Skip to main content

Home/ Digiteen/ Group items tagged security

Rss Feed Group items tagged

Julie Lindsay

Social networking belongs in school | Safe and Secure - CNET News - 2 views

  •  
    Article by Larry Magid mentioning Flat Classroom Project
Steve Madsen

Email hacker guilty: faces 20 years behind bars - 0 views

  •  
    A college student who hacked into former Republican US vice presidential candidate Sarah Palin's email account and posted some of its contents on the internet has been found guilty.
  •  
    There can be real world consequences for breaking the law in cyberspace
Steve Madsen

Twitter co-founder's next big thing: mobile payments - 0 views

  •  
    "Square, a new venture from a co-founder of Twitter, has launched a free application that allows anyone to accept credit card payments on the iPhone, iPad and Android phones."
  •  
    Why would this appeal to people in business? How secure are the transactions?
Dylon Smith

Digital Etiquette - 0 views

  • Digital Etiquette and CollaborationDigital Citizenship
  • Computers and the InternetYou use computers all the time. Now, most people think that computers are better and easier to use than things like pen and paper. Almost all the time, we also use the Internet when we use the computer. The Internet is a huge network that connects millions of computers.
  • The Nine ElementsThe Nine Elements, added together, make up Digital Citizenship. They are:Digital Access ---For everyone to participate with technologyDigital Commerce ---To buy and sell things onlineDigital Communication ---To exchange information onlineDigital Literacy ---To know how and when to use technologyDigital Etiquette ---To act online how others would expect you to.Digital Law ---The legal rights and restrictions for technologyDigital Rights & Responsibilities ---The rights you have online, and the way you should act when you have them.Digital Health & Wellness ---To know how to stay healthy and well while using technology.Digital Security ---- The things you must do to stay safe online.
  • ...2 more annotations...
  • Digital CitizenshipWe should always use the Internet and technologies like cell phones and computers wisely. Digital Citizenship can be defined as knowing how to behave responsibly and appropriately when using technology.
  • Acronyms and EmotionsAn acronym is a few letters or numbers that represents a word or sentence. There are some more well-known acronyms like:LOL ---Laugh Out LoudTTYL ---Talk To You LaterBRB --- Be Right BackG2G --- Got To “2” Go
Hayes G.

9 Simple Ways to Protect Yourself against Internet fraud | Experience Dominica - The Na... - 0 views

  • Use a secure password: not your date of birth, vehicle registration, telephone number or anything associated with you that someone might easily guess.
  •  
    Always use strong passwords so someone cannot guess it easily.
Joseph Edore

Safety Tips for Tweens and Teens - OnGuard Online - 0 views

  • Quick Facts While social networking sites can increase your circle of friends, they also can increase your exposure to people with less-than-friendly intentions. Here are some things you can do to socialize safely online: Think about how different sites work before deciding to join a site. Some sites allow only a defined community of users to access posted content; others allow anyone and everyone to view postings. Keep some control over the information you post by restricting access to your page. Keep your full name, Social Security number, address, phone number, and bank or credit card account numbers to yourself. Make sure your screen name doesn't say too much about you. Even if you think it makes you anonymous, it doesn't take a genius to combine clues to figure out who you are and where you can be found. Post only information that you are comfortable with others seeing and knowing. Consider not posting your photo. It can be altered or broadcast in ways you may not be happy about. Flirting with strangers online could have serious consequences. Some people lie about who they really are. Be wary if a new friend wants to meet you in person. If you decide to meet them, meet in a public place, during the day, with friends you trust. And tell a responsible adult where you're going. Trust your gut if you have suspicions. If you feel threatened by someone or uncomfortable because of something online, tell an adult you trust, and then report it to the police.
Audrey b

Netiquette - 1 views

  • Netiquette, network etiquette, is the social code of the internet. A network is a collection of computers that can communicate. Etiquette is a social code of behavior according to contemporary and conventional standards. Therefore, netiquette is the social code of the internet because the internet is a network and etiquette is a social code.
  • Netiquette is how we use the internet effectively. The common conventions. It's the way cyber society operates.
  • Spell check & proof read messages. Do not write in "all caps". Tell the truth in your profiles. Be yourself on the internet. Do not flame or respond. Stay away from spam and graymail. Be conservative in email you send. Do not send email late at night. Shop on secure sites. Use discretion when sharing.
  • ...1 more annotation...
  • Netiquette is positive and peaceful effective communication on the internet.
Jamie Davis

Stay Safe Online | Brought to you by the National Cyber Security Alliance - 1 views

  • Our friends at McAfee ( McAfee is an NCSA Board member) have published some great tips and advice about avoiding scams and threats in the online world.
  •  
    Need to research this.
Nolan C

Internet privacy - Wikipedia, the free encyclopedia - 1 views

  • Internet privacy is the desire or mandate of personal privacy concerning transactions or transmission of data via the Internet. It involves the exercise of control over the type and amount of information a person reveals about themself on the Internet and who may access such information. The term is often understood to mean universal Internet privacy, i.e. every user of the Internet possessing Internet privacy.
    • Hayes G.
       
      Defintition of Internet Privacy
  • In today’s technological world, millions of individuals are subject to privacy threats.
  • ...5 more annotations...
    • Hayes G.
       
      It doesn't matter who you are, you are subject to privacy threats.
  • Privacy measures are provided on several social networking sites to try to provide their users with protection for their personal information. On Facebook for example privacy settings are available for all registered users. The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos. Privacy settings are also available on other social networking sites such as E-harmony and MySpace. It is the user's prerogative to apply such settings when providing personal information on the internet.
  • Today many people have digital cameras and post their photos online.
    • Hayes G.
       
      This can be very dangerous.
  • Search engines have the ability to track a user’s searches. Personal information can be revealed through searches including search items used, the time of the search, and more. Search engines have claimed a necessity to retain such information in order to provide better services, protect against security pressure, and protect against fraud
  • In Spring 2007, Google improved their Google Maps to include what is known as "Street View". This feature gives the user a 3-D, street level view with real photos of streets, buildings, and landmarks.
  •  
    This is a very good description of what privacy on the internet. It basically defines internet privacy.
  • ...2 more comments...
  •  
    This has the definition of internet privacy.
  •  
    What internet privacy is. It is a definition
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
  •  
    Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website.
StephenK_mca MCA

How Much Is Privacy Worth? - 0 views

  •  
    The Supreme Court will hear arguments over whether the government is automatically on the hook for illegally releasing private data. The feds say individuals must prove harm before claiming compensation. By Ryan Singel.
Ahmed Kiyoshi El Maghraby

Case of stolen online identity - Technology - smh.com.au - 1 views

  • is daughter was among those who received the fake appeal and alerted him. The Balmain resident tried to log in to his Facebook account to see what was happening but couldn't.
  • "It said my email wasn't registered," he says.
  • Identity theft and scams on social networking sites, though, are not uncommon occurrences.
  • ...5 more annotations...
  • "ID theft has existed in both the online and physical world for some time."
  • Some users have their identity compromised via phishing sites that fool them
  • he threats to users on social networking sites
  • Other users click an email or website link that leads them to a web page that installs malicious software
  • criminals become "friends" and check a user's profile in the hope of guessing a password.
StephenK_mca MCA

Do Privacy Fears Allow Terrorism? - 0 views

  •  
    At a gathering of technology and privacy experts, a lawyer for a conservative think tank has one request: Stop the "hysterical cries" over loss of privacy and let the government do what it must to prevent terrorism. Michelle Delio reports from New York.
Ahmed Kiyoshi El Maghraby

stolen credit cards - 0 views

  • stolen card information is being sold on the black market
  • stolen bank account details, email accounts, and even full identities
  • Where once stolen cards used to be used fairly quickly making it easy to detect and cancel the card overseas fraudsters now bought the card details in bulk and stockpiled them for later use, making it difficult to detect where or when the information was stolen.
  • ...1 more annotation...
  • "It's costing banks tens of millions of dollars in Australia and New Zealand alone."
Ahmed Kiyoshi El Maghraby

credit cards cloned - 0 views

  • Using tiny technology disguised as part of the machine, the thieves then press new cards with customers' numbers and run amok
Ahmed Kiyoshi El Maghraby

Super safe hard - 0 views

  • * of networked storage to business users searching for the easiest and most technologically advanced way to share, secure and protect their most important data, including productivity application data, media files, backup data, and other digital files.
anonymous

US Gov. 2.3 gegapixel camera - 0 views

  • Airborne cameras providing a persistent view were a key factor in Task Force ODIN’s success in Iraq; given the new technology, their successors could have even more impact. And those cameras might have some effect on the home front too.
    • anonymous
       
      Impact > government
« First ‹ Previous 61 - 80 of 91 Next ›
Showing 20 items per page