<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sainapei Lenapunya</title>
    <description>The latest articles on DEV Community by Sainapei Lenapunya (@sanaipei).</description>
    <link>https://dev.to/sanaipei</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1533079%2Fc6add097-0006-4d99-abfd-d93f14ac92d7.png</url>
      <title>DEV Community: Sainapei Lenapunya</title>
      <link>https://dev.to/sanaipei</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sanaipei"/>
    <language>en</language>
    <item>
      <title>Building and Deploying a Mentorship Platform with Django: A Journey from Local to Live</title>
      <dc:creator>Sainapei Lenapunya</dc:creator>
      <pubDate>Fri, 21 Mar 2025 18:03:13 +0000</pubDate>
      <link>https://dev.to/sanaipei/building-and-deploying-a-mentorship-platform-with-django-a-journey-from-local-to-live-1gfc</link>
      <guid>https://dev.to/sanaipei/building-and-deploying-a-mentorship-platform-with-django-a-journey-from-local-to-live-1gfc</guid>
      <description>&lt;p&gt;In this article, I’ll share my experience developing a mentorship platform using Django, focusing on the key features, user flow, and deployment process. The project was built using the Django Starter Template, and it includes a complete user flow, two user types, Progressive Web App (PWA) features, and Tailwind CSS for styling. After completing the development, I pushed the code to GitHub and deployed the app on Render.com&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Features and User Flow&lt;/strong&gt;&lt;br&gt;
The mentorship platform was designed to connect mentees and case managers, with two distinct user types: Mentees and Case Managers. Mentees can submit surveys and track their progress, while case managers can manage sessions, write reports, and view mentee surveys.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;User Flow&lt;/strong&gt;&lt;br&gt;
The app includes a complete user flow:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Registration&lt;/strong&gt;:&lt;br&gt;
 Users can sign up as either a mentee or a case manager via /users/register/. Upon registration, they are redirected to their respective dashboards (mentee:dashboard for mentees, case_manager:dashboard for case managers).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcfcu1m6krl4d028lfr2r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcfcu1m6krl4d028lfr2r.png" alt="Image description" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Login/Logout: Users log in at /users/login/ and log out at /users/logout/, with proper redirects to the login page after logout.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu44m6auypu0ezflffkn4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu44m6auypu0ezflffkn4.png" alt="Image description" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Password Reset: A password reset flow is implemented at /users/password_reset/, allowing users to reset their password via email (using Django’s built-in views and a console email backend for development).&lt;br&gt;
Password Change: Logged-in users can change their password at /users/password_change/.&lt;br&gt;
User Profiles with Profile Images&lt;br&gt;
Each user has a profile accessible at /users/profile/, where they can view and update their details. I extended the custom User model to include a profile image field:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;users/models.py (partial)&lt;/strong&gt;&lt;br&gt;
profile_image = models.ImageField(upload_to='profile_images/', null=True, blank=True)&lt;br&gt;
Users can upload a profile image during registration or update it later via the profile page. The image is displayed on their dashboard.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Styling with Tailwind CSS&lt;/strong&gt;&lt;br&gt;
The client-side was styled using Tailwind CSS, providing a modern and responsive design. I included Tailwind CSS via a CDN in the base template (templates/layout/base.html) and used its utility classes for consistent styling across all pages, such as the registration form, dashboards, and password reset pages.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fruam2tbaqd4mw7xv2kl4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fruam2tbaqd4mw7xv2kl4.png" alt="Image description" width="800" height="291"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deployment: GitHub and Render.com&lt;/strong&gt;&lt;br&gt;
After completing development, I pushed the project to GitHub for version control:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F971444hjrk185ei3mgiq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F971444hjrk185ei3mgiq.png" alt="Image description" width="800" height="159"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;GitHub Repository:[(&lt;a href="https://github.com/sanaipei001/django-starter-template.git)" rel="noopener noreferrer"&gt;https://github.com/sanaipei001/django-starter-template.git)&lt;/a&gt;]&lt;br&gt;
I then deployed the app on Render.com, a free hosting platform:&lt;/p&gt;

&lt;p&gt;Created a new web service on Render.com and connected it to my GitHub repository.&lt;br&gt;
Configured the build settings: Python 3.12, requirements.txt for dependencies, and python manage.py migrate as the start command.&lt;br&gt;
Set environment variables on Render.com (e.g., DEBUG=False, SECRET_KEY, and database settings).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7v9k4ied06is3zm3cj6h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7v9k4ied06is3zm3cj6h.png" alt="Image description" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb5vqa19hr1vxssupy3dx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb5vqa19hr1vxssupy3dx.png" alt="Image description" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Deployed the app, making it live at:[(&lt;a href="https://django-starter-template.onrender.com)" rel="noopener noreferrer"&gt;https://django-starter-template.onrender.com)&lt;/a&gt;]&lt;/p&gt;

&lt;p&gt;The deployment process was smooth, and the app is now accessible online with all features (registration, login, password reset, dashboards, etc.) fully functional.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5otml8m89e8z0li2cdhk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5otml8m89e8z0li2cdhk.png" alt="Image description" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
This project was an exciting journey, from building a mentorship platform with distinct user types (mentees and case managers) to implementing a complete user flow and PWA features. Using Tailwind CSS ensured a polished UI, while deploying on Render.com made the app accessible to users. The code is well-documented on GitHub, and the live app demonstrates the power of Django for building robust web applications.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>GitHub Basics: Creating Repository and Maintaining It</title>
      <dc:creator>Sainapei Lenapunya</dc:creator>
      <pubDate>Mon, 27 May 2024 08:59:31 +0000</pubDate>
      <link>https://dev.to/swahilipotdevs/github-basics-creating-repository-and-maintaining-it-4i04</link>
      <guid>https://dev.to/swahilipotdevs/github-basics-creating-repository-and-maintaining-it-4i04</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716796035466_file.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716796035466_file.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Table of content:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Definition&lt;/li&gt;
&lt;li&gt;Requirements&lt;/li&gt;
&lt;li&gt;Creating a new Repository&lt;/li&gt;
&lt;li&gt; Maintaining a Repository

&lt;ul&gt;
&lt;li&gt;      Fork the repository&lt;/li&gt;
&lt;li&gt;      Clone the repository&lt;/li&gt;
&lt;li&gt;      Create a branch&lt;/li&gt;
&lt;li&gt;      Initializing a repository&lt;/li&gt;
&lt;li&gt;      Adding files to the repository&lt;/li&gt;
&lt;li&gt;      Make an Initial Commit&lt;/li&gt;
&lt;li&gt;      Push changes to your repository &lt;/li&gt;
&lt;li&gt;      Pull requests&lt;/li&gt;
&lt;li&gt;      Renaming a repository&lt;/li&gt;
&lt;li&gt;      Transferring a repository&lt;/li&gt;
&lt;li&gt;      Deleting a repository&lt;/li&gt;
&lt;li&gt;      Restoring a deleted repository&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Conclusion&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Useful resources&lt;/li&gt;
&lt;/ol&gt;


&lt;/li&gt;

&lt;/ol&gt;

&lt;p&gt;Definition&lt;/p&gt;

&lt;p&gt;GitHub is a web-based tool for version control and collaboration. It provides developers with an easy-to-use interface for creating repositories (remote storage sites), tracking code changes over time (version control), and collaborating on projects with others.&lt;/p&gt;

&lt;p&gt;Requirements&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub Account&lt;/li&gt;
&lt;li&gt;Git Installed&lt;/li&gt;
&lt;li&gt;Text Editor or IDE&lt;/li&gt;
&lt;li&gt;Basic Command Line Skills&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;Creating a new repository&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As a prerequisite you need a GitHub account to be able to create a repository.&lt;/p&gt;

&lt;p&gt;Creating  a GitHub account&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Navigate to &lt;a href="https://github.com/" rel="noopener noreferrer"&gt;https://github.com/&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Click Sign up.&lt;/li&gt;
&lt;li&gt;Follow the prompts to create your personal account.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;During sign up, you'll be asked to verify your email address. Without a verified email address, you won't be able to complete some basic GitHub tasks, such as creating a repository.&lt;br&gt;
If you're having problems verifying your email address, there are some troubleshooting steps you can take. For more information, see "Verifying your email address."&lt;/p&gt;

&lt;p&gt;Creating a new repository from the web UI&lt;br&gt;
step 1-;&lt;br&gt;
Once you have GitHub account,  In the upper-right corner of your page, click the + sign .&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716379864701_github%2Brepo1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716379864701_github%2Brepo1.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2-:&lt;br&gt;
On the drop down list, click on the  New repository option.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716380048718_github%2Brepo2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716380048718_github%2Brepo2.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3-;&lt;br&gt;
Use the Owner drop-down menu to choose the account that will own the repository.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716380284935_github%2Brepo3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716380284935_github%2Brepo3.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 4-:&lt;br&gt;
In the repository name field, enter a name for your repository and optionally provide a description. Select the desired repository visibility, then click the "Create repository" button at the bottom of the page.&lt;/p&gt;

&lt;p&gt;For example-;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716380814631_githubrepo4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716380814631_githubrepo4.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 5-;&lt;br&gt;
At this point, you have successfully created a new repository using the web UI.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716381027036_githubrepo5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_EE40DE016CCBB8ED67839E43DFBFF1CAF40900E02C4A5ACF09645F222AF3C1BB_1716381027036_githubrepo5.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Maintaining a  Repository&lt;/li&gt;
&lt;li&gt; Fork the repository&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Fork the repository by clicking the fork button on the top of the page. This will create an instance of that entire repository in your account.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Ffork-1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Ffork-1.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Clone the repository&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To work with the repository locally, clone it to your machine. Click on the "Code" button and copy the provided link.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fclone1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fclone1.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Open the terminal and run the following command. It will clone the repository locally.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ git clone [HTTPS ADDRESS]
For example


$ git clone hhtps://github.com/ThanoshanMV/articles-of-the-week.git
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fclone2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fclone2.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we have set up a copy of the master branch from the main online project repository.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ cd [NAME OF REPOSITORY]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716811359147_file.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716811359147_file.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Create a branch&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It’s good practice to create a new branch when working with repositories, whether it’s a small project or contributing to a group's work.&lt;br&gt;
Branch name should be short and it should reflect the work we’re doing.&lt;br&gt;
Now create a branch using the &lt;code&gt;git checkout&lt;/code&gt; command:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ git checkout -b [Branch Name]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fbranch1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fbranch1.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Initializing a repository: &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To initialize a new Git repository, open the terminal, navigate to the root directory of your project, and execute git init. This command initializes an empty Git &lt;br&gt;
repository in the specified directory and generates a .git sub-directory that contains versioning information.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_BE26B31FA8ACA69A8DA80E5A511CCBE5BFC7C92A0BD8E15E54E328F07AA7FAD6_1716797776090_Screenshot%2B5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_BE26B31FA8ACA69A8DA80E5A511CCBE5BFC7C92A0BD8E15E54E328F07AA7FAD6_1716797776090_Screenshot%2B5.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Adding files to the repository&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Make essential changes to the project and save it.&lt;br&gt;
Then execute &lt;code&gt;git status&lt;/code&gt; , and you’ll see the changes.&lt;br&gt;
Use the &lt;code&gt;git add&lt;/code&gt; &lt;code&gt;.&lt;/code&gt; command to add your project files to the repository after it has been initialized. For instance, you may use git add . to add all files in the repository. The files are ready to be included in the subsequent commit at this point.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_CB69381EC21DE24566352E297717B7D6F7F46AFC9B02D51CD983123CFA753CF3_1716804715382_file.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_CB69381EC21DE24566352E297717B7D6F7F46AFC9B02D51CD983123CFA753CF3_1716804715382_file.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Make an Initial Commit&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Use the &lt;code&gt;git commit -m "Initial commit message"&lt;/code&gt;     command to generate an initial commit once you have added the required files. Commits are a snapshot of the project at a particular moment in time and ought to have a detailed message detailing the modifications that were made.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Push changes to your repository &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In order to push the changes to GitHub, we need to identify the remote’s name.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ git remote
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fremote.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fremote.png" alt="remote"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For this repository the remote’s name is “origin”.&lt;br&gt;
After identifying the remote’s name we can safely push those changes to GitHub.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;On GitHub.com, navigate to the main page of the repository.&lt;/li&gt;
&lt;li&gt;Above the list of files, click Code.&lt;/li&gt;
&lt;li&gt;To clone your repository using the command line using HTTPS, under "Quick setup", copy link . To clone the repository using an SSH key, including a certificate issued by your organization's SSH certificate authority, click SSH, then copy link .&lt;/li&gt;
&lt;li&gt;Open Terminal .&lt;/li&gt;
&lt;li&gt;Change the current working directory to the location where you want the cloned directory.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_CB69381EC21DE24566352E297717B7D6F7F46AFC9B02D51CD983123CFA753CF3_1716805735661_file.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_CB69381EC21DE24566352E297717B7D6F7F46AFC9B02D51CD983123CFA753CF3_1716805735661_file.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;git push origin [Branch Name]
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ol&gt;
&lt;li&gt;Pull requests&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To create a pull request that is ready for review, click Create Pull Request. To create a draft pull request, use the drop-down and select Create Draft Pull Request, then click Draft Pull Request.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fcompare.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.freecodecamp.org%2Fnews%2Fcontent%2Fimages%2F2020%2F01%2Fcompare.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Renaming a repository&lt;/li&gt;
&lt;li&gt;On GitHub.com, navigate to the main page of the repository.&lt;/li&gt;
&lt;li&gt;Under your repository name, click  Settings. If you cannot see the "Settings" tab, select the  drop-down menu, then click Settings.
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454189564_Screenshot%2B19.png"&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;- In the Repository Name field, type the new name of your repository.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454401165_Screenshot%2B20.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454401165_Screenshot%2B20.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Click Rename.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ul&gt;
&lt;li&gt;Warning: If you create a new repository under your account in the future, do not reuse the original name of the renamed repository. If you do, redirects to the renamed repository will no longer work.&lt;/li&gt;
&lt;li&gt;Transferring a repository&lt;/li&gt;
&lt;li&gt;When you transfer a repository that you own to another personal account, the new owner will receive a confirmation email. The confirmation email includes instructions for accepting the transfer. If the new owner doesn't accept the transfer within one day, the invitation will expire.

&lt;ol&gt;
&lt;li&gt;On GitHub.com, navigate to the main page of the repository.&lt;/li&gt;
&lt;li&gt;Under your repository name, click  Settings. If you cannot see the "Settings" tab, select the  drop down menu, then click Settings.&lt;/li&gt;
&lt;li&gt;
&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454189564_Screenshot%2B19.png"&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;1. At the bottom of the page, in the "Danger Zone" section, click Transfer.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454289159_Screenshot%2B21.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454289159_Screenshot%2B21.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Read the information about transferring a repository, then under "New owner", choose how to specify the new owner.&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;    - To choose one of your organizations, select “Select one of my organizations.”

        - Select the drop-down menu and click an organization.
        - Optionally, in the "Repository name" field, type a new name for the repository.
        - Note: You must be an owner of the target organization to rename the repository.

    - To specify an organization or username, select Specify an organization or username, then type the organization name or the new owner's username.
&lt;/code&gt;&lt;/pre&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Read the warnings about potential loss of features depending on the new owner's GitHub subscription.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Following “Type Repository Name to confirm”,  type the name of the repository you'd like to transfer, then click I understand, transfer this repository.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Deleting a repository&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;On GitHub.com, navigate to the main page of the repository.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Under your repository name, click  Settings. If you cannot see the "Settings" tab, select the  drop-down menu, then click Settings.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454189564_Screenshot%2B19.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716454189564_Screenshot%2B19.png"&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;- On the "General" settings page (which is selected by default), scroll down to the "Danger Zone" section and click Delete this repository.
- Click I want to delete this repository.
- Read the warnings and click I have read and understand these effects.
- To verify that you're deleting the correct repository, in the text box, type the name of the repository you want to delete.
- Click Delete this repository.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ol&gt;
&lt;li&gt;Restoring a deleted repository&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Some deleted repositories can be restored within 90 days of deletion. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;In the upper-right corner of any page, click your profile photo, then click Settings.&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716453361266_Screenshot%2B18.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716453361266_Screenshot%2B18.png"&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In the "Code planning, and automation" section of the sidebar, click  Repositories.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Under "Repositories", click Deleted repositories.&lt;br&gt;
Next to the repository you want to restore, click Restore.&lt;br&gt;
Read the warning, then click I understand, restore this repository.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716453151007_Screenshot%2B17.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_38FC6ABDD3D8682B66D8DFE51B556581B97E7925E3BA8C4888A806AB24F56E1C_1716453151007_Screenshot%2B17.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; Conclusion&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Repositories on GitHub are an effective tool for organizing and working together on software projects. Developers may assure project transparency and version control, promote teamwork, and expedite workflows by adhering to best practices when creating, organizing, and managing repositories. Leveraging GitHub repository capabilities can greatly improve code quality and efficiency, whether working on a team project or a personal one.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Useful Resources&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Official GitHub Documentation&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub Docs: &lt;a href="https://docs.github.com/en" rel="noopener noreferrer"&gt;https://docs.github.com/en&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Creating a repository: &lt;a href="https://docs.github.com/en/repositories/creating-and-managing-repositories/creating-a-new-repository" rel="noopener noreferrer"&gt;https://docs.github.com/en/repositories/creating-and-managing-repositories/creating-a-new-repository&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Managing repositories: &lt;a href="https://docs.github.com/en/repositories" rel="noopener noreferrer"&gt;https://docs.github.com/en/repositories&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Git and GitHub Learning Resources&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Git Handbook: &lt;a href="https://guides.github.com/introduction/git-handbook/" rel="noopener noreferrer"&gt;https://guides.github.com/introduction/git-handbook/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;GitHub Learning Lab: &lt;a href="https://lab.github.com/" rel="noopener noreferrer"&gt;https://lab.github.com/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Git &amp;amp; GitHub Crash Course for Beginners (Video): &lt;a href="https://www.youtube.com/watch?v=RGOj5yH7evk" rel="noopener noreferrer"&gt;https://www.youtube.com/watch?v=RGOj5yH7evk&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorials and Guides&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub Guides: &lt;a href="https://guides.github.com/" rel="noopener noreferrer"&gt;https://guides.github.com/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;GitHub Skills: &lt;a href="https://skills.github.com/" rel="noopener noreferrer"&gt;https://skills.github.com/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FreeCodeCamp GitHub Tutorial: &lt;a href="https://www.freecodecamp.org/news/git-and-github-for-beginners/" rel="noopener noreferrer"&gt;https://www.freecodecamp.org/news/git-and-github-for-beginners/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Books&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;"Pro Git" by Scott Chacon and Ben Straub (free online book): &lt;a href="https://git-scm.com/book/en/v2" rel="noopener noreferrer"&gt;https://git-scm.com/book/en/v2&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;"GitHub For Dummies" by Sarah Guthals and Phil Haack&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Community and Forums&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub Community: &lt;a href="https://github.community/" rel="noopener noreferrer"&gt;https://github.community/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Stack Overflow (GitHub tag): &lt;a href="https://stackoverflow.com/questions/tagged/github" rel="noopener noreferrer"&gt;https://stackoverflow.com/questions/tagged/github&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Cybersecurity Basics: Beginner’s Guide</title>
      <dc:creator>Sainapei Lenapunya</dc:creator>
      <pubDate>Mon, 27 May 2024 08:42:44 +0000</pubDate>
      <link>https://dev.to/swahilipotdevs/cybersecurity-basics-beginners-guide-381d</link>
      <guid>https://dev.to/swahilipotdevs/cybersecurity-basics-beginners-guide-381d</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_CA9879FF30D8A5FA4A996F24CB187B7F353DE1BCED1CF3D1C0C7B998A4E0BFC7_1716794583362_file.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fpaper-attachments.dropboxusercontent.com%2Fs_CA9879FF30D8A5FA4A996F24CB187B7F353DE1BCED1CF3D1C0C7B998A4E0BFC7_1716794583362_file.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Table of Content:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Definition&lt;/li&gt;
&lt;li&gt;Requirements&lt;/li&gt;
&lt;li&gt;CIA Triad&lt;/li&gt;
&lt;li&gt;The Importance of Cybersecurity&lt;/li&gt;
&lt;li&gt;The Advantages of Cybersecurity&lt;/li&gt;
&lt;li&gt;Disadvantages of Cybersecurity&lt;/li&gt;
&lt;li&gt;Common Threats&lt;/li&gt;
&lt;li&gt;Common Types of  Attacks&lt;/li&gt;
&lt;li&gt;Vulnerabilities&lt;/li&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Useful Resources&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Definition&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cybersecurity is the process of safeguarding your devices, data, and online presence against unauthorized access, use, disclosure, disruption, alteration, or destruction. It's like installing a security system in your digital life to protect your data.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Requirements&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Generally, you need some knowledge in some areas to understand cybersecurity as it encompasses several types of skills and basics . These may include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Basic Computer Skills&lt;/li&gt;
&lt;li&gt;Networking Knowledge&lt;/li&gt;
&lt;li&gt;Programming Knowledge&lt;/li&gt;
&lt;li&gt;Understanding of Security Principles&lt;/li&gt;
&lt;li&gt;Information Security&lt;/li&gt;
&lt;li&gt;System Security&lt;/li&gt;
&lt;li&gt;Network Security&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;CIA Triad&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The security of any organization starts with three principles: Confidentiality, Integrity and Availability. Next in this cyber security for beginners tutorial we will learn about the CIA Triad, which has served as the industry standard for computer security since the time of first mainframes.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.simplilearn.com%2Fice9%2Ffree_resources_article_thumb%2Fcia_triad.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fwww.simplilearn.com%2Fice9%2Ffree_resources_article_thumb%2Fcia_triad.png" alt="Fig: CIA triad"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Confidentiality-The principle of confidentiality asserts that only authorized parties can access sensitive information and functions. Example: military secrets.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Integrity- The principle of integrity asserts that only authorized people and means can alter, add, or remove sensitive information and functions. Example: a user entering incorrect data into a database.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Availability-The principle of availability asserts that systems, functions, and data must be available on-demand according to agreed-upon parameters based on levels of service.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;Importance of Cybersecurity:&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Safeguards Personal Information- Prevents theft and illegal access to sensitive data, including financial, health, and personal information&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Maintains Reputation-Prevents security mishaps or data exposures that could erode trust among stakeholders, clients, and customers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Boosts Output-Prevents downtime brought on by cyber incidents that could impair production by guaranteeing the uninterrupted operation of networks and systems.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Supports Remote Work-Enables flexible work schedules without sacrificing security by providing remote workers with secure access to company networks and data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Regulation Adherence-Assists companies in meeting legal and regulatory obligations around cybersecurity and data protection.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Strengthens Cyber Stance-Strengthens an organization's defenses against cyber threats and assaults by enhancing its overall cybersecurity posture.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Better Data Handling- Guarantees integrity, confidentiality, and availability through secure storage, transmission, and processing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Advantages of Cybersecurity &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Cybersecurity is no longer an optional issue; it is a necessary expenditure for businesses of all sizes. Here are some significant benefits of establishing effective cybersecurity measures, backed up by research and articles:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Cost Savings-Data breaches can be quite costly. According to the IBM Cost of a Data Breach Report 2023 (&lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener noreferrer"&gt;https://www.ibm.com/reports/data-breach&lt;/a&gt;), the global average overall cost of a data breach in 2023 is $4.35 million. Strong cybersecurity may considerably reduce the danger of such breaches, saving your firm significant money. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Competitive Advantage-According to a PwC research, 73% of customers prefer to do business with companies that prioritize data protection. Demonstrating a commitment to cybersecurity increases trust among customers and partners, giving a competitive advantage.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Innovation support-A 2022 Harvard Business Review article (&lt;a href="https://hbr.org/insight-center/the-future-of-cybersecurity" rel="noopener noreferrer"&gt;https://hbr.org/insight-center/the-future-of-cybersecurity&lt;/a&gt;) addresses how cybersecurity is critical for driving innovation. By building a secure environment, businesses may confidently explore new technologies and digital transformation efforts without fear of security concerns. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Customer confidence-According to an Accenture study (&lt;a href="https://www.accenture.com/us-en/case-studies/about/creating-culture-security" rel="noopener noreferrer"&gt;https://www.accenture.com/us-en/case-studies/about/creating-culture-security&lt;/a&gt;), organizations with excellent cybersecurity procedures have higher customer satisfaction and loyalty. Customers feel more comfortable exchanging information and doing business with a safe corporation. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Risk Management-A 2021 report by the Cybersecurity and Infrastructure Security Agency (CISA) &lt;a href="https://www.cisa.gov/topics/risk-management" rel="noopener noreferrer"&gt;https://www.cisa.gov/topics/risk-management&lt;/a&gt; emphasizes the necessity of cybersecurity risk management in proactively identifying, assessing, and mitigating cyber threats. Implementing a strong cybersecurity plan may greatly reduce the likelihood and effect of security breaches on your company.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Business continuity-Uninterrupted Operations, that is cyberattacks can disrupt business operations and result in considerable downtime. A 2023 analysis by Datto &lt;a href="https://www.linkedin.com/pulse/what-2023-datto-ransomware-report-says-SMBS-dale-shulmistra" rel="noopener noreferrer"&gt;https://www.linkedin.com/pulse/what-2023-datto-ransomware-report-says-SMBS-dale-shulmistra&lt;/a&gt; The average downtime caused by a ransomware attack is 21 days. Strong cybersecurity procedures can assist ensure that your company can continue to operate even after a hack happens.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Disadvantages of cybersecurity&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;While cybersecurity provides enormous benefits, there are some obstacles to consider, as backed by research and articles-:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Needs Continuous Learning- the cybersecurity landscape is ever-changing, with new threats appearing all the time. The 2022 ISC Cybersecurity Workforce Report (&lt;a href="https://www.isc2.org/research" rel="noopener noreferrer"&gt;https://www.isc2.org/research&lt;/a&gt;) emphasizes the importance of cybersecurity experts being current on the latest threats and vulnerabilities. Your security personnel must study and train on a continuous basis. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Complicated to Setup- i.e. specific skills- Implementing effective cybersecurity measures frequently necessitates specific knowledge and expertise. A 2021 article in SearchSecurity (Why Cybersecurity is Hard: Challenges Businesses Face) &lt;a href="https://www.techtarget.com/searchsecurity/" rel="noopener noreferrer"&gt;https://www.techtarget.com/searchsecurity/&lt;/a&gt; examines the difficulty of establishing security architectures and technologies.  Businesses may need to hire cybersecurity professionals or outsource these tasks, which can be costly.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Potential performance impact- Certain cybersecurity tools and processes may use system resources, affecting performance. Finding the correct combination of security and performance is critical. There are two resources to consider,&lt;br&gt;
NSS Labs' 2023 Endpoint Detection and Response (EDR) Group Test (&lt;a href="https://nsslabs.com/tested-technologies/endpoint-detection-response/" rel="noopener noreferrer"&gt;https://nsslabs.com/tested-technologies/endpoint-detection-response/&lt;/a&gt;). compared the performance of several endpoint detection and response (EDR) solutions. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A 2017 report by the Cybersecurity and Infrastructure Security Agency (CISA) (The Impact of Cybersecurity on Small Businesses). &lt;a href="https://www.cisa.gov/cyber-guidance-small-companies" rel="noopener noreferrer"&gt;https://www.cisa.gov/cyber-guidance-small-companies&lt;/a&gt; investigates the trade-offs between security controls and system performance, focusing on small firms.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Talent Shortage-There is a global scarcity of cybersecurity specialists. According to Cybersecurity Ventures' 2023 research (Cybersecurity positions Market 2023-2028 Forecast) &lt;a href="https://cybersecurityventures.com/stats/" rel="noopener noreferrer"&gt;https://cybersecurityventures.com/stats/&lt;/a&gt;, there will be 3.3 million unfilled cybersecurity positions in the world by 2023. This shortfall can make it challenging for businesses to find and keep the talent they require. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;High Costs- Cybersecurity necessitates continual investments in technology, training, and personnel. This can be a challenge for small and medium-sized businesses (SMBs) with limited resources.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Ponemon Institute (2023 Cost of a Data Breach Report) &lt;a href="https://www.ponemon.org/" rel="noopener noreferrer"&gt;https://www.ponemon.org/&lt;/a&gt; investigated the financial impact of data breaches, emphasizing the potential cost savings associated with strong cybersecurity policies. &lt;/p&gt;

&lt;p&gt;A report by Gartner (Cost Optimization for Security Programs) &lt;a href="https://www.gartner.com/en/insights/cost-optimization" rel="noopener noreferrer"&gt;https://www.gartner.com/en/insights/cost-optimization&lt;/a&gt; provides recommendations for optimizing cybersecurity spending, particularly for organizations with limited budgets.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Common Threats&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Phishing scams&lt;br&gt;
These are deceptive emails or messages that attempt to fool one into providing personal information or clicking on dangerous links.&lt;/p&gt;

&lt;p&gt;Example: You receive an email that appears to be from your bank, warning about suspicious activity on your account. The email prompts you to click a link and log in to verify your identity. However, the link leads to a fake website designed to steal your login credentials.&lt;/p&gt;

&lt;p&gt;Estimated Occurrences- Millions per year. According to a report by PhishLabs &lt;a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish" rel="noopener noreferrer"&gt;https://www.proofpoint.com/us/resources/threat-reports/state-of-phish&lt;/a&gt;, there were over 26.8 billion phishing attempts detected in 2022.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Malware&lt;br&gt;&lt;br&gt;
This is a malicious software (viruses, worms, etc.) that can infect your devices, steal data, or disrupt operations(Stytz &amp;amp; Banks, 2006).&lt;/p&gt;

&lt;p&gt;Example: You download a seemingly harmless free software program from an untrusted source. Once installed, the program secretly installs malware on your computer that encrypts your files, demanding a ransom payment to decrypt them. This is a common example of ransomware, a specific type of malware.&lt;/p&gt;

&lt;p&gt;Estimated Occurrences: Billions per year. A report by Cybersecurity Ventures &lt;a href="https://cybersecurityventures.com/ransomware-report-2021/" rel="noopener noreferrer"&gt;https://cybersecurityventures.com/ransomware-report-2021/&lt;/a&gt; predicts global ransomware damage costs will reach $26 billion USD by 2026.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Computer hacking &lt;br&gt;
It alludes to attempts made without authorization to enter networks or computer systems.&lt;/p&gt;

&lt;p&gt;Example: Hackers exploit a security vulnerability in a company's database, gaining access to customer information such as credit card details and personal data. This information can be sold on the black market or used for further fraudulent activities.&lt;/p&gt;

&lt;p&gt;Estimated Occurrences: Millions per year. According to the Identity Theft Resource Center &lt;a href="https://www.idtheftcenter.org/post/2022-annual-data-breach-report-reveals-near-record-number-compromises/" rel="noopener noreferrer"&gt;https://www.idtheftcenter.org/post/2022-annual-data-breach-report-reveals-near-record-number-compromises/&lt;/a&gt;, there were over 1,800 data breaches reported in the US alone in 2022.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Social Engineering-Deception, Not Force. &lt;br&gt;
This is a method used by hackers to trick people into disclosing sensitive information or performing activities that jeopardize their security. Unlike hacking, which exploits technological flaws in systems, social engineering preys on human trust and vulnerability.&lt;/p&gt;

&lt;p&gt;Example: You receive a phone call from someone claiming to be from your internet service provider (ISP). They inform you of a problem with your account and request remote access to your computer to fix it. In reality, the caller is a social engineer trying to gain control of your device and potentially steal sensitive information.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Vishing&lt;br&gt;
This is a short for "voice phishing". A type of social engineering attack where cyber criminals use phone calls to trick individuals into providing sensitive information or performing actions that compromise their security. The attackers typically pretend to be representatives from legitimate organizations such as banks, government agencies, or tech support services to gain the victim's trust. &lt;/p&gt;

&lt;p&gt;Example: You receive a voicemail from someone claiming to be from the government, stating that there's an issue with your tax return and urging you to call a specific number to resolve it. The number connects you to a scammer who attempts to pressure you into revealing your social security number or making a fraudulent payment.&lt;/p&gt;

&lt;p&gt;Estimated Occurrences: Millions per year. The Federal Trade Commission (FTC) &lt;a href="https://reportfraud.ftc.gov/" rel="noopener noreferrer"&gt;https://reportfraud.ftc.gov/&lt;/a&gt; receives hundreds of thousands of vishing complaints annually in the US.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Smishing&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Like phishing emails, smishing employs SMS text messages to deceive victims. You may receive a notice about a bogus parcel delivery issue or a tempting offer that demands you to    click on a malicious website or supply sensitive information. &lt;/p&gt;

&lt;p&gt;Example: You receive a text message claiming you won a prize in a contest you never entered. The message includes a link to a website where you need to provide your personal details to claim the prize. Clicking the link takes you to a fake website designed to steal your information.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Pretexting&lt;br&gt;
In this case, the attacker fabricates a story to earn your trust and access to sensitive data. For example, they could act as a tech support agent calling to "fix" an issue with your computer, eventually luring you into giving them remote access or divulging passwords.&lt;/p&gt;

&lt;p&gt;Example: You receive a call from someone claiming to be from a charity organization. They provide a sob story and pressure you into donating money over the phone. However, the caller is a fraudster who will pocket the donation instead of directing it to a legitimate cause.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Common Types of Attacks:&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;There are mainly five types of attacks-;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Distributed denial of service(DDoS) - Through flooding the traffic used to access resources, it is an attack designed to prevent a user from using those resources. Every bot under the control of a botnet is managed by a botnet controller. The attacker instructs the botnet controller to launch a bot attack on a server, flooding it with bot traffic. The website's traffic will be so heavy that a person attempting to visit it will be unable to do so. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Email attacks - there are three types of Email attacks&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;- Phishing- Usually through email, the attackers sends bait, it motivates people to divulge personal information

- Spoofing- The assailant posses as a different individual or entity and sending you an email purporting to be authentic.

- Email Attachment- Emails can be used to send files. These files could be documents, files, audio or pictures. You receive an email from attackers urging you to open the attached files.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ol&gt;
&lt;li&gt;Password attacks - &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;There are five different kinds of password assaults that exist-:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Dictionary attack: With this technique, we use the dictionary to handle all potential passwords.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Brute force: This technique uses trial and error to figure out how to decode the data or password. It takes the longest to execute this attack.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Keylogger: A keylogger does exactly what its name implies—it logs every keystroke made on a keyboard. Keyloggers are used by most hackers to obtain passwords and account information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Shoulder surfing: By peering over the user's shoulder, the attackers can see what's on their keyboard.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Rainbow table: Precomputed hash values can be found in rainbow tables. Attackers utilize this table to determine the user's password.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ol&gt;
&lt;li&gt;Malware Attack

&lt;ul&gt;
&lt;li&gt;This is a malicious program or software that disrupts or damages the computer. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;- There are various types of malware.
    - Virus: A computer virus is a malicious code that replicates by copying itself to another program or document and changes how a computer works. The virus requires someone to knowingly or unknowingly spread the infection without the knowledge or permission of a user or system administrator. An example of a virus is the Melissa virus.

    - Worms: These are standalone programs that run independently and infect systems. For example, W32.Alcra.F is a worm that propagates through network share devices.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Essential Practices.&lt;br&gt;
    1. Use of Strong Passwords&lt;br&gt;
    Create unique and complex passwords for each online account(CISA, 2023). Consider using a password manager to help you keep track.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;2.  Regular Software Updates
Regularly update your operating systems, browsers, and software applications to patch security vulnerabilities.

3.  Beware of Suspicious Links
Don't click on links or attachments in emails or messages from unknown senders.

4.  Secure Wi-Fi
Avoid using public Wi-Fi for sensitive activities like online banking. If you must use it, consider a VPN (Virtual Private Network) for added security.

5. Antivirus Software
 Install and maintain reputable antivirus software on your devices to help detect and prevent malware infections.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Internal threats consists of-:&lt;br&gt;
    1.Employee Negligence: Unintentional actions or mistakes made by employees, such as clicking on malicious links or failing to follow security protocols, which can lead to security breaches.&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;2.Insider Threats: Malicious actions taken by individuals within an organization, such as disgruntled employees or contractors, to steal data, sabotage systems, or cause harm.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;ol&gt;
&lt;li&gt;Vulnerabilities&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Explaining common vulnerabilities in systems and networks helps users understand the potential weak points that cyber attackers exploit, enabling them to develop effective strategies to safeguard against such threats and enhance overall cybersecurity.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;By implementing these foundational cybersecurity practices, you can significantly reduce your risk of falling victim to cyber threats. Remember, cybersecurity is an ongoing process, so stay informed and adapt to new challenges as they arise.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Useful Resources&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;CISA. (2023). Cybersecurity Best Practices | Cybersecurity and Infrastructure Security Agency CISA. Www.cisa.gov. &lt;a href="https://www.cisa.gov/topics/cybersecurity-best-practices" rel="noopener noreferrer"&gt;https://www.cisa.gov/topics/cybersecurity-best-practices&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Stytz, M. R., &amp;amp; Banks, S. B. (2006). Personal privacy, information assurance, and the threat posed by malware techology. Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE. &lt;a href="https://doi.org/10.1117/12.665344" rel="noopener noreferrer"&gt;https://doi.org/10.1117/12.665344&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Top 8 Cyber Security Vulnerabilities. (n.d.). Check Point Software. Retrieved May 23, 2024, from &lt;a href="https://www.checkpoint.com/cyber-hub/cyber-security/top-8-cyber-security-vulnerabilities" rel="noopener noreferrer"&gt;https://www.checkpoint.com/cyber-hub/cyber-security/top-8-cyber-security-vulnerabilities&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
