I'm protecting my information

Information security is subject which we are responsible for improving ourselves, applying what we have learned and sharing to our relatives what we have learned. Using information technology without security precautions today means "you are taking an incredible risk.". Briefly, even if we want to stay away from this subject, it doesn't seem to leave our side.

Then the best is to learn. In fact, you are welcome to act consciously in the world of information to explore this concept, which includes many concepts and approaches that we aren’t alien to everyday.

Would you like to start becoming aware of information security?

 

01 Why is Information Security?
Have you or your relatives ever had any problems with information security? Events don't end with counting.
Why information security is important? What can happen to us? Have you ever asked yourself? What could it be?

Here are a few examples from everyday life:
       Publishing personal information about employees in an establishment on the internet.
       Interactive banking system of an user's from the account theft of money.
       Change of students' grades in the system.
Video 01

02 Information Security and User Responsibility
When information security is mentioned, it is our opinion that the information belonging to ourselves isn’t passed on to anyone else.
In fact, security doesn’t just mean that information is in the hands of someone else. Security consists of three elements called "privacy", "integrity" and "accessibility".

A security vulnerability results if any of the 3 basic security elements listed below are damaged.
Privacy: Your information isn’t in the hands of unauthorized people.
Integrity: information isn’t altered by unauthorized persons.
Accessibility: The information is accessible and available to the relevant or authorized persons.

For example,
If the account of our Internet banking is compromised by an attacker, privacy will be harmed.
Integrity will be damaged when the content of a web page is changed by an attacker.
When access to a web page is blocked accessibility will be compromised.
Everyone is responsible for ensuring information security.
These responsibilities are expressed legally and the law no. 5651 is regulated with the aim of "regulating publications made on the internet and combating crimes committed through these publications".
When we think of information systems as a chain, the weakest link of this chain is mostly the users of the system.
It shouldn’t be forgotten that "a chain is as strong as its weakest link."
Since the level of information security is also connected to the user in this case, the user has an extremely vital pre-requisite for securing information security and sets the level of information security.

Video 02

03 Introduction to Computing Security
Securing your computer means that the information you store inside the computer is also secure. For this reason, it is extremely important.
Is it normal for someone with a physical access to your computer to have access to all the information on your computer?
The first step in this is physical security. First, the security of your computer must be secured.
Do you know that one of the most common problems is stolen laptop computers?
Why is Login Security?
It is also true to talk about the security of the computer after you have checked the physical access. Unauthorized persons due to security measures taken at the entrance stage of the computer:
     If they can physically access your computer, they won’t be able to access your information.
     Your computer may not be able to access your information over the network, even if it is connected to a computer network or internet.
DO NOT REMEMBER!
The more information you have stored on your computer, the greater the security of your computer's access.
Protecting your computer is very important to keep the information you keep in your computer. Your computer can be remotely or physically accessible.
To block physical access
     Define password for your computer and / or operating system
     You should absolutely lock your session as you get up from your computer.
Using features like an encrypted screen saver will make you feel very comfortable in this regard.
     Using the current operating system and anti-virus software to block remote access, configure the firewall.

Video 03

04 Password Security
The most important passwords from personal information that can be captured with many different methods and can be used to our detriment.
Because of this, password security is extremely important.
Therefore;
      Easy-to-guess (strong) passwords should be used,
      The passwords used are protected and shouldn't be shared,
      Occasionally changed,
      It mustn’t be in writing anywhere
      The anti-virus program should be kept up-to-date. 

Video 04

05 Software Installation and Update
It shouldn’t be forgotten! For the safety of your computer;
      You should update your operating system.
      You should follow the updates of the software you installed on your computer.
      Keep software away from your computer if you aren’t sure about the source.
      Staying away from dangerous websites is to stay away from malicious software.

Video 05

06 File Access and Sharing Security
You must take security precautions to protect your computer in any way, either by opening a share or using file-sharing software to allow others to access it.
For this;
1) Files or folders you share can be configured by taking into account which rights they should access.
2) Files with personal or sensitive information can be stored encrypted.
From time to time you need to audit the files or folders that you share and update the rights already granted. It is legally important to share files while using file sharing software.

Video 06

07 Backup
Loss of data may occur when experiencing software or hardware errors. Backup is to take measures to reduce information loss. The prominence of the backup is better understood after the loss of valuable information. However, being smart and backing up saves time and saves work, even if you are saddened behind the lost knowledge.
By copying your files or data to different media (such as CD, DVD, USB),
Backup software with backup.
Answering the question of when to back up and creating a backup plan is important for effective backup processes.

Video 07 

08 Harmful Programs
The harmful programs cause other people to have control over our computer. Our programs can break down, start to work like we want. Your files may be deleted. Our personal information may be in the hands of others.
Therefore;
We must use antivirus (antivirus) and antispyware (spyware protection) programs.
We need to keep antivirus and antispyware programs up-to-date.
We must keep our operating system up-to-date (we must make operating system patches).
We must use a safety wall.
We should pay attention to the sites we have entered and the files we have downloaded.
We must use licensed programs.
We should check the reliability of the content before opening the e-mails.

Video 08

09 Social Engineering
The danger may come from a place you never imagined, a place you never imagined.
Be cautious of the requests from people you don’t know, and don’t share your personal information (for example, your password) with anyone, including your system administrator, co-worker, or even your administrators.
Provide information security awareness training periodically to all the personnel in the institution.
Periodically perform information security tests, including social engineering attack testing, at your institution.

Video 09

10 Protection with Firewall
Nowadays there is a great increase in the access to personal information on computers and the stealing of this information.
In order to prevent unauthorized access to computers and to prevent information grief;
Our computer must build a security wall,
We should check if firewalls are enabled,
We must also use antivirus software with the consciousness that the firewall alone isn’t enough,
We need to keep firewalls and anti-virus software up-to-date.

Video 10

11 Web Security
Although the Internet makes our life easier in many ways, it can cause problems if used carelessly. It is important to be aware of the pitfalls that exist on the Internet and to pay attention to which web site can be trusted and how to act safely.
Particularly on the Internet, sensitive information must be shared with secure communication channels. Apart from this, it is necessary to take different measures. For example;
Pay attention to trap web sites and don’t visit untrusted websites.
Pay attention to the links sent by email messages.
It is necessary to use a pop-up blocker to protect yourself from malicious programs that may spread while browsing websites.
In addition to this, it is the job of the parents to ensure the safety of children and parents should take care to ensure that they are conscious users of themselves and their children as regards the measures that can be taken in this regard.

Video 11

12 E-Mail Security
E-mails that we use very often for communication during the day can be used to easily harm people, if they aren’t treated with caution, to cheat, and thereby gain economic benefits.
Therefore;
E-mail addresses shouldn’t be shared on all open web sites,
Any e-mails from people you don’t know shouldn’t be answered,
Personal and financial information shouldn’t be shared with anyone via e-mail,
Don’t click the links that may be in the e-mail,
Regardless of the content, you shouldn’t send any e-mail asking you to send it to anyone.
Current anti-virus and firewall software should be used.

Video 12


12 E-Mail Security
E-mails that we use very often for communication during the day can be used to easily harm people, if they aren’t treated with caution, to cheat, and thereby gain economic benefits.
Therefore;
E-mail addresses shouldn’t be shared on all open web sites,
Any e-mails from people you don’t know shouldn’t be answered,
Personal and financial information shouldn’t be shared with anyone via e-mail,
Don’t click the links that may be in the e-mail,
Regardless of the content, you shouldn’t send any e-mail asking you to send it to anyone.
Current anti-virus and firewall software should be used.

Video 13

Size daha iyi hizmet verebilmek için sitemizde çerezlere yer veriyoruz. Çerezlerle ilgili detaylı bilgi için çerez politikamıza göz atabilirsiniz. Detaylı bilgi için tıklayınız. Kabul ediyorum