Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged Secure

Rss Feed Group items tagged

Anne Bubnic

Passwords Are Like Underwear [Poster Program] - 0 views

  •  
    Developed by the IT Dept at University of Michigan, this series of five clever posters gets users to remember and adopt a few basic principles of password security. You can order copies off of their web site.
Vicki Davis

Cyber Security - 0 views

  •  
    A blog post from a ninth grader researching cyber security. He did a very nice job (with the exception of a typo or two.)
  •  
    Seeing my students blog like this one on cybersecurity makes me realize that effective online communication and writing is important. I'm proud of my student bloggers and glad that we've made time to blog this year!
Anne Bubnic

Netsafe: NetBasics Animations - 0 views

  •  
    Launched in April, the award-winning NetBasics site from New Zealand is composed of 10 highly entertaining flash animations following the travails of the Jones family as they negotiate their way around the Internet. The series includes a collection of good and bad characters in fictional adventures that engage users while they deliver a serious message about the security threats we face every day online.
Anne Bubnic

staysafe.org Toolbox - Video Library - 0 views

  •  
    Watch these short videos to learn more about the top security issues that affect consumers like you. If you're new to learning about protecting your computer and your information online, you can start with the basics.
Anne Bubnic

Ghosts in the Browser: Computer and Network Security - 1 views

  •  
    Rising concerns about computer security are evident in the San Jose Mercury News three-part series which focused on everything from phishing schemes and identity theft to student safety on the Internet. In many districts, technology directors are finding they have to do more and more to insure that data is not compromised and to see that students are not using school networks to access inappropriate content.
    Part I: How online crooks put us all at risk
    Part II: How well are we protecting ourselves?
    Part III: U.S. targets terrorists as online thieves run amok

Anne Bubnic

Password checker - 0 views

  •  
    Do you use strong passwords? Password Checker can help you to gauge the strength of your password. It is for personal reference only. Password Checker does not guarantee the security of the password itself.
Anne Bubnic

Sorted: Keep Your Information Secure Online - 0 views

  •  
    From Childnet International, this site aims to give students advice and information on computer security issues in a practical and simple way. It was created by an 18 year old and addresses topics like spyware, adware, trojans and viruses, spam and phishing, identity theft, pop-ups and file-sharing. It would be best suited for high school students.
Anne Bubnic

iKeepSafe/ASCA: Privacy and Reputation Online - 1 views

  •  
    Resources to help students nationwide understand the importance of privacy, security and online reputation. Includes presentations, downloadable curriculum and resources in English and Spanish.
Anne Bubnic

Eight Tips for Monitoring and Protecting Your Online Reputation - 9 views

  •  
    Here are 8 tips to monitor and protect one's online reputation from the U.S. Government Information Security Blog: Search your name. Type your first and last name within quotation marks into several popular search engines to see where you are mentioned and in what context. Narrow your search and use keywords that apply only to you, such as your city, employer and industry association. Expand your search. Use similar techniques to search for your telephone numbers, home address, e-mail addresses, and personal website domain names. You should also search for your social security and credit card numbers to make sure they don't appear anywhere online. Read blogs. If any of your friends or coworkers have blogs or personal web pages on social networking sites, check them out to see if they are writing about or posting pictures of you. Sign up for alerts. Use the Google alert feature that automatically notifies you of any new mention of your name or other personal information. Limit your personal information. Tweet/chat/discuss regarding business and the emerging trends in your industry, but limit posting information on your personal life, which could be a subject of major scrutiny by recruiters and hiring managers. Also, be sure you know how organizations will use your information before you give it to them. Use privacy settings. Most social networking and photo-sharing sites allow you to determine who can access and respond to your content. If you're using a site that doesn't offer privacy settings, find another site. Choose your photos and language thoughtfully. You need to ensure that information posted online is written professionally without use of swear words and catchy phrases. Also, be very selective in posting photographs, and use your judgment to ensure that these photographs are how you want the world to see you. Take action If you find information about yourself online that is embarrassing or untrue, cont
Anne Bubnic

Google Public Policy Blog: Recapping last week's Google D.C. Talk on cybersecurity - 0 views

  •  
    To help spark ideas and stimulate discussion following the release of the President's cyberspace policy review, last Friday we teamed up with the Center for a New American Security to bring together a panel of experts representing government, military, and industry for a Google D.C. Talk, "Developing a National Cybersecurity Strategy."
buyglobalshop

Buy Yahoo Gemini Account - Best Quality Everything Yahoo Gemini Account 2024 - 0 views

  •  
    If you're looking to grow your advanced publicizing reach, Yahoo Gemini may be the reply you've been looking for. Yahoo Gemini is a one of a kind publicizing stage that permits marketers to reach a huge gathering of people through both look and local promoting. This flexible stage combines the control of Yahoo look with the focused on capabilities of local publicizing, making it a important apparatus for businesses looking to increment their online visibility. Buy Yahoo Gemini Account What precisely is Yahoo Gemini Account? Yahoo Gemini Account is a effective stage that gives businesses with the capacity to reach a wide gathering of people through focused on promoting. Outlined particularly for versatile and local promoting, Yahoo Gemini makes a difference businesses interface with potential clients in a important way. With get to to Yahoo's broad organize of clients, businesses can make advertisements that are custom fitted to fit their particular target gathering of people, expanding the probability of a fruitful conversion. By utilizing Yahoo Gemini Account, businesses can make exceedingly focused on publicizing campaigns that reach clients on portable gadgets and on other Yahoo properties. This permits businesses a special opportunity to interface with their gathering of people in a way that is both locks in and compelling. With the capacity to track execution measurements and alter campaigns in real-time, businesses can guarantee that their publicizing endeavors are coming to the right gathering of people and producing a positive return on venture. In today's competitive advanced scene, having a Yahoo Gemini Account can grant businesses the edge they require to stand out and succeed in the ever-evolving world of online advertising. Buy Yahoo Gemini Account What are the benefits of utilizing Yahoo Gemini Account? Yahoo Gemini Account offers a huge number of benefits for promoters looking to reach their target group of onlookers and optimize their prom
Anne Bubnic

C-SAVE | STAYSAFEONLINE.org - 1 views

  •  
    NCSA launched the Cyber Security Awareness Volunteer Education Project (C-SAVE) in April of 2009. The program will teach youngsters not just to be wary of online predators and bullies but alert to the tricks of data thieves and scam artists. Curriculum is customized for three grade levels: K-2, 3-5 and middle/high school. What makes this program unique is that they plan to use "tech pros" from the technology industry to deliver the curriculum in the classroom.
Devia Rajput

Pakistan vs India T20 World Cup - 0 views

  •  
    Now Voting Time.Pakistan Team goes to play the T20 world cup in India or not please Comment Fast and tell us about what do you say about this and India can manage the security for Pakistan Team.
Megan Black

Digital Citizenship Curriculum From Common Sense - 1 views

  •  
    Full Middle school Curriculum in three strands: Safety and Security, Digital Citizenship, and Research and Information Literacy
Anne Bubnic

What you should know about phishing identity-theft scams [Video] - 0 views

  •  
    Watch this excellent video from Microsoft to find out more about phishing e-mail scams and how they are used for identity theft. The video will show you how fraudulent e-mail messages and spoofed Web sites-two common forms of phishing-can trick you into s
Anne Bubnic

AB 307: California Education Code Section 51871.5 - 0 views

  •  
    California State-approved technology plans that meet certain criteria must be in place before federal funding for technology may be secured by a school district. Education Code Section 51871.5 also requires the addition of a component to educate students and teachers on cyberbullying and Internet Safety, among other topics.
Anne Bubnic

Nat'l Parent-Teacher Organization Selects Symantec as Partner to Raise Awareness of Int... - 0 views

  •  
    School Family Media, a leading resource for parent teacher groups in the United States, has selected Symantec, the world's leading Internet security company and maker of Norton, as its partner in keeping America's schoolchildren and their families safe online. . Through this partnership, Symantec will reach thousands of parent teacher organization (PTO) and parent teacher association (PTA) groups across the country to deliver educational messages and resources dedicated to raising awareness of Internet safety -- just in time for the new school year.
Anne Bubnic

Students' new best friend: 'MoSoSo' - 0 views

  • Mobile GPS will open a Pandora’s box of possibilities, say others. “I’d be very concerned about pedophiles or identity thieves hacking into a system and locating me, my wife, or daughter,” says Henry Simpson, who coordinates new technology for the California State University at Monterey Bay (CSUMB). “It raises huge safety issues,” he adds.
  • But new technologies have always brought new risks – such as identity theft. Philosophically, every technology has both positive and negative values, says Andrew Anker, vice president of development at Six Apart, a Web consulting firm. “In fact,” he points out, “the most positive aspects are what also add the most negative.”
  • Companies looking to do business on college campuses have paid particular attention to security concerns. Rave Wireless introduced a GPS/MoSoSo enabled phone for students this past year, emphasizing the security value of the GPS feature over its potential to deliver underage victims to predators. While the Rave phones enable students to find like-minded buddies (Bored? Love Indian food? Meet me under the clock!), it also offers a cyberescort service linked to campus police. If the student doesn’t turn off a timer in the phone, indicating safe arrival at a destination, police are dispatched to a GPS location.
  •  
    Talking on cellphones is passé for students who use them for networking and sending photos. Mobile Social Networking Software - the next wave of virtual community - is already appearing on cellphones, beginning with college campuses. These under-25s (the target market for early adoption of hot new gadgets) are using what many observers call the next big consumer technology shift: Mobile Social Networking Software, or Mososo. The sophisticated reach of cyber-social networks such as MySpace or Facebook, combined with the military precision of GPS, is putting enough power in these students' pockets to run a small country.
Anne Bubnic

Microsoft parent's guide to online safety: Ages and stages - 0 views

  •  
    Whether your kids are Internet beginners or are already Web savvy, you can help to guide their use of the Internet as they grow through different ages and stages in their lives. Child safety information and recommendations for ages 2-17.
Anne Bubnic

From Street to Cyber Safety among Inner City High School Students in Philadelphia: Less... - 0 views

  •  
    Media stories over the past year have heightened public awareness regarding cyber safety, teens and the use of information and communication technology (ICT) use. The emphasis of media attention has often been on the victimization and bullying of teens occurring on social network sites such as Myspace and Facebook. The prominence placed on ICT platforms, such as the Internet and Cell Phones, as threatening spheres has resulted in a narrow view of cyber security. Instead, I argue that we need to rethink the meaning of cyber safety for teens and begin a more complex dialog about best cyber safety practices.
« First ‹ Previous 41 - 60 of 193 Next › Last »
Showing 20 items per page