Te cybersecurity network
Posted: Mon Feb 10, 2025 10:42 am
In 2021, will continue to be a key trend as it provides essential benefits that traditional cybersecurity methods simply cannot provide, including flexibility, elasticity, adaptability, and reliability. Based on an understanding of the value of data and the importance of protecting it, the ability to keep that information private and secure will differentiate companies from each other, strengthening services and products overall.
Security Tales: Ali Baba and Security Mistakes
Vladimir Bezmaly | 04/28/2021
- Hi, dad!
- Hello, Tanyusha! How are you? How is your granddaughter?
- It's growing little by little. When are you coming to visit us? It seems like we live nearby, but we don't see Grandpa. I understand, you were little, you were always at work, but now the little one asks why Grandpa doesn't tell her a story, and she misses Mishka, she says she hasn't ridden him for a long time.
- Well, I'll come by tomorrow. But that's not why you called. Tell me, what happened?
- That's right, not only for that. At our school, in computer science class, I want to tell the children about some concepts in the field of information security, and I understand that no one can tell it better than you, the teacher. In short, get ready. I'll be waiting at school next week.
- Can you ask them to read two fairy tales before class? "Ali austria whatsapp data and the 40 Thieves" and "Cinderella". I'll explain using fairy tales as examples.
- Fine.
A week has passed.
- Good afternoon! My name is Alexey Petrovich, and today, at your teacher's request, I will give you a lesson. Let's talk about passwords. I asked you to read a fairy tale and think about it, and now we will analyze it.
- But we’re going to talk about passwords and computer science, not about literature!
- Of course! Remember, the chieftain arrives and shouts loudly: "Sim-sim, open the door!" What does he do?
- He transmits the password.
- That's right, thank you! And what mistake does he make?
Security Tales: Ali Baba and Security Mistakes
Vladimir Bezmaly | 04/28/2021
- Hi, dad!
- Hello, Tanyusha! How are you? How is your granddaughter?
- It's growing little by little. When are you coming to visit us? It seems like we live nearby, but we don't see Grandpa. I understand, you were little, you were always at work, but now the little one asks why Grandpa doesn't tell her a story, and she misses Mishka, she says she hasn't ridden him for a long time.
- Well, I'll come by tomorrow. But that's not why you called. Tell me, what happened?
- That's right, not only for that. At our school, in computer science class, I want to tell the children about some concepts in the field of information security, and I understand that no one can tell it better than you, the teacher. In short, get ready. I'll be waiting at school next week.
- Can you ask them to read two fairy tales before class? "Ali austria whatsapp data and the 40 Thieves" and "Cinderella". I'll explain using fairy tales as examples.
- Fine.
A week has passed.
- Good afternoon! My name is Alexey Petrovich, and today, at your teacher's request, I will give you a lesson. Let's talk about passwords. I asked you to read a fairy tale and think about it, and now we will analyze it.
- But we’re going to talk about passwords and computer science, not about literature!
- Of course! Remember, the chieftain arrives and shouts loudly: "Sim-sim, open the door!" What does he do?
- He transmits the password.
- That's right, thank you! And what mistake does he make?