Posts

Secondary Research

Image
Secondary research is a research which is based on articles, books📖, videos and online journals which are done by others.💫💦   According to my secondary research, I found a lot of information from other's research and what they know about CYBER ATTACK.Which has really me to gather a lot of information about Cyber Attack                                                             Source: Cyber Attack   Cyberattacks can disrupt, damage and even destroy businesses. The average cost of a data breach is USD 4.88 million . This price tag includes the costs of discovering and responding to the violation, downtime and lost revenue, and the long-term reputational damage to a business and its brand. Ibm (2025) W...

Gantt

Image
 This image below show the Gantt of My Blogg

Primary Research

Image
 How I create my Google Forms Firstly : I signed into my google account and then searched for google form This is my google forms:  Google Form *The questions was related to cybersecurity awareness and personal experience with cyber threats *Examples 6 out of the 10 people have experience phishing messages            Below image are the question I asked about Cyber attack                           There comes another question I aske during the research *Examples 6 out of the 10 people have experience phishing messages So it is important to understand that prevention not about achieving 100% security. According to the research conducted 40% of the people believed that there is chance for prevention and 10% said No and 50% fully believed there is a possibility. Again 50% of the people believe that cyberattack are common there days.30% said No and 20% had no idea. 60% of the people...

Introduction Cyber Attack

Image
Source:  A World Of Possibilities A WORLD OF POSISBILITIES , where everything is possible to happen. There is a possibilities that cyber attack are much more likely to occur to everyone. Does this make sense or do yo agree with me?  when hackers breach defenses to gain unauthorized access into computers, phones, tablets, IoT devices, networks, or entire computing systems. This more likely to happened through mundane errors like a user choosing the default password on something like a router.                                                  This blog will talk about CYBERATTACK. But first what do you know about cyberattack? Please comment.🙏 Source:   In our days, one of the most scary and dangerous thing that happen to anyone is when they wake in the morning and realized that all their personal information has been stolen. Do you agree with m...

Welcome to Bright cyberattack Blog

Image
 Hello everyone, I'm Bright  Fosu Adjei, the voice in command of Bright Cyberattack Blog. Am from Ghana. Have you heard much about my country Ghana. And do you know that Ghana is the second-most popular country in west Africa. The capital and largest city in Ghana is Accra . The Ghana flag is one of the most beautiful Flag in the west Africa countries.                                           Source:  Independent Square Am currently am living in the UK studying Computing at the DE MONTFORT UNIVERSITY INTERNATIONAL COLLEGE (DMUIC) in Leicester City. Well am the last born of my parents and I have three elder siblings as well.                                                      Source:  DMU Playing Drums and listening to Sermons are...