In this interactive and engaging session, we will dive into the essential concepts of cybersecurity, exploring the importance of protecting digital assets, understanding cyber threats, and implementing security best practices. As cyberattacks become more sophisticated, it is crucial to stay informed...
In this interactive and engaging session, we will dive into the essential concepts of cybersecurity, exploring the importance of protecting digital assets, understanding cyber threats, and implementing security best practices. As cyberattacks become more sophisticated, it is crucial to stay informed and develop a strong foundation in cybersecurity principles.
This session is designed for individuals who want to enhance their awareness of cybersecurity, whether they are students, professionals, or enthusiasts. Through practical demonstrations, real-world case studies, and hands-on activities, participants will gain the knowledge needed to recognize security threats and take appropriate preventive measures.
Definition and importance of cybersecurity
The evolving landscape of cyber threats
The impact of cybercrime on individuals and businesses
Common Cyber Threats and Attacks:
Phishing, malware, ransomware, and social engineering
Password attacks and brute force attacks
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks
Insider threats and human errors in cybersecurity
Cybersecurity Best Practices:
Importance of strong passwords and multi-factor authentication (MFA)
Secure browsing habits and recognizing phishing emails
Safe social media practices and protecting personal information
Keeping devices and software up to date
Network Security Basics:
How firewalls, antivirus software, and encryption work
Securing Wi-Fi networks and understanding VPNs
The role of Intrusion Detection and Prevention Systems (IDPS)
Ethical Hacking & Cybersecurity Careers:
An introduction to ethical hacking and penetration testing
How cybersecurity professionals protect organizations
Cybersecurity career paths and certifications (CEH, CISSP, CompTIA Security+)
Hands-on Activities & Case Studies:
Simulating a phishing attack: How to recognize and respond
Analyzing real-world cyberattack case studies
Interactive discussion on personal cybersecurity challenges
This session will empower participants with the necessary skills to recognize cyber threats, protect their digital footprint, and take proactive measures to stay safe online. Whether you are new to cybersecurity or looking to enhance your knowledge, this session will provide valuable insights to navigate the digital world securely.
Join us for this informative and interactive session to build a cybersecurity mindset and become a responsible digital citizen!
Size: 15.12 MB
Language: en
Added: Mar 11, 2025
Slides: 54 pages
Slide Content
ABOUT ME
WTM AMBSSADOR
COMMITTEE LEADER AT GDG ON CAMPUS
GDG CARTHAGE MEMBER
INSTRUCTOR @Z TRAINING
RESEARCH MASTER’S DEGREE STUDENT IN ICT
@ENET’COM SFAX
AGENDA
CYBERSECURITY REFERS TO PRACTICES
THAT PROTECT SYSTEMS, NETWORKS, AND
DATA FROM CYBER THREATS.
WHAT IS CYBERSECURITY
THE OSI MODEL HAS 7 LAYERS, EACH RESPONSIBLE FOR
DIFFERENT ASPECTS OF NETWORK COMMUNICATION:
APPLICATION (LAYER 7) – USER INTERFACES AND
APPLICATIONS (E.G., HTTP, FTP).
PRESENTATION (LAYER 6) – DATA FORMATTING,
ENCRYPTION (E.G., SSL/TLS).
SESSION (LAYER 5) – MANAGES SESSIONS BETWEEN
APPS.
TRANSPORT (LAYER 4) – RELIABLE DATA TRANSFER (E.G.,
TCP, UDP).
NETWORK (LAYER 3) – ROUTING AND ADDRESSING (E.G.,
IP).
DATA LINK (LAYER 2) – NODE-TO-NODE
COMMUNICATION (E.G., ETHERNET).
PHYSICAL (LAYER 1) – PHYSICAL MEDIA (E.G., CABLES,
SWITCHES).
NETWORK
ATTACTS
User Privacy Awareness
?????? "To ensure your privacy, please avoid
sharing personal, sensitive, or confidential
information during interactions."
?????? Example:
❌ “My email is [email protected].
Can you sign me up?”
✅ “Can you explain how to sign up for an
account?”
Secure Data Handling
?????? "Our system processes data securely
and does not store personal information
beyond necessary use."
?????? Example:
?????? "Your input will be anonymized before
processing to protect your identity."
User Control Over Data
?????? "You have the right to access, modify, or
delete your data at any time."
?????? Example Prompt:
"Would you like to review or delete your
previous interactions?"
Avoiding Sensitive Data Sharing
?????? "For security reasons, do not share
passwords, financial details, or private
identifiers."
?????? Example:
❌ "Here’s my credit card number: 1234
5678 9012 3456. Can you process my
payment?"
✅ "Can you guide me on how to securely
make a payment?"
Compliance & Transparency
?????? "Our AI follows strict data protection
policies to ensure confidentiality."
?????? Example Prompt:
"We comply with GDPR and other privacy
regulations. Your data is not shared with
third parties without consent."
Would you like a designed PowerPoint
template with these slides? ??????
BEST TOOLS
THE BEST CYBERSECURITY
EXPERTS ARE OFTEN THE HACKERS
WHO KNOW HOW TO THINK LIKE AN
ATTACKER, BUT USE THEIR SKILLS
TO DEFEND AND PROTECT.
Scenario 1: Phishing Attack via Email
You receive an email that appears to be from your bank,
asking you to confirm your account information. The
email includes a link to a website that looks very similar
to your bank’s official site. The email urgently warns you
that your account will be locked unless you respond
immediately.
How to Deal with It:
Do Not Click on the Link: Avoid clicking on the link provided in the email. Phishing emails
often lead to fraudulent websites that are designed to steal personal information.
Verify the Source: Contact your bank directly using the official contact details from their
website or your bank card. Never use the contact information provided in the suspicious
email.
Look for Red Flags: Check the email for signs of phishing, such as grammatical errors,
generic greetings (like "Dear Customer"), and suspicious URLs.
Report the Incident: Notify your bank’s fraud department about the suspicious email, and if
applicable, forward the email to your bank’s phishing reporting address.
Update Your Security: Change your banking passwords and enable two-factor authentication
(2FA) to enhance security.
Scenario 2: Ransomware Attack
You notice that your files have become encrypted, and
you receive a ransom note demanding payment in
Bitcoin in exchange for the decryption key. The ransom
note threatens to permanently delete your files if
payment is not made within 72 hours.
How to Deal with It:
Do Not Pay the Ransom: Paying the ransom does not guarantee that your files will be
restored and encourages cybercriminals to continue their attacks.
Disconnect from the Network: Immediately disconnect the infected device from the network
(Wi-Fi, Ethernet, etc.) to prevent the ransomware from spreading to other devices or
systems.
Isolate the Infected System: If possible, isolate the infected device to prevent further
encryption of other files and devices.
Report to Authorities: Inform your local law enforcement or a cybercrime unit. They may
have additional resources and can assist with investigating the incident.
Restore from Backups: If you have secure, recent backups of your files, restore them from
the backup to recover your data. Ensure that the backups are not connected to the infected
network or device.
Use Decryption Tools: Check for any available decryption tools from trusted cybersecurity
organizations, such as No More Ransom (www.nomoreransom.org).
Strengthen Security Measures: After dealing with the immediate attack, review and
strengthen your cybersecurity practices, including regularly updating software, using strong
passwords, and maintaining up-to-date backups.
Quiz Time
Which of the following is an example of
social engineering?
a) Installing a firewall
b) Phishing emails
c) Updating antivirus software
d) Using encryption
Which of the following is an example of social
engineering?
a) Installing a firewall
b) Phishing emails
c) Updating antivirus software
d) Using encryption
What does "phishing" refer to in the
context of cybersecurity?
a) A technique to encrypt sensitive emails
b) Sending fraudulent emails to steal
sensitive information
c) A method of blocking malicious software
d) A type of password management tool
Which of these is a strong password practice?
a) Using your name and birthdate
b) Reusing the same password across all
accounts
c) Using a mix of letters, numbers, and special
characters
d) Writing your password down on paper
Which type of cyber attack involves overwhelming a
system with traffic to make it unavailable?
a) Phishing
b) Denial-of-Service (DoS)
c) Ransomware
d) Man-in-the-middle
Which type of cyber attack involves overwhelming a
system with traffic to make it unavailable?
a) Phishing
b) Denial-of-Service (DoS)
c) Ransomware
d) Man-in-the-middle