To make the flags, I used the application Inkscape, which is a vector design program. With this app, I used geometric shapes, lines, and colors to create the flags as accurately as possible. The flag I chose was the United States flag because it is very recognizable with its red and white stripes and stars. I also chose it because it helped me practice repeating elements, like the stars, and working with alignment and proportions. Overall, Inkscape is a useful tool because it allows you to create precise designs and is easy to use.
Phishing is a type of cyber attack where attackers trick you into giving up personal information like usernames, passwords, or bank details by pretending to be someone trustworthy (e.g., your bank, a friend, or a company).
Phishing usually comes in the form of:
Emails
Text messages (SMS phishing or "smishing")
Instant messages
Fake websites that look real
2.Good Links for Information
Here are some trusted sources where you can learn more:
Problem 1: Opening Suspicious Emails That Install Malware
1. Problem Description
Many cyberattacks start when people open emails that appear legitimate but are actually fake or dangerous. These emails might come from what looks like a friend, bank, delivery company, or tech service. They often contain links or attachments that, when clicked or opened, download malware onto your computer or mobile device.
Once malware is installed, it can:
Steal your passwords, photos, and files
Spy on your activities
Lock your data (ransomware)
Use your computer to attack others
This type of attack is extremely common and is often called a phishing attack.
2. Name and Definition of the Item
Item Name: Malware
Definition: Malware (short for malicious software) is software specifically designed to:
Damage, disrupt, or take control of a device
Spy on the user
Steal personal or financial data
Secretly run in the background without permission
Common types of malware include:
Viruses
Trojans
Spyware
Ransomware
Keyloggers
3. Good Links to Learn More
Here are some reliable sources to understand malware and how to prevent it:
Think before you click: If an email looks suspicious, don't open attachments or click links, even if it appears to come from someone you know.
2️⃣
Use antivirus software :Install and regularly update trusted antivirus software to detect and remove threats.
3️⃣
Keep your system updated : Regular updates fix security holes that hackers try to exploit.
4️⃣
Don’t download unknown files :Never download attachments from unknown or unexpected sources.
5️⃣
Check the sender's email address: A fake email might look real, but the sender's address may be slightly different or suspicious (e.g. @paypa1.com instead of @paypal.com).
Below is an example of how to show the results in a chart format (can be created using Excel or Google Sheets):
Sample Chart (Bar Chart or Table View)
Tip Number
Cybersecurity Tip Description
Votes
Tip #1
Think before you click
37
Tip #2
Use antivirus software
25
Tip #3
Keep your system updated
19
Tip #4
Don’t download unknown files
22
Tip #5
Check the sender’s email address
31
Most Voted Tip:Tip 1 - Think before you click
Summary
Opening suspicious emails can lead to malware infections that harm your computer, steal your personal information, and even cost you money. The good news is that simple steps, like staying alert, using antivirus tools, and avoiding unknown links or files, can help you stay safe.
I added these pages to the main menu for easy access. I disabled the comments on all static pages. I checked all the settings to ensure everything is properly configured.
I reviewed and improved the design and layout to make my blog look polished and function smoothly.