Cyber Attack by TomerKelmer - Illustrated by Tomer Kelmer - Ourboox.com
This free e-book was created with
Ourboox.com

Create your own amazing e-book!
It's simple and free.

Start now

Cyber Attack

by

Artwork: Tomer Kelmer

  • Joined Jan 2019
  • Published Books 4

I, Tomer

Busy, beautiful,  Jew and critical,

Brother of Adi,

Lover of programming, driving and animals,

I feel happy when I hang out with friends,

I feel sad when my friends lie to me,

I feel scared whan I stay at home alon,

Who needs tv, xbox, friends,

who gives love, friendship, food,

who fears from being alone, spiders, monsters,

who would like to see A performance by Omer Adam, stand up comedy, movies,

Resident of Jerusalem, Dov Sadan

Kelmer.

2

Cyber attack is an attack from one or more computers against another computer or network of computers. Cyber attacks can be broken down into two broad types: attacks where the goal is to disable the target computer or making it offline, or attacks where the goal is to get access to the target computer’s data and control at the target computer.

Cyber attack also can be used to good goals like if the police want to catch a criminal so they can control at his computer and find where the criminal is.

3

My vidio

<iframe src=”https://vizia.co/videos/edf65e895c3e086eb5df12/embed” allowtransparency=”true” frameborder=”0″ scrolling=”no” width=”640″ height=”390″></iframe>

4

Game

http://www.yo-yoo.co.il/puzzle/

5

Reflection:

  1. I liked the part when we had to summarize an article on the subject I have chosen because it expanded my knowledge about the cyber attack.
  2. making the questions was the challenging part because I didn’t know if my questions were good enough.
  3. making the digital books were interesting and fun and a little bit hard.
  4. Next time I would like to make a project.
  5. I learn about my self that I know a lot of things about cyber
  6. I chose the tool Vizia, I like about it that you can ask questions during the video because this is the easiest way to make sure everybody is listening to you
6

Bibliography:

1. http://www.yo-yoo.co.il/puzzle/

2. https://vizia.co/videos/edf65e895c

3e086eb5df12

3. https://www.csoonline.com/article/3237324/cyber-attacks-espionage/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html

7
This free e-book was created with
Ourboox.com

Create your own amazing e-book!
It's simple and free.

Start now

Ad Remove Ads [X]
Skip to content