Posts in 2016
  • Cyberspace Definition and Actors

    Wednesday, April 20, 2016 in Cybersecurity

    Technology and interconnected systems, which continue to become indispensable in every area of ​​our lives, have caused a new concept to emerge in human history. Concepts that are used with the prefix cyber are used to express the technological …

    Read more

  • Penetration Test Phases (Coordination -3)

    Wednesday, April 20, 2016 in Cybersecurity

    Our articles explaining Penetration Testing processes continue. In this study, we will explain the targets** to be discussed in the Coordination article, which is the 1st Phase of the Penetration Testing Phases . As you know, the first part of the …

    Read more

  • Penetration Testing Phases (Coordination – 2)

    Monday, April 18, 2016 in Cybersecurity

    We have examined the general structure of the coordination processes, which is the 1st Phase during the Penetration Test preparations, in our article in this link. Now, we will examine in detail one of the issues that will be discussed during the …

    Read more

  • Penetration Test Phases (Coordination -1)

    Sunday, April 17, 2016 in Cybersecurity

    What are the Penetration Testing Phases? In our article titled ( see ), we examined the general definition and content of the phases. In this article, we will look at Phase 1, Coordination, in detail. In these articles we have prepared, we intend to …

    Read more

  • Information Gathering Procedures -1- Basic Approach

    Saturday, April 16, 2016 in Cybersecurity

    From this article, we are starting the 2nd Phase of Penetration Testing, Information Gathering processes and their details. We will follow the path of explaining the topics listed below in separate articles. You can review the general stages in this …

    Read more

  • What are the Penetration Testing Phases?

    Saturday, April 16, 2016 in Cybersecurity

    Tests performed to determine the current status of the information system used and the precautions to be taken are called Penetration Tests. The process referred to as Penetration Testing consists of 7 stages. Although Penetration Test Phases are …

    Read more

  • Some Terms Used in the Field of Cyber ​​Security

    Wednesday, April 13, 2016 in Cybersecurity

    In this article, we want to briefly explain some expressions and terms used in the field of Cyber ​​Security. The expressions and explanations here can be expanded. We prepared this article to summarize briefly. What is Information as Asset? …

    Read more

  • Roadmap for Cyber ​​Security Expert Candidates

    Sunday, April 10, 2016 in Cybersecurity

    At the point technology has reached today, cyber security issues have begun to increase their importance. Trending news and issues now concern individual users as well as service providers. Secure service level and quality are at the top of the …

    Read more

  • 23 Tips for Digital Spring Cleaning

    Friday, April 08, 2016 in Cybersecurity

    We would like to remind you that we need to do digital spring cleaning by taking as an example the spring cleaning we do in our homes with the arrival of spring. The suggestions we have expressed in this article are prepared to increase the level of …

    Read more

  • What is Public Key Cryptography?

    Thursday, March 31, 2016 in Cybersecurity

    In this article, we tried to explain the public/closed key encryption method that many of us have heard of but have not used. Let us state from the beginning that it is not a how-to document. We are just trying to explain the working logic. ENTRANCE: …

    Read more

  • 5 Important Determinations for Personal Information Security

    Saturday, January 16, 2016 in Cybersecurity

    We are no longer surprised when we come across news about cyber attacks and personal information security violations. They’re becoming so commonplace you might not even be reading them. Don’t forget that one day you, too, may take part in …

    Read more