Saturday, June 27, 2020

Report on Culture, Literature and eTwinning Club Studies

I prepared a report evaluating the work done up to the Quarantine Process.

Project Dissemination Webinar (Oya ARSLAN)

I participated in the project dissemination webinar in our city and introduced our project.




Monday, June 8, 2020

Our ''get cyber skilled'' scratch quiz

With the help of our partners we created a scratch quiz on cyberbullying!
Go to the link below and test your ''cyber bullying'' knowledge :

https://scratch.mit.edu/projects/376476940

Wednesday, May 6, 2020

Wednesday, April 22, 2020

FINAL PRODUCT SUBJECT-2/ SOCIAL ENGINEERING (Oya ARSLAN)


SOCIAL ENGINEERING

Social engineering is to try to obtain the desired information through various persuasion and deception methods by making use of the weaknesses of people on the Internet.
The social engineer follows some ways to deceive others. 
It collects information about the victim and explores many features.
Plans the attack.
Determines the computer programs to use.
Uses the information collected.

What are the harms of social engineering attacks?
-Attackers can gain unauthorized access to the systems.
-It creates a loss of trust and reputation for the company or people.
-Data theft is done.
-The business processes of companies can be disrupted with the hijacked passwords or access information.
-Captured systems may become unavailable.

What are the measures that can be taken against social engineering attacks?
-It should take security measures. 
-It is necessary to be aware of cyber attacks and to receive information security trainings. 
-Firewall and Antivirus are required to protect computers. 
-Callback method should be adopted against fake calls. 
-It is necessary to be skeptical about e-mail and SMS access.

FINAL PRODUCT SUBJECT-1/ PASSWORDS (Oya ARSLAN)

PASSWORDS 

With the introduction of technology and the internet into our lives, the number of passwords we use has increased. We usually use the same passwords on the internet and create simple passwords. By creating simple passwords, we can use our personel information, date of birth, place of birth and sequential numbers. Or the password of our debit cards and our e-mail password may be the same.

Using the same passwords for different accounts on the Internet causes a huge security vulnerability.Simple passwords can be estimated on the internet, through personal information shared on social media. Because if this password is learned in some way, it is possible that other accounts will be taken over by malicious people.

However, these passwords are easy to guess.
What is a strong password?
-These are passwords that are not easy to guess.
-They are passwords that are very difficult to get by trial and error.

So how to create a strong password?
- It should not consist of personal information and easily predictable information.
- Must be at least 8 characters.
- It must consist of letters, numbers and special characters.
- It must consist of uppercase and lowercase letters.
- Different passwords must be set for all accounts.

Wednesday, March 4, 2020

Teacher Webinar (04.03.2020)

We talked about the project works.
We planned the joint events to be held.







Thursday, February 20, 2020

Safer Internet Day

Safer Internet Day-School Board


We watched a video about Safer İnternet Day






Thursday, February 13, 2020

OUR SAFER INTERNET DAY POSTERS


Project students prepared posters on Safer Internet Day.

Secure Internet Presentation To Parents


We gave our parents information about secure internet.

Tuesday, February 11, 2020

OUR PROJECT STUDENTS INFORMED PEERS ABOUT CYBER SECURITY IN SAFER INTERNET DAY

Saturday, January 11, 2020

Infographics

We prepared infographics about cyber bullying.