Evaluation Post
![Image](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhju7nFQW8u32SwCiQjF8nCiLlnwjo24yUnUSa73R_zWXb1dStnWW1iUUuj1N6R4fVYcfWMugAxXJwvfIbqYT65IyB5X1I6cZ4gV2iaYMJpJLfKw6PXTjX0w0cGJSLU0K_Ve6VdB0xrHOGsccGZtaXAOtbCcSqA7heb6ketAB9TmQLhZtUJP_iQTywUNfaQ/w656-h365/Screen%20Shot%202024-05-31%20at%204.15.20%20PM.png)
This evaluation post looks back at what we gained from our research and understanding of Cyberattacks and the process of making it:) It all began with the planning phase, as I commenced working on this project on April 16th with the intention of completing it by May 20th. Initially, I focused on delving into the topic and crafting the introduction by gathering all necessary information and identifying the most reliable sources for research. Following this, I proceeded to outline the key information to be included in the blog. Once the research phase was complete, I conducted a progress report meeting. Subsequently, I transitioned to the actual creation and design of the blog, ensuring that it adhered to all specified requirements. I trust you've found this blog beneficial and that it inspires you to take action in fortifying your cybersecurity measures!