Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Secure

Rss Feed Group items tagged

1More

Technology: Cyber Security - 0 views

  •  
    Teaching cyber security with a focus on safety and ethics has grown rapidly in importance over the past few years. Securing your personal computer and protecting classroom computers plays a crucial role in protecting our nation's Internet infrastructure.
1More

Lesson Plans from the National Cybersecurity Alliance - 1 views

  •  
    NCSA teamed up with USA Today Education Foundation and the Department of Homeland Security to develop seven lessons during the 2009-2010 school year targeted at 8th-12th graders. Lesson plans use recent news stories about cyber security issues.
1More

Cyber Exchange/ Security Awareness Materials - 1 views

  •  
    Download free posters suitable for GR 6-12 classrooms on sexting awareness, firewalls, cyberpredators and cybersecurity from Cyber Exchange, a Cyber Security Awareness program and nonprofit that provides education and certification for information security professionals.
1More

Computer Security Resource Collection - 6 views

  •  
    The folks at AnyPlace Control (remote desktop access) have compiled this list of resources for computer security. Many are related to protecting children.
2More

Get Safe Online :: Students at greatest risk from online fraud - 0 views

  • “Our study set out to establish whether online security factors vary according to age, gender, geography and occupation. Online criminals operate on a mass scale so are indiscriminate about who they target. Whether they are successful or not depends largely on two factors: firstly, how good we are at securing our computers; and secondly, how much we avoid risky activities and behaviours while we’re using the internet.
  •  
    Internet users in full-time education (2) are almost twice as confident online as other internet users - more than half (51%) consider themselves 'very' internet literate, compared to the national average of 26%. Despite this, they are the most dismissive of the risk of online crime and of the importance of basic security tools (such as anti-virus software) in protecting them against it.
1More

Buy Verified Bluebird Accounts - 100% USA Verified & Safe - 0 views

  •  
    Bluebird Accounts are a sort of monetary apparatus that can make overseeing your cash a entire parcel less demanding. These accounts are advertised by American Express in association with Walmart, and they come with a assortment of highlights that can offer assistance you remain on best of your accounts. With a Bluebird Account, you can get to helpful managing an account administrations, make buys online and in-store, pay bills, and indeed set aside cash for particular goals. Buy Verified Bluebird Accounts What is a Bluebird Account? Have you listened of Bluebird Accounts but aren't very beyond any doubt what they are or how they can advantage you? A Bluebird Account is a budgetary account advertised by American Express in organization with Walmart. It combines the comfort of a checking account with the advantages of a paid ahead of time charge card, giving a helpful way to oversee your accounts without the require for a conventional bank account. With no month to month expenses or least adjust necessities, Bluebird Accounts are open to people from all strolls of life. Buy Verified Bluebird Accounts Bluebird Accounts offer a extend of highlights, counting coordinate store, charge pay, and portable check store, making it simple to get your paycheck, pay bills, and store checks from anyplace. You can moreover utilize your Bluebird Account to make buys online and in-store, and indeed pull back cash from ATMs. With highlights like progressed security measures and the alternative to set up subaccounts for family individuals, Bluebird Accounts offer a adaptable and secure way to oversee your cash. Whether you're looking to streamline your funds or essentially looking for an elective to conventional keeping money, a Bluebird Account may be the idealize arrangement for you. Can I utilize my Bluebird Account internationally? If you're pondering whether you can utilize your Bluebird Account globally, the reply is yes and no. Let's break it down for you. Buy Verifie
1More

6 Tips for Facebook Security [Video] - 4 views

  •  
    Video produced by AVG Internet Security. Offers great privacy tips, scenarios and think-abouts for kids. Uses humor and exaggeration to make the point.
7More

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
1More

Digital Natives/Digital Dossiers [video] - 0 views

  •  
    Your digital dossier is made up of all the digital tracks you leave behind - from your photos on Flickr, to the Facebook messages you send, to all the data your credit card company collects about your transactions. On a daily basis, digital natives are consistently leaving information about themselves in secure or non-secure databases. You probably do this without a second thought in you day-to-day life - but have you ever considered the amount of information being collected about you, or the extent to which this information spreads?\nIn this video, created by Kanupriya Tewari, we explore this issue from the perspective of a child born today - Andy - and the timeline of all the digital files he accumulates in a life span.
4More

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
2More

Does your password pass the test? - 0 views

  •  
    Do we all need to be that careful about our passwords? Probably not. But passwords are one of the web's most important security tools. Whether it's for your Google account, your banking center, or your favorite store, choosing a good password and keeping it safe can go a long way toward protecting your information online.
  •  
    Advice from Google engineers on generating secure passwords.
1More

BUDD:E - (Primary Grades) - 1 views

  •  
    Budd:e Primary introduces e-security basics to stay smart online, including privacy, password creation, protecting personal details, virus scanning, secure websites, copyright and scams.
1More

Responsibility of Asian team's security takes By Rajeev Shukla - 0 views

  •  
    Responsibility of Asian team's security takes By Rajeev Shukla.He asked Asian nation Cricket Board (PCB) to inform the rationale of not causation their team to The Asian nation for International Cricket Council (ICC) Twenty20.
5More

China to Limit Web Access During Olympic Games - NYTimes.com - 0 views

  • Since the Olympic Village press center opened Friday, reporters have been unable to access scores of Web pages — among them those that discuss Tibetan issues, Taiwanese independence, the violent crackdown on the protests in Tiananmen Square and the Web sites of Amnesty International, the BBC’s Chinese-language news, Radio Free Asia and several Hong Kong newspapers known for their freewheeling political discourse.
  • The restrictions, which closely resemble the blocks that China places on the Internet for its citizens, undermine sweeping claims by Jacques Rogge, the International Olympic Committee president, that China had agreed to provide full Web access for foreign news media during the Games. Mr. Rogge has long argued that one of the main benefits of awarding the Games to Beijing was that the event would make China more open.
  • But a high-ranking Olympic committee official said Wednesday that the panel was aware that China would continue to censor Web sites carrying content that the Chinese propaganda authorities deemed harmful to national security and social stability.
  • ...1 more annotation...
  • In its negotiations with the Chinese over Internet controls, the Olympic committee official said, the panel insisted only that China provide unregulated access to sites containing information useful to sports reporters covering athletic competitions, not to a broader array of sites that the Chinese and the Olympic committee negotiators determined had little relevance to sports. The official said he now believed that the Chinese defined their national security needs more broadly than the Olympic committee had anticipated, denying reporters access to some information they might need to cover the events and the host country fully. This week, foreign news media in China were unable to gain direct access to an Amnesty International report detailing what it called a deterioration in China’s human rights record in the prelude to the Games.
  •  
    The International Olympic Committee failed to press China to allow fully unfettered access to the Internet for the thousands of journalists arriving here to cover the Olympics, despite promising repeatedly that the foreign news media could "report freely" during the Games, Olympic officials acknowledged Wednesday.
1More

School District Offers Security Lessons - 0 views

  •  
    James Logan High School, located in the San Francisco Bay Area, spans a large city block and has about 4,000 students attending its classes. Earlier in the year, some of those students made news-two for organizing a fundraiser for disaster relief in China and one for being among the winners of a national scholarship award program. That's the way schools hope their students make headlines. Unfortunately, another Logan student, 14-year-old Vernon Eddins, also made the news late last year-in that case, it was because he had become the latest victim of gang violence, which has been growing in Union City, where Logan is located.
1More

Video surveillance cameras in schools -- pros, cons and sound advice - 0 views

  •  
    Public schools have been equipped with video surveillance CCTV systems even before Columbine. The reasons include increased safety and security for students. Installing video surveillance cameras in schools is a costly project, and school districts must be sure that this is the right route to deter theft, property damage, and to prevent outsiders from entering the school's property. Even though most school districts that have implemented video surveillance systems have faced privacy concerns from parents, students and civil libertarian groups, school officials assert that cameras curb crime and are important sources of physical evidence when crimes do occur.
1More

Staying safe in the digital age [Quiz] - 0 views

  •  
    Take this online quiz from the University of Maine to assess your knowledge of online security in the digital age. If you answer wrong, correct answers are given. Suitable for middle and high school students.
1More

How to Turn Your Network into Fort Knox: 100 Tips + Tutorials - 0 views

  •  
    If you're a small business owner, family member, student or just someone with a laptop who loves shopping online and is addicted to your online banking, you might think that you're not a big target for identity thieves, hackers or viruses. The truth is that no one is really safe from prying eyes when they're online, so turn to this list of 100 tips, tutorials and resources that will help you beef up your own network security.
1More

Pew Internet Study of Online Activities and Pursuits [eCommerce] - 0 views

  •  
    [May 18, 2008] Most online Americans view online shopping as a way to save time and a convenient way to buy products. At the same time, most internet users express discomfort over a key step in online shopping -- sending personal or credit card information over the internet. Internet users like the convenience but worry about the security of their online information.
‹ Previous 21 - 40 of 193 Next › Last »
Showing 20 items per page