Friday, April 26, 2024

Five (5) Day International Training Workshop on Internet Security: Enhancing Information Exchange Safeguards from October 19 – 23, 2014 at Dar es Salam, United Republic of Tanzania

The INIT in joint collaboration with the Islamic Educational, Scientific and Cultural Organization (ISESCO), Commission on Science and Technology for Sustainable Development in the South (COMSATS), and COMSATS Institute of Information Technology (CIIT), and the Tanzania Commission for Science & Technology (COSTECH), Tanzania, convened the 4th 5 – Day International Training Workshop on Internet Security: Enhancing Information Exchange Safeguards October 19 – 23, 2014 Dar es Salam – Tanzania. The event was fourth of the series of workshops on the theme held to train IT professionals of developing countries, enabling them to collectively address issues and challenges related to information and Internet security.

The Workshop provided a forum to the participating researchers and professionals to learn about the latest advancements in the field of Internet security; the use of state-of-the-art technologies for protection of network and network accessible resources from different types of software attacks; and working out effective Internet/information security solutions for general public, governmental organizations and commercial enterprises through rigorous risk analyses and security management approaches.

The training modules pertained to various important subjects relating to organizational security; cryptography and network security; ethical hacking; cyber security and information security design principles; and security information and event management systems.

The specific topics covered during the workshop included: Organizational Security and Industry Standards; Information Security Policies, Objectives and Procedures; ISO 27001 ISMS Standard and related Security Controls; ISMS Policy/Procedures Writing; Information Assets Identifications; Risk Assessment; Risk Treatment; Statement of Applicability; Business Continuity Planning; Cloud Computing; Security Risks and Threats of Cloud Computing; Organization's Cloud Security Concerns; Symmetric Key vs. Asymmetric Key Cryptography; Block Ciphers vs. Stream Ciphers; Hash Functions; Digital Signatures; Kerberos; Secure Electronic Transaction; Introduction to Ethical Hacking and Penetration Testing; Information Gathering; System Hacking; Breaking Wireless Security; Introduction to Information Security Design Principles; Emerging Cyber Threats and their Significance; Dissecting a Cyber Attack; Various Phases in Planning a Cyber Attack; Recent Distributed Denial of Service Attacks; Possible Mitigation Solutions to Service Attacks; Password Attacks; Introduction to SIEM (OSSIM); Integration of OSSIM with other tools; and Prevention Methods

Four experts conducted the workshop in which a good number of participants from local and from around 42 institutions from 9 countries participated in the Workshop

Countires

The workshop was participated by Resource Persons and participants from the following Nine (9) countries:

  1. Arab Republic of Egypt
  2. Federal Republic of Nigeria
  3. Islamic Republic of Pakistan
  4. Islamic Republic of Iran
  5. Republic of Kenya
  6. Republic of Tunisia
  7. Republic of Uganda
  8. Republic of Senegal
  9. United Republic of Tanzania

Participating Institutions

The Resource Persons and participants from the following Forty Two (42) institutions participated in the Workshop:

  1. Ministry of ICT Uganda
  2. Ministry of Information and Communications Technology (ICT), Uganda
  3. National Information Technology Development Agency (NITDA), Nigeria
  4. Federal Ministry of Sciences Technology, Nigeria
  5. WRTC Water Rechecties and Technologies Centre, Tunisia
  6. Egyptian NTRA, Egypt
  7. Iranian Research Organization for Science & Technology, Iran
  8. Software Dynamics Limited, Kenya
  9. Computer Society of Kenya,
  10. University of cheirh Anta Diop, Senegal
  11. Tanzania Online Academic Centre, (TOAC) Tanzania
  12. University of Dodoma, Tanzania
  13. SUMA-JKT-KILIMO KWANZA PROJECT, Tanzania
  14. Institute of Accountancy Arusha, Tanzania
  15. Tanzaia Investment Centre, Tanzania
  16. TERNET, Tanzania
  17. University of Dar es salaam, Tanzania
  18. Mzumbe University, Tanzania
  19. Tanzict Project (COSTECH), Tanzania
  20. State Mining Corporation, Tanzania
  21. DTBI, Tanzania
  22. Shule Direct Ltd, Tanzania
  23. Commission for Science and Technology, Tanzania
  24. TAFIRI, Tanzania
  25. Mbeya University of Science & Technology, Tanzania
  26. TIRDO, Tanzania
  27. Computer System Analyst – ICT Security & Standards, e-Government Agency, Tanzania
  28. Shuledirect, Tanzania
  29. Tanzania Revenue Authority, Tanzania
  30. TERNET, Tanzania
  31. DIT/Electronic Media Enterprise, Tanzania
  32. Tanzania Investment Centre, Tanzania
  33. Kibaha Edication Centre, Tanzania
  34. Arusha Technical College, Tanzania
  35. Tanzania Automotive Technology Centre (TATC), Tanzania
  36. SMMUCO, Tanzania
  37. Government Procurement Services Agency (GPSA), Tanzania
  38. Tanzania Airports Authority-TAA, Tanzania
  39. Inter Islamic Network on Information Technology, (INIT) Pakistan.
  40. Commission on Science and Technology for Sustainable Development in the South (COMSATS), Pakistan
  41. Islamic Educational, Scientific and Cultural Organization (ISESCO), Morocco
  42. COMSATS Institute of Information Technology (CIIT), Islamabad, Pakistan

Resource Persons

  • Dr Malik Najmus Saqib
    Assistant Professor,
    Department of Computer Sciences,
    COMSATS Institute of Information Technology, Islamabad, Pakistan.
  • Mr. Zafar Mir
    Regional Manager,
    Information Security Risk,
    MENA- HSBC, Dubai, UAE.
  • Mr. Assad Raza
    Lecturer Information Technology (Networking & Security)
    Majan University College,
    Sultanate of Oman
  • Dr. Abbas Haider
    Cyber Secuity Officer & Asst. Prof, National University of Science & Technology, Islamabad, Pakistan.