and much more.
• Vulnerabilities come in the form of:
• 1.Weak passwords
• 2.Poor firewall protocols
• 3.Downloading/accessing unsecure websites
• 4.Plugging in USB devices from unknown sources
• 5.Weak network
HOW TO FIND VULNERABILITIES:
AUTOMATED SOURCE CODE SECURITY
VULNERABILITY SCANNERS
HOW DO HACKERS ACCESS OUR SYSTEM?
• There are different ways that an attacker may use to penetrate our system:
• Brute force: one of the simplest methods, the hacker will try to “guess” our
password and force his/her way into the system, can be easily countered with
long complex passwords that are changed periodically
• Using viruses shared via email or usb…
• Phishing attacks, sending false email or defacing a web page thus leading the
user to enter his/her credentials and storing them in his own database
• Social engineering, another form of phishing where the attacker will study
the target and assume a certain role in order to obtain the credentials
• Sniffing the network and intercepting packets, if the packets are not
encrypted the attacker can read everything and may even modify the data, is
countered by using encryption algorithms and hash values to insure integrity
and confidentiality
HOW TO STOP HACKERS FROM HACKING
US?
• Use of different and complex passwords
• Don’t share passwords
• Create firewalls
• Don’t access malicious websites
• Don’t open spam mail
• Be careful when clicking a link
• Know who has permission to do what
• Use encryption
• Use hashing
SECURING YOUR COMAPNY
WHY RELIABILITY IS IMPORTANT?
ADVANCED NETWORK’S SECURITY
COULD WE STOP COMPANIES FROM
STEALING OUR DATA?(PRIVACY INVASION)

You might also like