Page 7 - CyberSecurityEssentialsEnglish
P. 7
The Personal Data Protection Law No. 151 of 2020 ................................................................................................ 47
The Egyptian Child Law No. 12 of 1996, as amended by Law No. 126 of 2008 ....................................................... 48
Introduction ..................................................................................................................................................................... 51
Cyberbullying ............................................................................................................................................................... 51
Forms of cyberbullying ................................................................................................................................................ 51
Warning signs of cyberbullying .................................................................................................................................... 52
How to deal with cyberbullying ................................................................................................................................... 52
Inappropriate content ................................................................................................................................................. 53
Identity theft and fraud ............................................................................................................................................... 53
Online predators .......................................................................................................................................................... 54
Government Efforts for Child Online Protection ......................................................................................................... 54
National Council for Childhood and Motherhood ................................................................................................... 54
Efforts & Aims .......................................................................................................................................................... 54
Current Available Services ....................................................................................................................................... 55
Figure 1.1 Types of hackers ............................................................................................................................................. 12
Figure 2 Cyber-crime scenario ......................................................................................................................................... 13
Figure 3 CIA Triad Model ................................................................................................................................................. 14
Figure 4 Cyber-crimes types ............................................................................................................................................ 15
Figure 5 Phishing attacks ................................................................................................................................................. 16
Figure 6 Denial-of-Service (DOS) attacks ......................................................................................................................... 16
Figure 7 Zero-day exploits ............................................................................................................................................... 17
Figure 8 Password attacks ............................................................................................................................................... 17
Figure 9 Man in the Middle attack .................................................................................................................................. 18
Figure 10 A real spamming email .................................................................................................................................... 18
Figure 11 Malware types ................................................................................................................................................. 19
Figure 12 Cyber Services .................................................................................................................................................. 20
Figure 13 Social Engineering Explained ........................................................................................................................... 24
Figure 14 Ransomeware infection scenario .................................................................................................................... 25
Figure 15 Spoofing attack scenario ................................................................................................................................. 25
Figure 16 Exploit Kit Injection .......................................................................................................................................... 26
Figure 17 A traditional piggybacking threat .................................................................................................................... 27
Figure 18 Evil Twin Attacks .............................................................................................................................................. 28
Figure 19 Wireless Sniffing .............................................................................................................................................. 28
Figure 20 A Shoulder Surfing Attack ................................................................................................................................ 29
Figure 21 Number Spoffing Attack .................................................................................................................................. 31
Figure 22 Traffic Light Protocol........................................................................................................................................ 34
Figure 23 Phishing scam websites ................................................................................................................................... 37
Figure 24 Online shopping scam websites ...................................................................................................................... 38
Figure 25 Scareware scam websites ................................................................................................................................ 38
Figure 26 Sweepstakes scam websites ............................................................................................................................ 39
5

