Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged identity

Rss Feed Group items tagged

Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Preventing Identity Theft [Video] - 0 views

  •  
    Presentation for 2006's FBLA National Leadership Conference in Nashville, TN. Placed THIRD in the nation with student-made video.\n
Anne Bubnic

FL Virtual School Student Orientation: Internet Safety - 0 views

  •  
    Florida Virtual School includes a learning module on Internet Safety in their student orientation materials. Through colorful flash-based adventures, students solve four Internet Security mysteries and learn about cyberstalking, identity theft, cyberbullying and email scams, then create their own Internet pledges based on NetSmartz materials. ISafe materials on cyberbullying and copyright are also included as downloads in the resource section.
Anne Bubnic

Students' new best friend: 'MoSoSo' - 0 views

  • Mobile GPS will open a Pandora’s box of possibilities, say others. “I’d be very concerned about pedophiles or identity thieves hacking into a system and locating me, my wife, or daughter,” says Henry Simpson, who coordinates new technology for the California State University at Monterey Bay (CSUMB). “It raises huge safety issues,” he adds.
  • But new technologies have always brought new risks – such as identity theft. Philosophically, every technology has both positive and negative values, says Andrew Anker, vice president of development at Six Apart, a Web consulting firm. “In fact,” he points out, “the most positive aspects are what also add the most negative.”
  • Companies looking to do business on college campuses have paid particular attention to security concerns. Rave Wireless introduced a GPS/MoSoSo enabled phone for students this past year, emphasizing the security value of the GPS feature over its potential to deliver underage victims to predators. While the Rave phones enable students to find like-minded buddies (Bored? Love Indian food? Meet me under the clock!), it also offers a cyberescort service linked to campus police. If the student doesn’t turn off a timer in the phone, indicating safe arrival at a destination, police are dispatched to a GPS location.
  •  
    Talking on cellphones is passé for students who use them for networking and sending photos. Mobile Social Networking Software - the next wave of virtual community - is already appearing on cellphones, beginning with college campuses. These under-25s (the target market for early adoption of hot new gadgets) are using what many observers call the next big consumer technology shift: Mobile Social Networking Software, or Mososo. The sophisticated reach of cyber-social networks such as MySpace or Facebook, combined with the military precision of GPS, is putting enough power in these students' pockets to run a small country.
Anne Bubnic

Going Global, Going Public - 0 views

  •  
    The real issues of digital citizenship include understanding identity online and the opportunities afforded to students when teachers teach students to be global citizens. More at http://ideasandthoughts.org
Anne Bubnic

In Your I ! [Privacy Online] - 0 views

  •  
    Video clip scenarios, lesson plans and handouts to teach students about privacy online. Privacy is all tied up in our sense of identity and how we interact with other people. We negotiate our privacy by revealing different things to different people in different circumstances. But when we talk online, what we say can be taken out of context. And that has consequences.
Rafael Ribas

Is your identity worth $10 a year? - 0 views

  • This is just another great opportunity to discuss digital citizenship and internet safety in positive terms.
  •  
    I am interested in this idea about students owning their name online... what do you think?
Anne Bubnic

How to Turn Your Network into Fort Knox: 100 Tips + Tutorials - 0 views

  •  
    If you're a small business owner, family member, student or just someone with a laptop who loves shopping online and is addicted to your online banking, you might think that you're not a big target for identity thieves, hackers or viruses. The truth is that no one is really safe from prying eyes when they're online, so turn to this list of 100 tips, tutorials and resources that will help you beef up your own network security.
Anne Bubnic

Digital Natives & Visual Literacy» Got Missiles? - 0 views

  •  
    With Photoshop's ease in alteration of photos, students need to be taught to authenticate visual and textual information as part of any good digital literacy program. A recent photograph of Iranian missles was displayed by many prominent news organizations (including the BBC, the L.A. Times, and the New York Times) before it was noted that portions of the dust clouds beneath the missiles were identical. Online news sites have been abuzz all morning, engaged in a debate over what, exactly, this means. As the New York Times notes, this is not the first time Iran's state media has altered photographs for political ends.
Anne Bubnic

Teen Hacker Could Get 38-Year Sentence for Fixing Grades - 0 views

  • Omar Khan, 18, a student at Tesoro High School in Rancho Santa Margarita, now faces 34 felony counts of altering a public record, 11 felony counts of stealing and secreting a public record, seven felony counts of computer access and fraud, six felony counts of burglary, four felony counts of identity theft, three felony counts of altering a book of records, two felony counts of receiving stolen property, one felony count of conspiracy and one felony count of attempted altering of a public record.
  •  
    They may be just kids, but two Orange County, Calif., teens are accused of committing a whole bunch of grown-up crimes. The allegations include hacking into school computers to change grades and planting spyware on a district computer. One of them faces 69 felony charges, which could land him in prison for up to 38 years if he's convicted.
Anne Bubnic

Cyberbullying Defined in H.R. 2163 - 0 views

  •  
    Illustrating how important this threat has become, Rep. Linda Sanchez (D-Calif.) and Rep. Kenny Hulshof (R-Mo.) proposed a federal law that would criminalize acts of so-called cyberbullying. In this blog, two national security advisors propose to take it further so that on-line masquerading is also defined and considered. They would also like to see H.R. 2163 increase the penalities when a cyberbully uses a false identity or steals another person's identity when bullying a victim.
Lorna Costantini

Facebook safeguards will protect young users - 0 views

  •  
    steps to protect children on the Internet
  •  
    Facebook, the world's second-largest social networking Web site, will add more than 40 safeguards to protect young users from sexual predators and cyberbullies. The changes include banning convicted sex offenders from the site, limiting older users' ability to search online for subscribers under 18 and building a task force seeking ways to better verify users' ages and identities.
Anne Bubnic

i-SAFE Lesson Guide: Phishing for Information - 0 views

  •  
    Download this lesson plan from I-Safe which introduces students to the term phishing and the threat of identity theft associated with this type of e-mail. Students will:
    *understand the term phishing and the types of e-mail it applies to
    * understand the security risks associated with this type of message
    *engage in an activity to reinforce concepts by sharing information with others
Anne Bubnic

Ghosts in the Browser: Computer and Network Security - 1 views

  •  
    Rising concerns about computer security are evident in the San Jose Mercury News three-part series which focused on everything from phishing schemes and identity theft to student safety on the Internet. In many districts, technology directors are finding they have to do more and more to insure that data is not compromised and to see that students are not using school networks to access inappropriate content.
    Part I: How online crooks put us all at risk
    Part II: How well are we protecting ourselves?
    Part III: U.S. targets terrorists as online thieves run amok

Anne Bubnic

ClubSymantec: Safety and Security Library [Feature Articles] - 1 views

  •  
    ClubSymantec is a safety and security resource center for Internet security and other computer related topics. Great advice and many topics here that could be assigned to students for presentation. Resources include advice on identity protection, password security, shopping safely online, spam control, spyware, phishing scams etc.
Marie Coppolaro

Pew Internet: Teens, Privacy and SNS - 0 views

  •  
    How teens manage their online identities and personal information in the age of MySpace
  •  
    Released in April 2007, this research analyzes results from a survey of 935 teens (age 12-17) and findings from focus groups conducted by the Pew Internet & American Life Project. It explores questions of teen online privacy protection from several perspectives: by looking at the choices that teens make to share or not to share information online, by examining what they share, by probing for the context in which they share it and by asking teens for their own assessment of their vulnerability.
  •  
    How teens manage their identity online (63% believe that someone could identify them from the info provided even if they don't put personal details like address and phone).
Anne Bubnic

Digital Native Project Wiki [Berkman Center] - 0 views

  •  
    An academic research team -- joining people from the Berkman Center for Internet & Society at Harvard Law School and the Research Center for Information Law at the University of St. Gallen in Switzerland -- is hosting and working on the core of this wiki, which illustrates the beginning stages of a larger research project on Digital Natives. The site offers a wealth of information in 10 topic areas:
    Digital Identity, digital safety, digital privacy, digital creativity, digital opportunities, digital information overload, digital information quality, digital piracy and digital education.

Jocelyn Chappell

FRONTLINE: growing up online: watch the full program | PBS - 0 views

  •  
    Insightful (and harrowing in places): 7 chapters re online teenagers - a revolution in classrooms and social life - self expression, trying on new identities - the child predator fear - private worlds outside parents' reach? - cyberbullying - updates
Anne Bubnic

MacArthur Foundation Series on Digital Media and Learning - MIT Press - 0 views

  •  
    The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning examines the effect of digital media tools on how people learn, network, communicate, and play, and how growing up with these tools may affect a person's sense of self, how they express themselves, and their ability to learn, exercise judgment, and think systematically.

    Six topics are available as free downloads online:
    Youth, Identity, and Digital Media Current Volume
    Learning Race and Ethnicity: Youth and Digital Media
    Digital Young, Innovation, and the Unexpected
    The Ecology of Games: Connecting Youth, Games, and Learning
    Digital Media, Youth, and Credibility
    Civic Life Online: Learning How Digital Media Can Engage Youth

Anne Bubnic

Howard Gardner on Digital Youth [Video] - 6 views

  •  
    Howard Gardner, the founder of multiple-intelligences theory discusses the challenges ethics and education face as digital media become more prevalent. Through his GOODPLAY PROJECT, he examines the ethical sense of young people. He ooks at five elements related to what it means to be ethical with new media: sense of identity, sense of privacy, sense of ownership/authorship, trustworthiness and credibility, and what it means to participate in a community.
« First ‹ Previous 41 - 60 of 134 Next › Last »
Showing 20 items per page