Saturday, June 27, 2020
Report on Culture, Literature and eTwinning Club Studies
I prepared a report evaluating the work done up to the Quarantine Process.
Friday, June 26, 2020
Thursday, June 11, 2020
CYBER SECURITY GUIDE BOOK-FINAL PRODUCT (Oya ARSLAN)
With the collaboration, we prepared an ebook.
The link is below.
Monday, June 8, 2020
Our ''get cyber skilled'' scratch quiz
With the help of our partners we created a scratch quiz on cyberbullying!
Go to the link below and test your ''cyber bullying'' knowledge :
https://scratch.mit.edu/projects/376476940
Go to the link below and test your ''cyber bullying'' knowledge :
https://scratch.mit.edu/projects/376476940
Saturday, May 16, 2020
Wednesday, May 6, 2020
Tuesday, May 5, 2020
Wednesday, April 22, 2020
FINAL PRODUCT SUBJECT-2/ SOCIAL ENGINEERING (Oya ARSLAN)
SOCIAL ENGINEERING
Social engineering is to try to obtain the
desired information through various persuasion and deception methods by making
use of the weaknesses of people on the Internet.
The social engineer follows some ways to
deceive others.
It collects information about the victim
and explores many features.
Plans the attack.
Determines the computer programs to use.
Uses the information collected.
What are the harms of social engineering
attacks?
-Attackers can gain unauthorized access to
the systems.
-It creates a loss of trust and reputation
for the company or people.
-Data theft is done.
-The business processes of companies can
be disrupted with the hijacked passwords or access information.
-Captured systems may become unavailable.
What are the measures that can be taken
against social engineering attacks?
-It should take security measures.
-It is necessary to be aware of cyber attacks and to receive information security trainings.
-Firewall and Antivirus are required to protect computers.
-Callback method should be adopted against fake calls.
-It is necessary to be skeptical about e-mail and SMS access.
-It is necessary to be aware of cyber attacks and to receive information security trainings.
-Firewall and Antivirus are required to protect computers.
-Callback method should be adopted against fake calls.
-It is necessary to be skeptical about e-mail and SMS access.
FINAL PRODUCT SUBJECT-1/ PASSWORDS (Oya ARSLAN)
PASSWORDS
With the introduction of technology and
the internet into our lives, the number of passwords we use has increased. We
usually use the same passwords on the internet and create simple passwords. By
creating simple passwords, we can use our personel information, date of birth,
place of birth and sequential numbers. Or the password of our debit cards and
our e-mail password may be the same.
Using the same passwords for different
accounts on the Internet causes a huge security vulnerability.Simple passwords
can be estimated on the internet, through personal information shared on social
media. Because if this password is learned in some way, it is possible that
other accounts will be taken over by malicious people.
However, these passwords are easy to
guess.
What is a strong password?
-These are passwords that are not easy to
guess.
-They are passwords that are very
difficult to get by trial and error.
So how to create a strong password?
- It should not consist of personal
information and easily predictable information.
- Must be at least 8 characters.
- It must consist of letters, numbers and
special characters.
- It must consist of uppercase and
lowercase letters.
- Different passwords must be set for all
accounts.
PREPARING E-BOOK FROM INFOGRAPHIC (Oya ARSLAN)
We prepared an ebook from the infographic works of the project partners.
https://www.storyjumper.com/book/read/81455855/5e932a7939aae
https://www.storyjumper.com/book/read/81455855/5e932a7939aae
Monday, March 9, 2020
Sunday, March 8, 2020
Wednesday, March 4, 2020
Thursday, February 20, 2020
Thursday, February 13, 2020
Saturday, January 11, 2020
Subscribe to:
Posts (Atom)