-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathsecond.html
More file actions
59 lines (57 loc) · 2.83 KB
/
second.html
File metadata and controls
59 lines (57 loc) · 2.83 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>tuotos.com</title>
<link rel="stylesheet" href="styles.css">
<link href="https://cdn.jsdelivr.net/npm/bootstrap@5.2.3/dist/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-rbsA2VBKQhggwzxH7pPCaAqO46MgnOM80zW1RWuH61DGLwZJEdK2Kadq2F9CUG65" crossorigin="anonymous">
</head>
<body>
<header>tuotos.com</header>
<div class="bg-img">
<div class="container">
<div class="topnav">
<div>
<a href="index.html">News</a>
</div>
<div>
<a href="second.html" class="current">CyberSecurity</a>
</div>
<div>
<a href="third.html">Links</a>
</div>
<div>
<a href="fourth.html">Contact</a>
</div>
</div>
</div>
</div>
<div class="content">
<div class="content-container">
<div>
<h1>What is Cyber Security</h1>
<div>
<p>"Imagine you have a house, and you want to keep it safe from burglars. You'd probably lock your doors, install an alarm system, and maybe even put up some cameras to monitor your property. Cyber security is like that, but for your digital assets.</p>
</div>
<div>
<p>In today's world, we store a lot of important information online: personal data, financial information, trade secrets, and more. And just like with physical assets, we need to protect them from threats.</p>
</div>
<div>
<p>Cyber security involves a range of measures to safeguard our digital assets from unauthorized access, theft, or damage. This includes using strong passwords, encrypting sensitive data, keeping software up-to-date, and being cautious about phishing emails or other social engineering tactics.</p>
</div>
<div>
<p>But just like with physical security, cyber security is not foolproof. There will always be sophisticated criminals who are trying to break into our systems and steal our information. That's why it's important to stay vigilant and be prepared to respond to security incidents.</p>
</div>
<div>
<p>Ultimately, cyber security is about protecting what's important to us: our privacy, our identity, and our assets. It's a constant battle against evolving threats, but with the right tools and practices in place, we can stay one step ahead of the bad guys."</p>
</div>
</div>
</div>
</div>
<div>
<footer>Copyright © -TT-</footer>
</div>
</body>
</html>