Skip to main content

Home/ Diigo In Education/ Group items matching "security" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
D. S. Koelling

Embracing the Cloud: Caveat Professor - The Digital Campus - The Chronicle of Higher Education - 37 views

  • My work as chief privacy and security officer at a large public university has, however, given me pause to ask if our posture toward risk prevents us from fully embracing technology at a moment of profound change.
  • Consequently, faculty members are accepting major personal and institutional risk by using such third-party services without any institutional endorsement or support. How we provide those services requires a nuanced view of risk and goes to the heart of our willingness to trust our own faculty and staff members.
  • The technologically savvy among us recognize that hard physical, virtual, and legal boundaries actually demark this world of aggressively competitive commercial entities. Our students, faculty, and staff often do not.
  • ...5 more annotations...
  • But can we embrace the cloud? Can the faculty member who wears our institution's name in her title and e-mail address, to whom we've entrusted the academic and research mission of the institution, be trusted to reach into the cloud and pluck what she believes is the optimal tool to achieve her pedagogical aims and use it? Unfortunately, no. Many faculty and staff members simply use whatever service they choose, but they often do not have the knowledge or experience needed to evaluate those choices. And those who do try to work through the institution soon find themselves mired in bureaucracy.
  • First we review the company's terms of service. Of course, we also ask the company for any information it can provide on its internal data security and privacy practices. Our purchasing unit rewrites the agreement to include all of the state-required procurement language; we also add our standard contract language on data security. All of this information is fed into some sort of risk assessment of varying degrees of formality, depending on the situation, and, frankly, the urgency. That leads to yet another round of modifications to the agreement, negotiations with the company, and, finally, if successful, circulation for signatures. After which we usually exhume the corpse of the long-deceased faculty member and give him approval to use the service in his class. We go through this process not from misguided love of bureaucracy, but because our institutions know of no other way to manage risk. That is, we have failed to transform ourselves so we can thrive and compete in the 21st century.
  • But our faculty and staff are increasingly voting with their feet—they're more interested in the elegance, portability, and integration of commercial offerings, despite the inability to control how those programs change over time. By insisting on remaining with homegrown solutions, we are failing to fall in lockstep with those we support.
  • Data security? Of course there are plenty of fly-by-night operations with terrible security practices. However, as the infrastructure market has matured (one of the generally unrecognized benefits of cloud services), more and more small companies can provide assurances of data security that would shame many of us even at large research-intensive institutions.
  • If higher education is to break free of the ossified practices of the past, we must find ways to transfer risk acceptance into the faculty domain—that is, to enable faculty to accept risk. Such a transformation is beyond the ability of the IT department alone—it will require our campus officials, faculty senates, registrars, and research and compliance officers working together to deeply understand both the risks and the benefits
Kalin Wilburn

Write In Private: Free Online Diary And Personal Journal | Penzu - 2 views

  • Write in Private
  • Your own personal journal and online diary.
  • Don't want to share everything with the world? Easily keep your personal thoughts, memories,and ideas safe and secure in the cloud!
  • ...4 more annotations...
  • Rich in Features Privacy First  Penzu was designed to focus on your privacy. Unlike blogging,your entries are private by default. A Picture Is Worth A Thousand…Insert your own photos (now with flickr) and bring your entries to life! Share If You Want To  You can shareyour individual entries via email or createa public link and share with the world... Instant Search  Find long-lost entries quickly and easily with our fast filtered search and sorting.
  • Good for You Less Stress  Expressive writing is an extremely cathartic process, helping you to relax and release stress. More → Be Healthier  Numerous studies have shown that keeping a journal can improve your immune function. More → Get Smarter  Keeping a journal or diary can not only boost your "working memory" but your grades too. More → Lose Weight  Keeping a food diary has been suggested to double weight-loss when combined with a diet. More →
  • Serious Privacy
  • Locking  You can password protect your individual entries for extra privacy. Or, with a Penzu Pro account, you can lock the contents of your entries using military-grade encryption and a unique distributed security process to keep your data safe. SSL  Your entries are even more secure with 128-bit SSL, the same technology used by online banks to transfer information across the web. That means all entries, passwords, and data are safely sent to our servers from your computer or device. Read All About security
Clayton Mitchell

Information Security Program Assessment Tool | EDUCAUSE.edu - 12 views

  •  
    This self-assessment tool was created to evaluate the maturity of higher education information security programs
Greg Brandenburg

Foundstone Network Security - Risk Management - Free Tools - 11 views

  •  
    Network security tools
Sheri Edwards

Privacy Policy - Google Privacy Center - 4 views

  •  
    Information sharing Google only shares personal information with other companies or individuals outside of Google in the following limited circumstances: We have your consent. We require opt-in consent for the sharing of any sensitive personal information. We provide such information to our subsidiaries, affiliated companies or other trusted businesses or persons for the purpose of processing personal information on our behalf. We require that these parties agree to process such information based on our instructions and in compliance with this Privacy Policy and any other appropriate confidentiality and security measures. We have a good faith belief that access, use, preservation or disclosure of such information is reasonably necessary to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request, (b) enforce applicable Terms of Service, including investigation of potential violations thereof, (c) detect, prevent, or otherwise address fraud, security or technical issues, or (d) protect against harm to the rights, property or safety of Google, its users or the public as required or permitted by law. If Google becomes involved in a merger, acquisition, or any form of sale of some or all of its assets, we will ensure the confidentiality of any personal information involved in such transactions and provide notice before personal information is transferred and becomes subject to a different privacy policy.
Martin Burrett

Boys secure in their racial identity seek more diverse friendships - 17 views

  •  
    "Children often seek answers from parents, friends and media to better understand their racial identity. Middle school boys who feel secure about their race during this ongoing information gathering will likely befriend diverse people, according to a new University of Michigan study."
Janel Brennan

How does content that isn't secure affect my safety? | Firefox Help - 20 views

  •  
    To point out how to change the security settings in Firefox
Rachel Hinton

Colleges rush to create cybersecurity soldiers - 17 views

  •  
    The now infamous computer hacks infuriated consumers who had personal information compromised and Hollywood honchos who had embarrassing emails made public. But headline-grabbing computer intrusions are only a fraction of what is going on in the Wild West of cybercrime. According to Nextgov, the online resource for federal technology decision makers, energy giant BP faces 50,000 attempts at cyberintrusion a day. The Pentagon? Ten million a day. The National Nuclear Security Administration? Another 10 million. Dramatic websites from two major computer Security companies, Norse Corp. (http://map.ipviking.com) and Kaspersky Lab (https://cybermap.kasper sky.com) display vivid real-time maps of ongoing cyberwarfare being waged around the globe. That has sparked a mad dash for cyberSecurity experts - and another mad dash to recruit and educate students in that field.
Greg Brandenburg

Federal Cyber Service: Scholarship For Service - 0 views

  •  
    Big need for cyber security pros.
A Gardner

Security Theater Lessons From Utøya - Falkvinge on Infopolicy - 0 views

  •  
    worth the read
Einar Thorsen

Pentagon focuses on 'main suspect' in Afghanistan leak - This Just In - CNN.com Blogs - 0 views

  • Post by: The CNN Wire Filed under: Afghanistan • Security Brief • WikiLeaks
Deborah Batzer

The Comic Book Periodic Table of the Elements - 177 views

  •  
    This site contains comic book images linked to the chemical elements via the periodic table. Comics include Uncle $crooge, Metal Men, Metamorpho, Batman, Fantastic Four, Superman, and many more."> The Comic Book Periodic Table of the Elements BODY { color: rgb(0,0,0);} Th
anonymous

Camp Trains Future Cybersecurity Experts - 0 views

  •  
    According to the Government Accountability Office, cyberattacks on federal agencies jumped more than 400 percent from 2006 to 2009. And U.S. security officials say the country's defenses aren't keeping up. By one estimate, the United States needs up to 30,000 cybersecurity specialists to protect the government and large corporations. Now there are only about 1,000.
Paul Hieronymus

How Secure Is My Password? - 72 views

  •  
    See how secure your passwords are for todays hackers
Heide DeMorris

MediaSmarts - 71 views

  •  
    "Here we explore digital literacy and media literacy and their underlying aspects and principles." Also info and resources on cyber security
  •  
    "Here we explore digital literacy and media literacy and their underlying aspects and principles." Also info and resources on cyber security
Martin Burrett

Is your school https compliant? - 12 views

  •  
    "Earlier this year (2018), Google's Chrome web browser began marking sites without HTTPS as non-secure, meaning that when using a website, HTTP connections are being penalised. This has implications for many schools, in that crucial school information placed on the website will get flagged up to potential readers as being insecure"
k moses

The Saudi explanation for Jamal Khashoggi's death is a fable. Still Trump plays along. - The Washington Post - 2 views

  • As Mr. Trump surely knows, the new Saudi cover story is contradicted not just by evidence collected by Turkish authorities and by journalists but also by the reporting of the U.S. intelligence community. All point to Mohammed bin Salman as the instigator of a premeditated, cold-blooded and brutal murder, followed by the dismemberment of Mr. Khashoggi’s body. As The Post’s Shane Harris reported, CIA officials have listened to an audio recording in the possession of Turkish officials they say backs up their account that Mr. Khashoggi was murdered minutes after entering the consulate by a team of 15 men. The Post has identified five of those men as probable members of the crown prince’s personal security detail.
    • k moses
       
      Again ... Its sort of excellent that Trump has dropped all subtlety on dealing with the relationship of the USA and The House of Saud, ... I sure hope it revives the questions that were raised about 15 of the 19 plane hijackers were Saudis and their origins and funding were not subjected to scrutiny,
1 - 20 of 138 Next › Last »
Showing 20 items per page