Some Terms Used in the Field of Cyber Security
Wednesday, April 13, 2016 in Cybersecurity
Categories:
In this article, we want to briefly explain some expressions and terms used in the field of Cyber Security. The expressions and explanations here can be expanded. We prepared this article to summarize briefly. What is Information as Asset? …
Roadmap for Cyber Security Expert Candidates
Sunday, April 10, 2016 in Cybersecurity
Categories:
At the point technology has reached today, cyber security issues have begun to increase their importance. Trending news and issues now concern individual users as well as service providers. Secure service level and quality are at the top of the …
23 Tips for Digital Spring Cleaning
Friday, April 08, 2016 in Cybersecurity
Categories:
We would like to remind you that we need to do digital spring cleaning by taking as an example the spring cleaning we do in our homes with the arrival of spring. The suggestions we have expressed in this article are prepared to increase the level of …
What is Public Key Cryptography?
Thursday, March 31, 2016 in Cybersecurity
Categories:
In this article, we tried to explain the public/closed key encryption method that many of us have heard of but have not used. Let us state from the beginning that it is not a how-to document. We are just trying to explain the working logic. ENTRANCE: …
5 Important Determinations for Personal Information Security
Saturday, January 16, 2016 in Cybersecurity
Categories:
We are no longer surprised when we come across news about cyber attacks and personal information security violations. They’re becoming so commonplace you might not even be reading them. Don’t forget that one day you, too, may take part in …