{"id":1582,"date":"2023-04-12T12:03:37","date_gmt":"2023-04-12T12:03:37","guid":{"rendered":"https:\/\/it-family.od.ua\/?post_type=news_one&#038;p=1582"},"modified":"2023-04-19T10:43:13","modified_gmt":"2023-04-19T10:43:13","slug":"seriya-proforiyentaczijnyh-lekczij-z-yuriyem-berkovym","status":"publish","type":"news_one","link":"https:\/\/it-family.od.ua\/en\/news_one\/seriya-proforiyentaczijnyh-lekczij-z-yuriyem-berkovym\/","title":{"rendered":"Series of career orientation lectures with Yuriy Berkov"},"content":{"rendered":"<p><\/p>\n<p><span style=\"font-weight: 400;\">80 proactive students, burning eyes, interesting questions \u2014 this was our first lecture for students and high school students from Odesa IT Family together with Odesa National University named after I.I. and technologies, and with the support of the educational tech-space Atom Space.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This time, Vadym Chakryan, Information Security Officer DataArt, and Maria Subach, People Business Partner at Provectus, shared their knowledge.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><strong>Vadym Chakryan told the students about cyber security<\/strong>.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyber security is bad and good, what&#8217;s the difference?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Is cyber security a loss center or a business enabler?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Is it possible to achieve a state of cyber security?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What aspects of cyber security should Ukrainian businesses pay attention to now?<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Everything that changes in our environment changes the cybersecurity footprint as well. Recently, the cyber world has become very complex \u2014 there is a lot of technology and no boundaries: people have their laptops, wear smart watches right on their body, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An important point: there are no completely secure systems. In 2010, the Stuxnet malware appeared. It was an attack on Iran&#8217;s uranium enrichment centrifuges for Iran&#8217;s nuclear program. What happened? If we look at this factory, it&#8217;s disconnected from the internet, but it&#8217;s running on some software that needs to be updated. Accordingly, there is a supplier of this software that has been &#8220;infected&#8221;. This pest caused the centrifuges to spin 80% faster than they should, which of course quickly disabled them. At the same time, there were no changes in the indicators. Everything is hackable.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The consequences can be devastating. An example of an attack in Ukraine in 2017 is NotPetya. Accounting software was infected. Inside was a malware that spread itself over the network, where it got into and infected other systems. It was such a massive phenomenon that thousands of people at one point were no longer able to do business. The negative consequences were felt in the country&#8217;s economy, and it took a lot of time to recover.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>What now?<\/strong><\/p>\n<p><strong>The democratization of AI creates security risks.<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fake voice<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deep fakes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Targeted phishing using NLP<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ChatGPT is changing the rules<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">AI wars are coming<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">As an example, with the help of a fake voice, the attackers called on behalf of the SEO of the bank and asked to change the details where the funds were to be transferred. Of course, the effect of urgency, etc. was added to the professional forgery, as a result the attack was successful.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercrime is growing rapidly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vadym also gave several examples of useful literature on the topic of cyber security, such as The Five Forces That Change Everything: How Technology is Shaping Our Future. We will soon tell you more about all the books in our useful literature section.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Maria Subach shared her knowledge on interview questions: tips and tricks.<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The first rule of interview preparation: you must prepare for the interview!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tips for preparing for an interview:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prepare a short presentation about yourself (and in English too)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prepare answers to general questions:<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Where did you study?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">what did you do and what are you interested in outside of work<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">who do you see yourself in the future (in 1, 5, 10 years)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t be late! And if you already understand that you are going to be late, be sure to warn the interviewer about it.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It is important not to tell the employer your whole life. Relevant information \u2014 briefly about the development of your experience, about the technologies\\tasks\\projects you liked to work with, what motivates you at work.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The biggest problem, as a rule, is to talk about your shortcomings. Think it through in advance.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>STAR interview: what is it?<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">S (situation) = Situation: Describe the context in which you did the work or encountered the problem at work.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">T (target) = Task: Next describe your responsibility in this situation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A (action) = Action: Then describe how you completed the task or attempted to cope with the challenge.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">R (result) = Result: Finally, explain the results or results obtained as a result of the action taken.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">When you are asked where you see yourself in 1-5-10 years, it is important for the employer to understand whether you have a specific goal to which you are going. It is important that you make it clear that you are interested in development, and not just go with the flow.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>The main important points during the interview from Maria:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t lie, if you don&#8217;t know the answer \u2014 say so. There are questions to which there is no correct answer and the logic of your thoughts is interesting.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Try to have a dialogue. Do not turn this process into an interrogation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Have a confident or open posture, not a closed one.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t be afraid to ask questions!<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t be afraid of anything! A negative result is still a result and an experience.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">During the question-and-answer session, the most active students who received gifts from Provectus were identified.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can also watch from the lecture:<\/span><\/p>\n<p><iframe title=\"\u0421\u0435\u0440\u0456\u044f \u043f\u0440\u043e\u0444\u043e\u0440\u0456\u0454\u043d\u0442\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u043b\u0435\u043a\u0446\u0456\u0439 \u0437 \u042e\u0440\u0456\u0454\u043c \u0411\u0435\u0440\u043a\u043e\u0432\u0438\u043c\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/zsJtE-UCQ4E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>80 proactive students, burning eyes, interesting questions \u2014 this was our first lecture for students and high school students from Odesa IT Family together with Odesa National University named after I.I. and technologies, and with the support of the educational tech-space Atom Space.<\/p>\n","protected":false},"featured_media":1583,"menu_order":0,"template":"","format":"standard","meta":[],"news":[6,7],"class_list":["post-1582","news_one","type-news_one","status-publish","format-standard","has-post-thumbnail","hentry","news-v-odesi","news-v-ukrayini"],"acf":[],"_links":{"self":[{"href":"https:\/\/it-family.od.ua\/en\/wp-json\/wp\/v2\/news_one\/1582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-family.od.ua\/en\/wp-json\/wp\/v2\/news_one"}],"about":[{"href":"https:\/\/it-family.od.ua\/en\/wp-json\/wp\/v2\/types\/news_one"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-family.od.ua\/en\/wp-json\/wp\/v2\/media\/1583"}],"wp:attachment":[{"href":"https:\/\/it-family.od.ua\/en\/wp-json\/wp\/v2\/media?parent=1582"}],"wp:term":[{"taxonomy":"news","embeddable":true,"href":"https:\/\/it-family.od.ua\/en\/wp-json\/wp\/v2\/news?post=1582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}