Page 7 - CyberSecurityEssentialsEnglish
P. 7

The Personal Data Protection Law No. 151 of 2020 ................................................................................................ 47
            The Egyptian Child Law No. 12 of 1996, as amended by Law No. 126 of 2008 ....................................................... 48

       Introduction ..................................................................................................................................................................... 51
          Cyberbullying ............................................................................................................................................................... 51

          Forms of cyberbullying ................................................................................................................................................ 51
          Warning signs of cyberbullying .................................................................................................................................... 52

          How to deal with cyberbullying ................................................................................................................................... 52
          Inappropriate content ................................................................................................................................................. 53

          Identity theft and fraud ............................................................................................................................................... 53
          Online predators .......................................................................................................................................................... 54
          Government Efforts for Child Online Protection ......................................................................................................... 54

            National Council for Childhood and Motherhood ................................................................................................... 54
            Efforts & Aims .......................................................................................................................................................... 54

            Current Available Services ....................................................................................................................................... 55



       Figure 1.1 Types of hackers ............................................................................................................................................. 12
       Figure 2 Cyber-crime scenario ......................................................................................................................................... 13
       Figure 3 CIA Triad Model ................................................................................................................................................. 14
       Figure 4 Cyber-crimes types ............................................................................................................................................ 15
       Figure 5 Phishing attacks ................................................................................................................................................. 16
       Figure 6 Denial-of-Service (DOS) attacks ......................................................................................................................... 16
       Figure 7 Zero-day exploits ............................................................................................................................................... 17
       Figure 8 Password attacks ............................................................................................................................................... 17
       Figure 9 Man in the Middle attack .................................................................................................................................. 18
       Figure 10 A real spamming email .................................................................................................................................... 18
       Figure 11 Malware types ................................................................................................................................................. 19
       Figure 12 Cyber Services .................................................................................................................................................. 20
       Figure 13 Social Engineering Explained ........................................................................................................................... 24
       Figure 14 Ransomeware infection scenario .................................................................................................................... 25
       Figure 15 Spoofing attack scenario ................................................................................................................................. 25
       Figure 16 Exploit Kit Injection .......................................................................................................................................... 26
       Figure 17 A traditional piggybacking threat .................................................................................................................... 27
       Figure 18 Evil Twin Attacks .............................................................................................................................................. 28
       Figure 19 Wireless Sniffing .............................................................................................................................................. 28
       Figure 20 A Shoulder Surfing Attack ................................................................................................................................ 29
       Figure 21 Number Spoffing Attack .................................................................................................................................. 31
       Figure 22 Traffic Light Protocol........................................................................................................................................ 34
       Figure 23 Phishing scam websites ................................................................................................................................... 37
       Figure 24 Online shopping scam websites ...................................................................................................................... 38
       Figure 25 Scareware scam websites ................................................................................................................................ 38
       Figure 26 Sweepstakes scam websites ............................................................................................................................ 39




          5
   2   3   4   5   6   7   8   9   10   11   12