-
Cyberspace Definition and Actors
Wednesday, April 20, 2016 in Cybersecurity
Categories:
7 minute read
Technology and interconnected systems, which continue to become indispensable in every area of our lives, have caused a new concept to emerge in human history. Concepts that are used with the prefix cyber are used to express the technological …
-
Penetration Test Phases (Coordination -3)
Wednesday, April 20, 2016 in Cybersecurity
Categories:
3 minute read
Our articles explaining Penetration Testing processes continue. In this study, we will explain the targets** to be discussed in the Coordination article, which is the 1st Phase of the Penetration Testing Phases . As you know, the first part of the …
-
Penetration Testing Phases (Coordination – 2)
Monday, April 18, 2016 in Cybersecurity
Categories:
3 minute read
We have examined the general structure of the coordination processes, which is the 1st Phase during the Penetration Test preparations, in our article in this link. Now, we will examine in detail one of the issues that will be discussed during the …
-
Penetration Test Phases (Coordination -1)
Sunday, April 17, 2016 in Cybersecurity
Categories:
8 minute read
What are the Penetration Testing Phases? In our article titled ( see ), we examined the general definition and content of the phases. In this article, we will look at Phase 1, Coordination, in detail. In these articles we have prepared, we intend to …
-
Information Gathering Procedures -1- Basic Approach
Saturday, April 16, 2016 in Cybersecurity
Categories:
4 minute read
From this article, we are starting the 2nd Phase of Penetration Testing, Information Gathering processes and their details. We will follow the path of explaining the topics listed below in separate articles. You can review the general stages in this …
-
What are the Penetration Testing Phases?
Saturday, April 16, 2016 in Cybersecurity
Categories:
6 minute read
Tests performed to determine the current status of the information system used and the precautions to be taken are called Penetration Tests. The process referred to as Penetration Testing consists of 7 stages. Although Penetration Test Phases are …
-
Some Terms Used in the Field of Cyber Security
Wednesday, April 13, 2016 in Cybersecurity
Categories:
6 minute read
In this article, we want to briefly explain some expressions and terms used in the field of Cyber Security. The expressions and explanations here can be expanded. We prepared this article to summarize briefly. What is Information as Asset? …
-
Roadmap for Cyber Security Expert Candidates
Sunday, April 10, 2016 in Cybersecurity
Categories:
7 minute read
At the point technology has reached today, cyber security issues have begun to increase their importance. Trending news and issues now concern individual users as well as service providers. Secure service level and quality are at the top of the …
-
23 Tips for Digital Spring Cleaning
Friday, April 08, 2016 in Cybersecurity
Categories:
9 minute read
We would like to remind you that we need to do digital spring cleaning by taking as an example the spring cleaning we do in our homes with the arrival of spring. The suggestions we have expressed in this article are prepared to increase the level of …
-
What is Public Key Cryptography?
Thursday, March 31, 2016 in Cybersecurity
Categories:
3 minute read
In this article, we tried to explain the public/closed key encryption method that many of us have heard of but have not used. Let us state from the beginning that it is not a how-to document. We are just trying to explain the working logic. ENTRANCE: …
-
5 Important Determinations for Personal Information Security
Saturday, January 16, 2016 in Cybersecurity
Categories:
4 minute read
We are no longer surprised when we come across news about cyber attacks and personal information security violations. They’re becoming so commonplace you might not even be reading them. Don’t forget that one day you, too, may take part in …