Five (5) Day International Training Workshop on Internet Security: Enhancing Information Exchange Safeguards from October 19 – 23, 2014 at Dar es Salam, United Republic of Tanzania
The INIT in joint collaboration with the Islamic Educational, Scientific and Cultural Organization (ISESCO), Commission on Science and Technology for Sustainable Development in the South (COMSATS), and COMSATS Institute of Information Technology (CIIT), and the Tanzania Commission for Science & Technology (COSTECH), Tanzania, convened the 4th 5 – Day International Training Workshop on Internet Security: Enhancing Information Exchange Safeguards October 19 – 23, 2014 Dar es Salam – Tanzania. The event was fourth of the series of workshops on the theme held to train IT professionals of developing countries, enabling them to collectively address issues and challenges related to information and Internet security.
The Workshop provided a forum to the participating researchers and professionals to learn about the latest advancements in the field of Internet security; the use of state-of-the-art technologies for protection of network and network accessible resources from different types of software attacks; and working out effective Internet/information security solutions for general public, governmental organizations and commercial enterprises through rigorous risk analyses and security management approaches.
The training modules pertained to various important subjects relating to organizational security; cryptography and network security; ethical hacking; cyber security and information security design principles; and security information and event management systems.
The specific topics covered during the workshop included: Organizational Security and Industry Standards; Information Security Policies, Objectives and Procedures; ISO 27001 ISMS Standard and related Security Controls; ISMS Policy/Procedures Writing; Information Assets Identifications; Risk Assessment; Risk Treatment; Statement of Applicability; Business Continuity Planning; Cloud Computing; Security Risks and Threats of Cloud Computing; Organization's Cloud Security Concerns; Symmetric Key vs. Asymmetric Key Cryptography; Block Ciphers vs. Stream Ciphers; Hash Functions; Digital Signatures; Kerberos; Secure Electronic Transaction; Introduction to Ethical Hacking and Penetration Testing; Information Gathering; System Hacking; Breaking Wireless Security; Introduction to Information Security Design Principles; Emerging Cyber Threats and their Significance; Dissecting a Cyber Attack; Various Phases in Planning a Cyber Attack; Recent Distributed Denial of Service Attacks; Possible Mitigation Solutions to Service Attacks; Password Attacks; Introduction to SIEM (OSSIM); Integration of OSSIM with other tools; and Prevention Methods
Four experts conducted the workshop in which a good number of participants from local and from around 42 institutions from 9 countries participated in the Workshop
Countires
The workshop was participated by Resource Persons and participants from the following Nine (9) countries:
- Arab Republic of Egypt
- Federal Republic of Nigeria
- Islamic Republic of Pakistan
- Islamic Republic of Iran
- Republic of Kenya
- Republic of Tunisia
- Republic of Uganda
- Republic of Senegal
- United Republic of Tanzania
Participating Institutions
The Resource Persons and participants from the following Forty Two (42) institutions participated in the Workshop:
- Ministry of ICT Uganda
- Ministry of Information and Communications Technology (ICT), Uganda
- National Information Technology Development Agency (NITDA), Nigeria
- Federal Ministry of Sciences Technology, Nigeria
- WRTC Water Rechecties and Technologies Centre, Tunisia
- Egyptian NTRA, Egypt
- Iranian Research Organization for Science & Technology, Iran
- Software Dynamics Limited, Kenya
- Computer Society of Kenya,
- University of cheirh Anta Diop, Senegal
- Tanzania Online Academic Centre, (TOAC) Tanzania
- University of Dodoma, Tanzania
- SUMA-JKT-KILIMO KWANZA PROJECT, Tanzania
- Institute of Accountancy Arusha, Tanzania
- Tanzaia Investment Centre, Tanzania
- TERNET, Tanzania
- University of Dar es salaam, Tanzania
- Mzumbe University, Tanzania
- Tanzict Project (COSTECH), Tanzania
- State Mining Corporation, Tanzania
- DTBI, Tanzania
- Shule Direct Ltd, Tanzania
- Commission for Science and Technology, Tanzania
- TAFIRI, Tanzania
- Mbeya University of Science & Technology, Tanzania
- TIRDO, Tanzania
- Computer System Analyst – ICT Security & Standards, e-Government Agency, Tanzania
- Shuledirect, Tanzania
- Tanzania Revenue Authority, Tanzania
- TERNET, Tanzania
- DIT/Electronic Media Enterprise, Tanzania
- Tanzania Investment Centre, Tanzania
- Kibaha Edication Centre, Tanzania
- Arusha Technical College, Tanzania
- Tanzania Automotive Technology Centre (TATC), Tanzania
- SMMUCO, Tanzania
- Government Procurement Services Agency (GPSA), Tanzania
- Tanzania Airports Authority-TAA, Tanzania
- Inter Islamic Network on Information Technology, (INIT) Pakistan.
- Commission on Science and Technology for Sustainable Development in the South (COMSATS), Pakistan
- Islamic Educational, Scientific and Cultural Organization (ISESCO), Morocco
- COMSATS Institute of Information Technology (CIIT), Islamabad, Pakistan
Resource Persons
- Dr Malik Najmus Saqib
Assistant Professor,
Department of Computer Sciences,
COMSATS Institute of Information Technology, Islamabad, Pakistan.
- Mr. Zafar Mir
Regional Manager,
Information Security Risk,
MENA- HSBC, Dubai, UAE.
- Mr. Assad Raza
Lecturer Information Technology (Networking & Security)
Majan University College,
Sultanate of Oman
- Dr. Abbas Haider
Cyber Secuity Officer & Asst. Prof, National University of Science & Technology, Islamabad, Pakistan.