Skip to main content

Home/ Digital Literacy at Full Sail University/ Group items tagged security

Rss Feed Group items tagged

Joey Martinez

Malware - 0 views

  • “Malware” is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
  •  
    "Malware" is short for "malicious software" - computer programs designed to infiltrate and damage computers without the users consent. "Malware" is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
Cassandra Lawver

digiteen - Digital Security and Safety - 0 views

  • Protect hardware and network security Protect personal security Protect school security: hackers, viruses Protect community security
  • Digital Safety and Security (self-protection): this issue relates to a person's well-being and safety online, technically meaning on the computer and on the internet
  • one protects themselves by remembering to not share all their personal information such as their whereabouts and phone numbers.
Laura Lewis

123digitalcitizenship - Digital Security - 0 views

  • The full definition of Digital Security (self-protection) is: taking necessary precautions to guarantee electronic digital safety.
    • Dre Adams
       
      Digital security definition (1)
    • Laura Lewis
       
      DIGITAL SECURITY DEFINITION.
  • Digital Security is simply about being secure about everthing that is electronic
Dre Adams

Skills21-B3 - Digital Security - 0 views

  • The definition of digital security is being safe online and anything you do that involves technology.
    • Dre Adams
       
      Digital security definition (2)
  • Weak passwords can lead to accounts being stolen easily. You must have strong passwords that are difficult to guess.Someone can delete your hard work or make you appear poorly by hacking into one of your social/work accounts and writing/deleting informationsomeone can steal money from you through your bank account because they found your credit card or have your personal account information.
    • Dre Adams
       
      Digital security examples
Derek Northcutt

Defining Digital Security - 0 views

  • Digital Security means to protect information.
  •  
    Digital security deals with protecting individuals from online threats such as viruses and scams.
  •  
    Digital security deals with protecting individuals from online threats such as viruses and scams.
Reshunda Pickens

Obama to propose key changes in data collection program - NBC Politics - 0 views

    • Reshunda Pickens
       
      The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. No  The information on the topic is thorough. No  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 10.7  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. No  There is a way to contact the author (s) via e-mail or traditional mail. No  You can easily tell from the domain name where the page originates. Yes  Total: 5  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10 
  •  
    The score for this article was an 76 -Average based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. No The information on the topic is thorough. No The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 10.7 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. No There is a way to contact the author (s) via e-mail or traditional mail. No You can easily tell from the domain name where the page originates. Yes Total: 5 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, on the physical page there are hyperlinks provided that correspond to different topics relating to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time. Yes The page's presentation is eye-catching. Yes The site engages the visitor to spend time there. Yes Total: 10 Multimedia (0 to 10 P
caprisunshine

Don't Get Hacked! Secure Your Digital Identity - YouTube - 0 views

    • caprisunshine
       
      Don't Get Hacked! Secure Your Digital Identity Mat Honan's ENTIRE digital life was wiped out all because hackers wanted his twitter account. We have new details on the attack and how Apple and Amazon are changing their policies because of it. Make sure to read up on Arstechnica's article on auditing your cloud identity.
  •  
    This an interesting video for identity and security. You will want to be careful on what you leave available online. Your entire digital identity, so digital security is essential when working online. 
lsteimle

What can you do with digital security | CompuClever - 0 views

  • Despite a time of global recession, the “Digital Universe” expanded by 62% and by 2020 it will be 44 times as big.  We will have amassed digital information that can be described in zettabytes – that is to say, one zettabyte being a million, million gigabytes.  This would be the equivalent of a stack of DVD’s going halfway to Mars.
    • lsteimle
       
      Nergasm.
  • mass surveillance is occurring
  • This includes: public transport tracking; workplace surveillance, examination of communications (collecting data on all phone calls, emails, chat room discussions and web-browsing habits); mobile phone tracking; vehicle tracking; DNA database sampling; overseas travel; collecting data on political and environmental protestors; and using unmanned aircraft systems (drones) for purposes of security.
  • ...2 more annotations...
  • exposing our personal rights and freedoms
  • effective tools to analyze data, weed out the information that can be safely deleted, remove personal information that can cause us harm if it falls into the wrong hands (including hackers or unethical online businesses), and we need secure storage
    • lsteimle
       
      Digital Security
Cassandra Lawver

Digital security - Wikipedia, the free encyclopedia - 0 views

  • is a type of information security affecting all aspects of digital communication, including computers and the internet, telecommunications, financial transactions, transportation, healthcare, and secure access.
Lucas Pergler

EBSCOhost: Security Architecture of Cloud Computing. - 1 views

    • Lucas Pergler
       
      1,2)PDF from EBSCOhost containing content of a serious nature, authored by a PhD. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)Author is printed under the title and has a doctorate in the related field. 5)Citation printed at the end of the article. 6)EBSCOhost is continually updated with new articles 7)Being a school-provided resource, the results may be censored, but I do not believe it had an affect on my results. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    Overview of how cloud services try to maintain security.
Reshunda Pickens

Lance's life: Travel, kids, golf handicap 'down to a 9' - 0 views

    • Reshunda Pickens
       
      The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received:  Currency (0 to 15 Points)  The site has the date of last revision posted. Yes  The site has been updated recently. Yes  Frequency of planned updates and revisions is stated. No  Total: 10  Content (0 to 15 Points)  The information will be useful to our curriculum and/or student interest. Yes  This information is not available in any other format elsewhere in my library. N/A  The information on the topic is thorough. Yes  The information is accurate. Yes  The purpose of the page is obvious. Yes  The information is in good taste. Yes  The page uses correct spelling and grammar. Yes  Total: 15  Authority (0 to 10 Points)  The authors are clearly identified. Yes  The authors and/or maintainers of the site are authorities in their field. Yes  There is a way to contact the author (s) via e-mail or traditional mail. Yes  You can easily tell from the domain name where the page originates. Yes  Total: 10  Navigation (0 to 10 Points)  You can tell from the first page how the site is organized and what options are available. Yes  The type styles and background make the page clear and readable. Yes  The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article.  The links are logically grouped. Yes  The layout is consistent from page to page. Yes  There is a link back to the home page on each supporting page. Yes  The links are relevant to the subject. Yes  The icons clearly represent what is intended. Yes  Total: 10  Experience (0 to 10 Points)  The page fulfills its intended purpose. Yes  The page is worth the time. Yes  The page's presentation is eye-catching. Yes  The site engages the visitor to spend time there. Yes  Total: 10  Mul
  •  
    Lance Armstrong is the athlete who came out with the shocking news that he cheated for his Tour de France wins. This is the state of his life a year after. The score for this article was an 88.7-Good, based off of the criteria provided in the article "Ten C's for evaluating internet resources" by Richmond, Betsy; Everhart, Nancy; Auer, Nicole J. This is why this score was received: Currency (0 to 15 Points) The site has the date of last revision posted. Yes The site has been updated recently. Yes Frequency of planned updates and revisions is stated. No Total: 10 Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. Yes This information is not available in any other format elsewhere in my library. N/A The information on the topic is thorough. Yes The information is accurate. Yes The purpose of the page is obvious. Yes The information is in good taste. Yes The page uses correct spelling and grammar. Yes Total: 15 Authority (0 to 10 Points) The authors are clearly identified. Yes The authors and/or maintainers of the site are authorities in their field. Yes There is a way to contact the author (s) via e-mail or traditional mail. Yes You can easily tell from the domain name where the page originates. Yes Total: 10 Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. Yes The type styles and background make the page clear and readable. Yes The links are easy to identify. Yes, there is an abundance of links referencing topics directly related to the article. The links are logically grouped. Yes The layout is consistent from page to page. Yes There is a link back to the home page on each supporting page. Yes The links are relevant to the subject. Yes The icons clearly represent what is intended. Yes Total: 10 Experience (0 to 10 Points) The page fulfills its intended purpose. Yes The page is worth the time.
Cameron Browne

What is malware and how can we prevent it? | Security News - 1 views

  • Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner.
  • There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.
  • The best protection from malware continues to be the usual advice: be careful about what email attachments you open, be cautious when surfing and stay away from suspicious websites, and install and maintain an updated, quality antivirus program.
deborahnolan74

How the N.S.A. Cracked the Web - The New Yorker - 0 views

  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
  •  
    It’s been nearly three months since Edward Snowden started telling the world about the National Security Agency’s mass surveillance of global communications. But the latest disclosures, by the Guardian, New York Times, and ProPublica are perhaps the most profound yet: the N.S.A. and its partner agency in the United Kingdom, the Government Communications Headquarters, possess significant capabilities to circumvent widely used encryption software in order to access private data. Encryption poses a problem for intelligence agencies by scrambling data with a secret code so that even if they, or any other third-party, manages to capture it, they cannot read it—unless they possess the key to decrypt it or have the ability to crack the encryption scheme. Encryption has become only more pervasive in the decade since the N.S.A.’s “aggressive, multipronged effort to break widely used Internet encryption technologies” began in 2000. When you log into Gmail or Facebook, chat over iMessage, or check your bank account, the data is typically encrypted. This is because encryption is vital for everyday Web transactions; if for instance, you were to log in to your Gmail account using a park’s open wireless network and your username and password were transmitted in plain form, without being encrypted, your credentials could potentially be captured by anyone using that same network.
deborahnolan74

How Encryption Works - HowStuffWorks - 0 views

  •  
    How secure is the Internet for sending sensitive information? Learn all about encryption, authentication, hash algorithms and more.
  •  
    How secure is the Internet for sending sensitive information? Learn all about encryption, authentication, hash algorithms and more.
Jon Lawson

Office of the U.S. Intellectual Property Enforcement Coordinator | The White House - 2 views

  •  
    This is the site for the IPEC. A regulatory and enforcement branch of the U.S. government that investigates intellectual property claims, violations and infringements. It also establishes regulations to protect and secure intellectual property through changing technologies and methods globally.
Lucas Pergler

Cloud storage data risks and encryption | Naked Security - 0 views

    • Lucas Pergler
       
      1, 2)Article contains content of a serious nature that directly relates to my research by a published author many times over for a website made for internet security. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)The author is printed below the title for copyright. 5)Citation is not used aside from mentioning the company who stated the information in question. 6, 7)The site is continually updated (evidence from home page) and I do not believe that my search results that lead me here or this site is censored. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
Lucas Pergler

Collaboration Security - Cisco on Cisco - Cisco Systems - 1 views

    • Lucas Pergler
       
      1)Article contains content of a serious nature that directly relates to my research.. 2)No author mentioned, public statement by company. 3)My previous knowledge from working in the tech field and using this to work from home allows me to see the validity of the information therein from personal experience. 4)No author posted, copyright belongs to company. 5)Information is created by company, no citation necessary. 6)Being a public statement from a well renowned company, updates will happen as relevant information changes. 7)Public company statement, so censor ship is probably only done if needed to protect company assets. 8)I verified this site is viewable on IE, Firefox and Chrome. 9)Comparability not important for project and not available. 10)Context is open ended for this project.
  •  
    From leading company in online collaboration tools, risk created by employees.
anthony chaney

CCCCCCC.CCC (ten Cs) for evaluating Internet resources: EBSCOhost - 0 views

  •  
    "Directions: Use your judgment in allotting points for the various categories. Total the points for score. Currency (0 to 15 Points) The site has the date of last revision posted. The site has been updated recently. Frequency of planned updates and revisions is stated. Content (0 to 15 Points) The information will be useful to our curriculum and/or student interest. This information is not available in any other format elsewhere in my library. The information on the topic is thorough. The information is accurate. The purpose of the page is obvious. The information is in good taste. The page uses correct spelling and grammar. Authority (0 to 10 Points) The authors are clearly identified. The authors and/or maintainers of the site are authorities in their field. There is a way to contact the author (s) via e-mail or traditional mail. You can easily tell from the domain name where the page originates. Navigation (0 to 10 Points) You can tell from the first page how the site is organized and what options are available. The type styles and background make the page clear and readable. The links are easy to identify. The links are logically grouped. The layout is consistent from page to page. There is a link back to the home page on each supporting page. The links are relevant to the subject. The icons clearly represent what is intended. Experience (0 to 10 Points) The page fulfills its intended purpose. The page is worth the time. The page's presentation is eye-catching. The site engages the visitor to spend time there. Multimedia (0 to 10 Points) Sound, graphics or video enhance the site's message. Treatment (0 to 10 Points) Any biases towards the subject matter can be easily identified. The page is free from stereotyping. The page is age appropriate for content and vocabulary for its intended audience. Access (0 to 5 Points) You can connect quickly to the page. The page is available through search engines. The page loads quickly. You can choose whether to download small
crinehart0420

What is a Digital Identity? - Definition from Techopedia - 0 views

  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual
  • organization or electronic device.
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
  • ...5 more annotations...
  • A digital identity is an online or networked identity adopted or claimed in cyberspace by an individual, organization or electronic device.
    • Brittni Roddin
       
      Important.
  • ore than one digital identity through multiple communities. In terms of digital
  • Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavior
    • andrew marte
       
      perfect example
    • crinehart0420
       
      Great example
  • Techopedia explains Digital Identity Like its human counterpart, a digital identity is comprised of characteristics, or data attributes, such as the following: Username and password Online search activities, like electronic transactions Date of birth Social security number Medical history Purchasing history or behavio
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  • ...1 more comment...
  •  
    Digital identity is an online persona or profile designed for one specific individual, for example a gamertag on Xbox Live.
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
  •  
    3. Digital Identity:  A digital identity is an online or networked identity adopted or claimed in cyberspace. http://www.techopedia.com/definition/23915/digital-identity Digital Identity:  he ways and means that identity is created and perceived in the digital world, i.e., online. It includes unique descriptive data, as well as information about relationships. http://www.wisegeek.com/what-is-digital-identity.htm  
gb malone

Nine Elements of Digital Citizenship - 3 views

    • yanika scotton
       
      1. Digital Access:   full electronic participation in society. 2. Digital Commerce:   electronic buying and selling of goods. 3. Digital Communication:   electronic exchange of information. 4. Digital Literacy:   process of teaching and learning about technology and the use of technology. 5. Digital Etiquette:   electronic standards of conduct or procedure. 6. Digital Law:   electronic responsibility for actions and deeds 7. Digital Rights & Responsibilities:   those freedoms extended to everyone in a digital world. 8. Digital Health & Wellness:   physical and psychological well-being in a digital technology world. 9. Digital Security (self-protection):   electronic precautions to guarantee safety.
    • Roberto Dunn
       
      one page, lots of useful information!
  • In the 19th century, forms of communication were limited. In the 21st century, communication options have exploded to offer a wide variety of choices (e.g., e-mail, cellular phones, instant messaging).  The expanding digital communication options have changed everything because people are able to keep in constant communication with anyone else.
  • A renewed focus must be made on what technologies must be taught as well as how it should be used.
  • ...22 more annotations...
  • Learners must be taught how to learn in a digital society. In other words, learners must be taught to learn anything, anytime, anywhere.
  • Business, military, and medicine are excellent examples of how technology is being used differently in the 21st century. As new technologies emerge, learners need to learn how to use that technology quickly and appropriately. Digital Citizenship involves educating people in a new way— these individuals need a high degree of information literacy skills.
  • We recognize inappropriate behavior when we see it, but before people use technology they do not learn digital etiquette (i.e., appropriate conduct).
  • Many people feel uncomfortable talking to others about their digital etiquette.  Often rules and regulations are created or the technology is simply banned to stop inappropriate use.
  • It is not enough to create rules and policy, we must teach everyone to become responsible digital citizens in this new society.
  • Digital law deals with the ethics of technology within a society.
  • Users need to understand that stealing or causing damage to other people’s work, identity, or property online is a crime.
  • Hacking into others information, downloading illegal music, plagiarizing, creating destructive worms, viruses or creating Trojan Horses, sending spam, or stealing anyone’s identify or property is unethical.
  • Just as in the American Constitution where there is a Bill of Rights, there is a basic set of rights extended to every digital citizen. Digital citizens have the right to privacy, free speech, etc. Basic digital rights must be addressed, discussed, and understood in the digital world.  With these rights also come responsibilities as well.  Users must help define how the technology is to be used in an appropriate manner.  In a digital society these two areas must work together for everyone to be productive.
  • Eye safety, repetitive stress syndrome, and sound ergonomic practices are issues that need to be addressed in a new technological world.  Beyond the physical issues are those of the psychological issues that are becoming more prevalent such as Internet addiction.  Users need to be taught that there inherent dangers of technology. Digital Citizenship includes a culture where technology users are taught how to protect themselves through education and training.
  • In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community.
    • gb malone
       
      digital security teaches us that we need protection at all times. ex{ virus protectionvirus protection
  • We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.
    • ino moreno
       
      Great notes guys!!:)
  • precautions
  • safety
  • safety
  • Digital Literacy:   process of teaching and learning about technology and the use of technology.
    • Katrina Quick
       
      to be taught, or to learn about technology and how to use it.
    • Nathan Pharris
       
      "Digital Citizenship" is refferenced in this passage. To be a "Digital Citizen" one must gain "electronic access."
  • Now everyone has the opportunity to communicate and collaborate with anyone from anywhere and anytime
  • digital rights and supporting electronic access is the starting point of Digital Citizenship
    • Nathan Pharris
       
      Another example of what makes us a "Digital Citizen."
    • DeJuan Griggs
       
      An Example of the way you should conduct yourself in a digital environment 
  • Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 
    • Gabrielle Yoder
       
      definition of digital citizenship
  •  
    Digital Citezenship
1 - 20 of 37 Next ›
Showing 20 items per page