Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged security

Rss Feed Group items tagged

Anne Bubnic

School Security Virtual Summit [Sep 21, 2010] - 1 views

  •  
    School Security Virtual Summit: T.H.E. Journal, in collaboration with CDW-G and its security partners, invites you and your peers to gain insights and exchange best practices that will successfully secure your school, information and students.
Anne Bubnic

The Internet Protectors Launches First Online Cybersecurity Information Community - Tec... - 0 views

  •  
    The Internet Protectors(TM) today opened its doors to computer users looking for non-technical help in learning about and protecting themselves against the security risks that plague Internet users today. The Internet Protectors (TIP) website (http://www.TheInternetProtectors.com) provides a neutral environment where users can ask questions of topic experts, research different aspects of security in a library of podcasts, videos, and white papers, read and subscribe to blogs on multiple security topics, discuss security issues in forums, and more.
Anne Bubnic

Students plagued by Internet fraud - 4 views

  •  
    October is National Cyber Security Awareness Month, and the National Cyber Security Alliance is looking to raise awareness among college students to help them stay safe and secure online. According to the 2010 Identity Fraud Survey Report, college students lost five times more money than any other age group as a result of identity fraud or other online fraud situations.
Anne Bubnic

Schools' cyber security needs improvement - 0 views

  •  
    School districts are improving their physical security, but they might be neglecting the security of their computer infrastructure, if the results of an annual survey are any indication. The average physical safety rating of K-12 school districts improved by 39 percent over 2007, while the average cyber safety rating declined by 25 percent during the same time period, according to CDW-G's "2008 School Safety Index," which is designed to mark the current state of K-12 school safety.
Kevin Rose

Payday Loans Bad Credit - Free From The Security... - 0 views

  •  
    Payday Loans Bad Credit - Free From The Security So Forget About Any Collateral Of Security Sometime people do not have to suffer from unnoticed short term financial problem. So you think, how can do...
Anne Bubnic

Back to School Tips| Americans for Technology Leadership - 0 views

  • Cyberbullying Cyberbullying or online bullying is repeated, unwanted or cruel behavior against someone through computers, cell phones, gaming consoles, or other Internet-based means. The Internet is always “on,” opening the door for 24-hour harassment. Cyberbullies can be anonymous. They never have to confront their victims, they don’t have to be physically stronger and cyberbullies may be virtually invisible to parents and adults.
  • Look for warning signs your child may be the victim of cyberbullying – depression, lack of interest in school and friends, drop in grades and subtle comments that something may be wrong. If your child is the victim of cyberbullying, take action. By filtering email, instant messages and text messages, you can cut off many of the ways the cyberbullies contact your child. By having your child avoid the sites and groups where the attacks occur, he/she can ignore the bully. If harassment continues, change your child’s email address, user names and Internet account. If these steps do not stop the cyberbullying, contact the parents of the child who is behind the bullying, contact the school, and if the situation is not resolved, involve the police. It’s important to compile copies of harassing emails and postings to have evidence for authorities or the school, so they can take action. Look for signs that your child may be the cyberbully themselves – if they sign onto the Internet under someone else’s name, if they use someone else’s password without their permission, if they posted rude or mean things about someone else online, if they use bad language online, or if they changed their profile or away message designed to embarrass or frighten someone. Talk to your kids about cyberbullying and why it’s wrong and hurtful.
  •  
    As children go back to school, many parents are concerned about how their children will be using the computer and Internet devices in the classroom. Communication is key. Parents need to talk with their children about how to use the Internet safely, potential threats and appropriate usage of the Internet. By understanding both the benefits and the risks of Internet use, families can have a safer and more secure online experience. This article includes key tips on cyberbullying, internet safety, privacy and security.
Anne Bubnic

OnGuard Online - Quizzes - 0 views

  •  
    OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. There are ten colorful flash-based quizzes here appropriate for students on security topics such as phishing, hackers, spyware etc.
Anne Bubnic

Safeguarding school data - 0 views

  •  
    It seems like you can't go a whole week lately without hearing about some major data security breach that has made national headlines. For businesses, these data leaks are bad enough-but for schools, they can be especially costly, as network security breaches can put schools in violation of several federal laws intended to protect students' privacy.
Anne Bubnic

ClubSymantec: Safety and Security Library [Feature Articles] - 1 views

  •  
    ClubSymantec is a safety and security resource center for Internet security and other computer related topics. Great advice and many topics here that could be assigned to students for presentation. Resources include advice on identity protection, password security, shopping safely online, spam control, spyware, phishing scams etc.
Anne Bubnic

Technology: Cyber Security - 0 views

  •  
    Teaching cyber security with a focus on safety and ethics has grown rapidly in importance over the past few years. Securing your personal computer and protecting classroom computers plays a crucial role in protecting our nation's Internet infrastructure.
Anne Bubnic

Lesson Plans from the National Cybersecurity Alliance - 1 views

  •  
    NCSA teamed up with USA Today Education Foundation and the Department of Homeland Security to develop seven lessons during the 2009-2010 school year targeted at 8th-12th graders. Lesson plans use recent news stories about cyber security issues.
Anne Bubnic

Cyber Exchange/ Security Awareness Materials - 1 views

  •  
    Download free posters suitable for GR 6-12 classrooms on sexting awareness, firewalls, cyberpredators and cybersecurity from Cyber Exchange, a Cyber Security Awareness program and nonprofit that provides education and certification for information security professionals.
Anne Bubnic

Computer Security Resource Collection - 6 views

  •  
    The folks at AnyPlace Control (remote desktop access) have compiled this list of resources for computer security. Many are related to protecting children.
Anne Bubnic

Get Safe Online :: Students at greatest risk from online fraud - 0 views

  • “Our study set out to establish whether online security factors vary according to age, gender, geography and occupation. Online criminals operate on a mass scale so are indiscriminate about who they target. Whether they are successful or not depends largely on two factors: firstly, how good we are at securing our computers; and secondly, how much we avoid risky activities and behaviours while we’re using the internet.
  •  
    Internet users in full-time education (2) are almost twice as confident online as other internet users - more than half (51%) consider themselves 'very' internet literate, compared to the national average of 26%. Despite this, they are the most dismissive of the risk of online crime and of the importance of basic security tools (such as anti-virus software) in protecting them against it.
Anne Bubnic

6 Tips for Facebook Security [Video] - 4 views

  •  
    Video produced by AVG Internet Security. Offers great privacy tips, scenarios and think-abouts for kids. Uses humor and exaggeration to make the point.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Digital Natives/Digital Dossiers [video] - 0 views

  •  
    Your digital dossier is made up of all the digital tracks you leave behind - from your photos on Flickr, to the Facebook messages you send, to all the data your credit card company collects about your transactions. On a daily basis, digital natives are consistently leaving information about themselves in secure or non-secure databases. You probably do this without a second thought in you day-to-day life - but have you ever considered the amount of information being collected about you, or the extent to which this information spreads?\nIn this video, created by Kanupriya Tewari, we explore this issue from the perspective of a child born today - Andy - and the timeline of all the digital files he accumulates in a life span.
Anne Bubnic

The Millennials Are Coming! - 0 views

  • Most agencies manage sensitive citizen data: addresses, Social Security numbers, financial records and medical information. You name it, some state or local office has it, and probably electronically. The problem? Many theorize that the Millennials' penchant for online openness could unintentionally expose private information, leaving it ripe for the picking. Millennials bring innovative ideas about technology's use, but for that same reason, do they also pose new security risks?
  • Anti-virus vendor Symantec released a study in March 2008 assessing this issue. Symantec commissioned Applied Research-West to execute the study, and 600 participants were surveyed from different verticals, including government. Survey participants included 200 IT decision-makers, 200 Millennial workers and 200 non-Millennial workers born before 1980. The data revealed that Millennials are more likely than workers of other ages to use Web 2.0 applications on company time and equipment. Some interesting figures include: 69 percent of surveyed Millennials will use whatever application, device or technology they want at work, regardless of office IT policies; and only 45 percent of Millennials stick to company-issued devices or software, compared to 70 percent of non-Millennials.
  • How might young people be workplace assets? Could all that time typing or texting make them speedy typists, able to whip up memos at the drop of a hat? Does familiarity with new and emerging technologies have its benefit? You bet, according to Dustin Lanier, director of the Texas Council on Competitive Government. The council brings state leaders together to shape policy for government departments, including IT. "I think they've built an approach to work that involves a lot of multitasking," Lanier said of the Millennials. "Something will be loading on one screen, you alt-tab to another application and pull up an e-mail, the first process loads, you flip back, start a new process, flip to a forum and pull up a topic. It's frenetic but normal to that group." Lanier doesn't think Millennials present more of an IT threat than their older co-workers. After all, young people don't have a monopoly on being distracted in the office. "I can't tell you how many times I've walked by people's desks of all ages and seen Minesweeper up," he said. He thinks employers should embrace some Web 2.0 applications. Otherwise, Millennials might be discouraged from sticking around. According to Lanier, this younger work force comprises many people who think of themselves as free agents. Government should accommodate some of their habits in order to prevent them from quitting.
  •  
    Get ready CIOs. They're coming. They have gadgets and doohickeys galore. They like their music downloadable and portable, and they grew up with the Internet, not before it. Their idea of community is socializing with people in other cities or countries through Facebook, MySpace or instant messages, and they use e-mail so often they probably think snail mail is an endangered species. They're the Millennials - those tech-savvy, 20-somethings and-under bound to warm up scores of office chairs left cold by retiring baby boomers. There's a good chance many will come to a government workplace near you, but their digital literacy could prove worrisome for security-conscious bosses.
Ziggy U

Does your password pass the test? - 0 views

  •  
    Do we all need to be that careful about our passwords? Probably not. But passwords are one of the web's most important security tools. Whether it's for your Google account, your banking center, or your favorite store, choosing a good password and keeping it safe can go a long way toward protecting your information online.
  •  
    Advice from Google engineers on generating secure passwords.
1 - 20 of 174 Next › Last »
Showing 20 items per page