Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items matching ""digital identity"" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
7More

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
1More

FL Virtual School Student Orientation: Internet Safety - 0 views

  •  
    Florida Virtual School includes a learning module on Internet Safety in their student orientation materials. Through colorful flash-based adventures, students solve four Internet Security mysteries and learn about cyberstalking, identity theft, cyberbullying and email scams, then create their own Internet pledges based on NetSmartz materials. ISafe materials on cyberbullying and copyright are also included as downloads in the resource section.
1More

Cyberbullying Defined in H.R. 2163 - 0 views

  •  
    Illustrating how important this threat has become, Rep. Linda Sanchez (D-Calif.) and Rep. Kenny Hulshof (R-Mo.) proposed a federal law that would criminalize acts of so-called cyberbullying. In this blog, two national security advisors propose to take it further so that on-line masquerading is also defined and considered. They would also like to see H.R. 2163 increase the penalities when a cyberbully uses a false identity or steals another person's identity when bullying a victim.
2More

Facebook safeguards will protect young users - 0 views

  •  
    steps to protect children on the Internet
  •  
    Facebook, the world's second-largest social networking Web site, will add more than 40 safeguards to protect young users from sexual predators and cyberbullies. The changes include banning convicted sex offenders from the site, limiting older users' ability to search online for subscribers under 18 and building a task force seeking ways to better verify users' ages and identities.
1More

i-SAFE Lesson Guide: Phishing for Information - 0 views

  •  
    Download this lesson plan from I-Safe which introduces students to the term phishing and the threat of identity theft associated with this type of e-mail. Students will:
    *understand the term phishing and the types of e-mail it applies to
    * understand the security risks associated with this type of message
    *engage in an activity to reinforce concepts by sharing information with others
1More

Ghosts in the Browser: Computer and Network Security - 1 views

  •  
    Rising concerns about computer security are evident in the San Jose Mercury News three-part series which focused on everything from phishing schemes and identity theft to student safety on the Internet. In many districts, technology directors are finding they have to do more and more to insure that data is not compromised and to see that students are not using school networks to access inappropriate content.
    Part I: How online crooks put us all at risk
    Part II: How well are we protecting ourselves?
    Part III: U.S. targets terrorists as online thieves run amok

1More

Privacy exercise with students - brilliant idea! - 7 views

  •  
    A 6th grade teacher outlines an exercise he did with students to get them to understand the significance of privacy and protecting their identities online. He pairs it with this video that helps kids understand what constitutes personal information.
1More

Sorted: Keep Your Information Secure Online - 0 views

  •  
    From Childnet International, this site aims to give students advice and information on computer security issues in a practical and simple way. It was created by an 18 year old and addresses topics like spyware, adware, trojans and viruses, spam and phishing, identity theft, pop-ups and file-sharing. It would be best suited for high school students.
1More

How Privacy Vanishes Online, a Bit at a Time - 2 views

  •  
    Computer scientists and policy experts say that such seemingly innocuous bits of self-revelation can increasingly be collected and reassembled by computers to help create a picture of a person's identity, sometimes down to the Social Security number.
1More

What Petraeus affair teaches about email. - 5 views

  •  
    Those who still have illusions about online privacy might want to consider the old adage "I can keep secrets; it's the people I tell who can't."
1More

On the Identity Trail - 1 views

  •  
    Understanding the importance and impact of anonymity and authentication in a networked society. Be sure to check out the lesson plan for Grade 10-12 on Privacy issues at IN YOUR I.
1More

Obstacles to Opportunities: "Acceptable Use and the Web 2.0" - 0 views

  •  
    Presentation at the K-12HSN Conference Online by Joseph Bires. A discussion of how the use of Web 2.0 technologies has challenged and changed the concept of acceptable use. The presenter suggests ways to balance protecting students, teachers, and schools from the dangers of the Internet, while still integrating Web 2.0 technologies into the K-12 curriculum. Also, philosophical issues of acceptable use are discussed such as identity and transparency. Finally, practical suggestions are shared to help every teacher and administrator. This talk is available as an MP3 audio file and an audiofile blog.
4More

Twitter gets you fired in 140 characters or less - 0 views

  • Clay Shirky speaks of a day in the not-too-distant future when human resources departments will have the wisdom to look beyond social networking faux pas — at least in some small part because by then, everyone will have made at least one.
  • Rep. Pete Hoekstra, R-Mich., tweeted this as-it-happens update regarding his group’s location and destination:"Moved into green zone by helicopter Iraqi flag now over palace. Headed to new US embassy Appears calmer less chaotic than previous here."
  • This social networking comedy of errors spread like dancing hamsters across Twitter. In the retelling, "theconnor" earned the nick, "Cisco Fatty." Before the work day ended, Web sleuths revealed "theconnor's" true identity. "Theconnor" was lampooned in a popular YouTube meme. And thanks to Google Cache, the deleted content of "theconnor’s" homepage resurfaced on CiscoFatty.com, a Web site erected to commemorate this cautionary tale.
  •  
    Students need to understand that NOTHING, I repeat NOTHING Is private. Great case study about how 140 characters got someone fired before they were even hired.
1More

Data scams have kicked into high gear as markets tumble - 0 views

  •  
    Cybercriminals have launched a massive new wave of Internet-based schemes to steal personal data and carry out financial scams in an effort to take advantage of the fear and confusion created by tumbling financial markets, security specialists say.
1More

The Beehive - 0 views

  •  
    Symantec partnered with One Economy to add Internet Security content to their online information portal, The Beehive. This resource ensures that low-income families and new broadband users have the tools and resources necessary to protect their families.
2More

Protecting Reputations Online in Plain English - Common Craft - 4 views

  •  
    Huge fan of Commoncraft. Now helping educators with Digital Citizenship.
  •  
    Aimed at young or inexperienced Web users, this video explains the long term risks of sharing inappropriate information online.
1More

When tweets can make you a jailbird - 0 views

  •  
    Law enforcement agents are following the rest of the Internet world into popular social-networking services, even going undercover with false online profiles to communicate with suspects and gather private information, according to an internal Justice Department document that surfaced in a lawsuit.
1More

Smokescreen game guides teenagers through dangers of social networking - 1 views

  •  
    A free-to-play "alternate reality game" from the UK commissioned by Channel 4 Education that is intended to give teenage players a personal encounter with everything from identity theft to cyber stalking. Kids (age 14-16) explore websites, search for clues, receive phone calls, chat on IM, and tackle puzzles and mini-games. Through thirteen challenges, (each lasting 10-20 minutes) and a dramatic storyline, they find out who they can trust and who they can't.
2More

Test Your Cybersmarts - 0 views

  •  
    Feeling up for a challenge? Then test your cyber smarts with one - or all - of 12 interactive quizzes on everything from spam and spyware to phishing and file-sharing.
  •  
    Feeling up for a challenge? Then test your cyber smarts with one - or all - of 12 interactive quizzes on everything from spam and spyware to phishing and file-sharing.
« First ‹ Previous 61 - 80 of 93 Next ›
Showing 20 items per page