
.
.
How Can Education Help To Lower Cybercrime?
A GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!
.
« Good habits formed at youth make all the difference. » Aristotle
.
.
.
Image credit ===> http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html <=== Here below the main links about WHAT to learn about:
TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!
Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall, Read below please, for more detailed instructions and information, thanks. |
.
THE Facts
.
.
.
.
.
Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:
- http://blogs.mcafee.com/business/impact-espionage-intellectual-property
- http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime2.pdf
- …
.
.
.
.
.
Awareness And Naivety, WHAT!?
First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:
.
.
- Apple vulnerabilities and malware
- Linux vulnerabilities and malware
- Windows, everybody knows this already 😉
- ICT Awareness: What YOU SHOULD KNOW!
.
There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:
- http://www.scoop.it/t/securite-pc-et-internet?tag=Linux-Vulnerabilities
- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security
Concerning the Mac, check the Report from, SYMANTEC here:
.
.
Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:
- https://en.wikipedia.org/wiki/Android_(operating_system)
- http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Android
- http://www.scoop.it/t/securite-pc-et-internet?tag=Android
.
======> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <======
.
A MUST READ:
- http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks+the+greatest+threat+to+nat.
- https://gustmees.wordpress.com/2012/12/30/why-and-how-teachers-should-start-learning-and-teaching-cyber-security/
- …
.
OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:
- http://www.scoop.it/t/21st-century-learning-and-teaching/?q=botnet
- Botnets using Mac and iPhones
Click the image above to access the video, please.
.
WHO Are The Countries Who Host The Most Botnets!?
It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.
.
Click the above image, please, to access the article who explains in detail.
.
How A Botnet Is Created
[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.
One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.
Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.
An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.
Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]
.
Learn more:
-
Botnets: What are They, and How can You Protect Your Computer?
- Botnets / F-Secure
- Curation about Botnets (EN, FR, DE)
- …
- …
How To Protect To NOT Become A Zombie!?
As already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:
.
.
TOR And Anonymity!???
.
.
Learn more:
- Naivety in the Digital Age?
- Jail
- Prison
- Laws about ICT
- Luxembourg
- …
It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet!
.
Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)
The month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
.
I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.
.
Click the image above to access the FREE game.
.
Learn more:
- Cyber-Security PracTICE-Learn it in one week
- Visual Cyber-Security: See Attacks On Real Time
- Dangers of WiFi in public places
- ICT Awareness: What YOU SHOULD KNOW!
- Often Asked Questions: Are WE Becoming Too Paranoid About Cyber-Security?
- Often Asked Questions: WHO Are The Countries With Most Hosted Malware Servers And OTHER Cyber-Problems!?
- Often Asked Questions: Are There Cyber-Security Dangers With Apps And What’s About Privacy?
- Often Asked Questions: I Have Installed An Anti-Virus And A Firewall, Am I Protected NOW!?
- Digital CitizenShip | Internet Safety And Cyber Security Advisory Board Run by Students
- Cyber-Security is easy / Get THE right reflexes!
- …
- …
- …
WHAT Actions Could Get Taken WHO Are Student Centered?
WHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:
.
.
.
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure). |
.
Stay tuned for next blog posts 😉
.
.
coachpanther
November 12, 2014 at 7:11 pm
Reblogged this on CoachPanther.