SECURITY |cyber threats|cyber essensails

ameniselmi1925 12 views 54 slides Mar 11, 2025
Slide 1
Slide 1 of 54
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54

About This Presentation

In this interactive and engaging session, we will dive into the essential concepts of cybersecurity, exploring the importance of protecting digital assets, understanding cyber threats, and implementing security best practices. As cyberattacks become more sophisticated, it is crucial to stay informed...


Slide Content

ABOUT ME
WTM AMBSSADOR
COMMITTEE LEADER AT GDG ON CAMPUS
GDG CARTHAGE MEMBER
INSTRUCTOR @Z TRAINING
RESEARCH MASTER’S DEGREE STUDENT IN ICT
@ENET’COM SFAX

AGENDA

CYBERSECURITY REFERS TO PRACTICES
THAT PROTECT SYSTEMS, NETWORKS, AND
DATA FROM CYBER THREATS.
WHAT IS CYBERSECURITY

THE OSI MODEL HAS 7 LAYERS, EACH RESPONSIBLE FOR
DIFFERENT ASPECTS OF NETWORK COMMUNICATION:
APPLICATION (LAYER 7) – USER INTERFACES AND
APPLICATIONS (E.G., HTTP, FTP).
PRESENTATION (LAYER 6) – DATA FORMATTING,
ENCRYPTION (E.G., SSL/TLS).
SESSION (LAYER 5) – MANAGES SESSIONS BETWEEN
APPS.
TRANSPORT (LAYER 4) – RELIABLE DATA TRANSFER (E.G.,
TCP, UDP).
NETWORK (LAYER 3) – ROUTING AND ADDRESSING (E.G.,
IP).
DATA LINK (LAYER 2) – NODE-TO-NODE
COMMUNICATION (E.G., ETHERNET).
PHYSICAL (LAYER 1) – PHYSICAL MEDIA (E.G., CABLES,
SWITCHES).

NETWORK
ATTACTS

User Privacy Awareness
?????? "To ensure your privacy, please avoid
sharing personal, sensitive, or confidential
information during interactions."
?????? Example:
❌ “My email is [email protected].
Can you sign me up?”
✅ “Can you explain how to sign up for an
account?”

Secure Data Handling
?????? "Our system processes data securely
and does not store personal information
beyond necessary use."
?????? Example:
?????? "Your input will be anonymized before
processing to protect your identity."

User Control Over Data
?????? "You have the right to access, modify, or
delete your data at any time."
?????? Example Prompt:
"Would you like to review or delete your
previous interactions?"

Avoiding Sensitive Data Sharing
?????? "For security reasons, do not share
passwords, financial details, or private
identifiers."
?????? Example:
❌ "Here’s my credit card number: 1234
5678 9012 3456. Can you process my
payment?"
✅ "Can you guide me on how to securely
make a payment?"

Compliance & Transparency
?????? "Our AI follows strict data protection
policies to ensure confidentiality."
?????? Example Prompt:
"We comply with GDPR and other privacy
regulations. Your data is not shared with
third parties without consent."
Would you like a designed PowerPoint
template with these slides? ??????

BEST TOOLS

THE BEST CYBERSECURITY
EXPERTS ARE OFTEN THE HACKERS
WHO KNOW HOW TO THINK LIKE AN
ATTACKER, BUT USE THEIR SKILLS
TO DEFEND AND PROTECT.

Scenario 1: Phishing Attack via Email
You receive an email that appears to be from your bank,
asking you to confirm your account information. The
email includes a link to a website that looks very similar
to your bank’s official site. The email urgently warns you
that your account will be locked unless you respond
immediately.

How to Deal with It:
Do Not Click on the Link: Avoid clicking on the link provided in the email. Phishing emails
often lead to fraudulent websites that are designed to steal personal information.
Verify the Source: Contact your bank directly using the official contact details from their
website or your bank card. Never use the contact information provided in the suspicious
email.
Look for Red Flags: Check the email for signs of phishing, such as grammatical errors,
generic greetings (like "Dear Customer"), and suspicious URLs.
Report the Incident: Notify your bank’s fraud department about the suspicious email, and if
applicable, forward the email to your bank’s phishing reporting address.
Update Your Security: Change your banking passwords and enable two-factor authentication
(2FA) to enhance security.

Scenario 2: Ransomware Attack
You notice that your files have become encrypted, and
you receive a ransom note demanding payment in
Bitcoin in exchange for the decryption key. The ransom
note threatens to permanently delete your files if
payment is not made within 72 hours.

How to Deal with It:
Do Not Pay the Ransom: Paying the ransom does not guarantee that your files will be
restored and encourages cybercriminals to continue their attacks.
Disconnect from the Network: Immediately disconnect the infected device from the network
(Wi-Fi, Ethernet, etc.) to prevent the ransomware from spreading to other devices or
systems.
Isolate the Infected System: If possible, isolate the infected device to prevent further
encryption of other files and devices.
Report to Authorities: Inform your local law enforcement or a cybercrime unit. They may
have additional resources and can assist with investigating the incident.
Restore from Backups: If you have secure, recent backups of your files, restore them from
the backup to recover your data. Ensure that the backups are not connected to the infected
network or device.
Use Decryption Tools: Check for any available decryption tools from trusted cybersecurity
organizations, such as No More Ransom (www.nomoreransom.org).
Strengthen Security Measures: After dealing with the immediate attack, review and
strengthen your cybersecurity practices, including regularly updating software, using strong
passwords, and maintaining up-to-date backups.

Quiz Time

Which of the following is an example of
social engineering?
a) Installing a firewall
b) Phishing emails
c) Updating antivirus software
d) Using encryption

Which of the following is an example of social
engineering?
a) Installing a firewall
b) Phishing emails
c) Updating antivirus software
d) Using encryption

What does "phishing" refer to in the
context of cybersecurity?
a) A technique to encrypt sensitive emails
b) Sending fraudulent emails to steal
sensitive information
c) A method of blocking malicious software
d) A type of password management tool

Which of these is a strong password practice?
a) Using your name and birthdate
b) Reusing the same password across all
accounts
c) Using a mix of letters, numbers, and special
characters
d) Writing your password down on paper

Which type of cyber attack involves overwhelming a
system with traffic to make it unavailable?
a) Phishing
b) Denial-of-Service (DoS)
c) Ransomware
d) Man-in-the-middle

Which type of cyber attack involves overwhelming a
system with traffic to make it unavailable?
a) Phishing
b) Denial-of-Service (DoS)
c) Ransomware
d) Man-in-the-middle