Blog posts about Education, CyberSecurity, Digital Citizenship, Privacy, InternetSafety, curation, PKM, PLN, blogging, Global Collaboration, Coaching, Collaboration, eSkills, eLeadership, Coding, MakerED, MakerSpace, Social Media, How to learn, learning to learn
Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN’T it?!! Well, there is a reason behind:
WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well…) WE need to take care of them! AND our body? The same: WE need to have the daily reflexes to make for sure that WE don’t expose it to invasions of bacteria, virus, etc. Examples given: brushing teeth, showers, washing the hands after a toilet go, washing the hands before and after a meal, etc. Wearing a Condom when having sex, a necessary protection! Well OUR condom for the technical devices is the Anti-Virus, a MUST for Any-devices!!! Any-Devices, Apple as well?!!! YES!!! Please check the WHY in my Curation below please:
WE are used to these reflexes, aren’t WE?! At least WE should be!! SO, for computers, Laptops, Smartphones, tablets (iPads etc.), IoT devices (Smart-Home), WE should do the same, they costs a LOT of money and expensive stuff should get taken care of!! THE OTHER reason as well is, THAT WE are using the internet with THEM and so WE are meeting OTHER people with OUR technical device (which ever one it is…).
SO, that exactly the same as WHEN WE are meeting (as persons) OTHER people in Real-World: WHEN WE have a flu, WE will infect OTHER persons with it and an epidemic will occur!! WHEN OUR technical devices (which ever one it is…), connected to the internet, are NOT Up-To-date with the latest Updates they are vulnerable to threats (see it as a virus, e.g.) and once infected, WE will infect ALL the OTHERS as well (epidemic…)!!
As WE use these #AnyDevices with #AnyOS on a daily base, WE SHOULD be aware and develop a sense of Responsibility to protect each other!
Well, the above written is ONLY an introduction, please read my Blog posts in different languages (EN, FR, DE):
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)..
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of Europe and one of the smallest countries in the world, WHERE MOST persons don’t even know where to find it on the map, shows up as an international country well known and recognized for its Cyber Security knowledge, as well as its skills in ICT.
First of all: there is a lot of internal stuff which I am NOT authorized to publish and also some stuff which I don’t know! Luxembourg has also published a lot of articles in different languages (French, German) which I would attend to translate, it would take me years to do so! SO, I took the decision to publish the texts as as in the published languages!! For the really interested persons they would know how to translate them 😉 But let us GO for the most known important: Luxembourg is actually and since its start on Cyber Security showing UP with <===> Proactive-THINKing <===> in its mind!! Let us find out HOW it started:
First website about Cyber Security from a private person, Gust MEES. At the time people told me that I am crazy to publish about Cyber Security as THEY didn’t realize about it (MOST even STILL don’t in 2017!!).
2002: Gust MEES gave courses about Cyber Security in “Internetstuff ETTELBRÜCK” in Luxembourg.
2002: CASES
Personnes :
Serge Allegrezza – Directeur Direction de la Propriété Intellectuelle
Jean-Marie Reiff – Responsable OLAS
Henri Grethen – Ministre de l’Économie
François Biltgen – Ministre délégué aux Communication
Alexandre Dulaunoy – Consultant serveurs du monde du libre
Organisateur Hack.lu
Plus tard responsable CIRCL
Yves de Pril et William Robinet – CONOSTIX
Développeur du premier managed security system pour SME
2004-2007: MySecureIT
Click image to enlarge, please.
.
Cyber Security courses from Gust MEES were mandatory in Luxembourg EDUcation up from “7ème” (12-13 year old’s) and were THE FIRST in Luxembourg EDUcation.
2004: Lancement du premier projet CERT (23.5.2004 eLuxembourg)
04.02.2005: Lancement officiel de CASES
Le site web de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur.
Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.
Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.
Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.
CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.
2005
Personnes
Etienne Schneider
Angélique Joyeux – rédaction français
Cyril Pierre-Bausse
Pour Telindus
Carlo Harpes
Cédric Mauny
Thierry Zoller
Le site de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur.
Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.
Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.
Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.
CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.
La version beta de l’outil de communication CASiX développée par CASES a été présentée et délivré à plusieurs partenaires. Ceux-ci vont l’utiliser pour la communication avec leur communauté et pour la communication avec le nœud national CASES. CASES a lancé une étude d’analyse des risques basée sur la méthode française EBIOS dans le Ministère de l’Économie et du Commerce extérieur, et ce en vue de formaliser une politique de sécurité pour le Ministère.
Lancement officiel de cases 04.02.2005
Première Hack.lu dans la chambre des métiers
Conférence sécurité pour PME dans la chambre des métiers
Début des formations MySecureIt
2005.03.23 Signature du premier contrat de collaboration avec la Suisse – MELANI
2006: Gust MEES
In February23, 2006 Gust MEES was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it (in French) below, please:
Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising » par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 4 octobre 2006, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents ainsi que pour son travail effectué sur l’analyse des routeurs WiFi vendus par les ISP luxembourgeois.
Le Ministère de l’Économie et du Commerce extérieur a signé pour le compte du projet CASES une entente de collaboration avec le Centre de recherche informatique de Montréal dans le domaine de la sensibilisation des PME aux risques informatiques.
Les relations avec la Direction Centrale de Sécurité des Systèmes d’Information en France ont été intensifiées en vue de pouvoir conclure une entente de collaboration en 2007.
Le Ministère de l’Économie et du Commerce extérieur a, dans un effort commun avec le Ministère de l’Éducation nationale et de la Formation professionnelle, continué sa campagne de sensibilisation pour les enfants des classes de septième des lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une trentaine de classes.
Au cours de l’année 2007, l’équipe de CASES a fait plus de quarante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le « Internet Security Day » , et à l’étranger, respectivement sous forme de missions de sensibilisation, principalement dans es écoles primaires et secondaires luxembourgeoises.
Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale HACK.lu. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants. À cause des attaques de type phishing, CASES a organisé un workshop tenu par l’organisation hautement renommée AntiPhishingWorkingGroup.
Campagnes de sensibilisation
Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministèrede l’Économie et du Commerce extérieur, du Centre Informatique de l’État, de la Représentation Permanente du Luxembourg à Bruxelles ainsi que de l’ADEM. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.
CASES a organisé un stand à la Belle Étoile pour le Safer Internet Day, une initiative de la Commission européenne. Pendant toute une semaine, des adultes et des enfants ont pu s’informer sur les risques d’Internet et passer des tests de connaissance. La commissaire Viviane Reding a été accueillie et plusieurs classes d’école sont venues faire leur permis web.
Une campagne contre le cyberbullying (harcèlement via les nouvelles technologies de l’information et de la communication) a été lancée en forme de projet pilote dans un lycée du Luxembourg. CASES a réussi à motiver tous les opérateurs de téléphones mobiles, le ministère de l’Éducation nationale, la Police grand-ducale, le Parquet, l’Université de Luxembourg ainsi que le projet www.lusi.lu à s’investir dans le projet et à trouver une réponse à ce nouveau fléau.
CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations expliquant comment faire du commerce électronique sécurisé. Grâce aux ordinateurs de l’Internet Stuff” enfants et adultes ont pu passer des tests de connaissance ou consulter le site de CASES pour trouver des conseils pratiques. CASES a aussi invité sur son stand l’ABBL ainsi que le projet Luxembourg Safer Internet (www.lusi.lu).
De nouveaux contenus (6 grands dossiers et de nombreuses recommandations) ont été publiés sur le site de CASES. Plus de quatre-vingt alertes ont été mises sur le site pour avertir les internautes de vulnérabilités critiques ou importantes. La version allemande du site a également été lancée en 2007. CASES est aujourd’hui un des portails publics les plus visités au Luxembourg.
Deux permis web ont été conçus et mis en ligne. Le premier http://pwws.cases.lu est destiné aux enfants et vérifie leur savoir-faire dans plusieurs domaines du cyber-mode. Après avoir passé le test avec succès, les enfants peuvent imprimer un certificat. Pour les adultes, un permis vérifiant les bons reflexes nécessaires pour faire du commerce électronique en toute sécurité a été publié sous l’adresse http://epass.cases.lu.
-Des conseils spécifiques pour le commerce électronique sécurisé ont été publiés sur le site de CASES. Un “flyer”commerce électronique a été rédigé et sera mis à disposition dans les guichets de banques dès début 2008.
Les collaborations de CASES
CASES, ensemble avec le CERT luxembourgeois, a aidé plusieurs banques de la place ainsi que l’ABBL à réagir de façon coordonnée contre les nombreuses attaques de type Phishing qui ont eu lieu entre fin juillet et fin août 2007. PREMIERES attaques de type physhing.au Luxembourg.
Un projet pilote qui a pour but d’établir de bonnes pratiques sécuritaires au cœur des maisons de jeunesse a été lancé en collaboration avec le Service National de la Jeunesse et le ministèrede la Famille. Le but est de sécuriser le réseau informatique des maisons de jeunesse et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour adolescents.
CASES a contribué à l’élaboration d’un guide de bonnes pratiques pour la mise en place de réseaux sans fil dans des locaux publics. Le but de ce guide est de sécuriser le réseau sans fil et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour les clients. WiFi sécurisé
CASES a entamé une coopération avec le nouveau service de la DCSSI française en matière de sensibilisation du grand public.
CASES a été élu parmi les projets phares du domaine de la sensibilisation en Europe et a été invité pour la troisième fois de suite par l’European Network and Information Security Agency (ENISA) à faire une présentation sur le fonctionnement du projet.
CASES a, au cours des dernières années, su acquérir plusieurs partenariats avec des organisations étatiques étrangères ayant les mêmes missions de sensibilisation.
Projet CIP – Critical Infrastructure Protection La Direction du Commerce extérieur et de la Sécurité informatique a lancé, ensemble avec la Direction de l’énergie, un nouveau projet dans le domaine de la protection des infrastructures critiques dans le secteur de l’énergie. Des propositions, en vue de l’harmonisation de la terminologie pour l’analyse de risque et pour la gestion de crises, ont été élaborées. Des principes d’établissement du glossaire contenant les définitions et abréviations utilisées à travers tous les documents du projet ont été définis et un glossaire a été rédigé. Un schéma de classification selon trois dimensions (confidentialité, intégrité, disponibilité) avec plusieurs classes par dimension et règles de sécurité a été conçu et publié sur le site de CASES. Ce schéma servira de base pour un schéma de classification interne aux organisations. Il est destiné en premier lieu à créer un cadre pour l’échange d’informations entre le ministère de l’Economie et du Commerce extérieur et les opérateurs CIP. Finalement une cartographie des menaces a été rédigée.
Projet de mise en place d’un CSIRT gouvernemental
La Direction du Commerce électronique et de la Sécurité informatique, en collaboration avec d’autres acteurs gouvernementaux majeurs du domaine de la sécurité de l’information (CIE, CCG,..), est le chef de file dans le projet de mise en place d’un CSIRT national (CSIRT pour “Computer Security Incident Response Team”). Ce nouveau centre de gestion des incidents de sécurité informatique fournira les services suivants aux entités gouvernementales:
gestion et réponse sur incidents,
veille technologique,
bulletins d’alertes et d’avertissements,
point de contact et de coordination national pour toutes questions du domaine de la sécurité de l’information.
Dans le cadre du projet CSIRT, la Direction du Commerce électronique et de la Sécurité informatique a participé aux réunions du TF-CSIRT (http://www.terena.org/activities/tf-csirt/), du FIRST (http://www.first.org), ainsi que d’autres fora internationaux, lui permettant de développer des partenariats importants pour la suite du projet.Démontrant sa forte implication dans le domaine CSIRT, le ministère a co-organisé et hébergé la formation TRANSITS (formation spécialisé CSIRT, effectué par TF-CSIRT, et unique dans sons genre) au Luxembourg.
Projet Politique de Sécurité
La Direction du Commerce extérieur et de la Sécurité informatique a commencé à rédiger une politique de sécurité basée sur les standards de la famille ISO/IEC 27000, standards internationalement reconnus dans le domaine de la sécurité des systèmes d’information. Une vingtaine de politiques ont été rédigées, les procédures y référant sont rédigées au cours de l’année 2008. Ce projet vise premièrement à réaliser une politique de sécurité pour le ministère de l’Économie et du Commerce extérieur et, deuxièmement, à donner aux autres Ministères et administrations intéressées un guide de mise en place.
2008.
2008: LISA Stopline started 2008
LISA Stopline started 2008, became @INHOPE_PR member in 2008 and changed to @BEESECURE Stopline in 2012
2008: Gust MEES published FREE courses about Cyber Security on Google Knol; Google Knol discontinued its services on MAY 1st 2012; NO trace anymore :(((
Through the way-back-machineweb.archive.org I found back some stuff:
Au cours de l’année 2008, l’équipe de CASES a fait plus que cinquante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le “Internet Security Day 2.0” ou encore les Midis de l’Europe, et à l’étranger, respectivement sous forme de missions de sen sibilisation, principalement dans des ministères et administrations luxembourgeoises.
CASES a su réaliser l’exploit de former dans l’année scolaire 2007-2008, les enfants des lycées classiques et techniques fréquentant les classes de 7 ème au Luxembourg. Dans plus de cent-vingt classes primaires, des actions de sensibilisation similaires ont été réalisées. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet.CASES a aussi réalisé une dizaine de soirées d’informations pour parents d’élèves.CASES sensibilise aussi aux risques d’arnaques sur Internet.
CASES a participé au salon de l’éducation organisé par la Ville de Luxembourg et à la journée “Summer –Spill a Spass” organisée par la Ville de Dudelange, aux ateliers pédagogiques du Lycée Marie Consolatrice à Esch/Alzette. CASES est intervenu lors des journées pédagogiques de la Banque de Luxembourg et a participé à la “e-City roadshow” organisée par la Ville de Luxembourg. CASES a activement participé au “LuSI day” tenu au Forum Geesekneppchen, au “SIGI-day” à Contern et aux “Journées du livre” à Bascharage.
Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale “HACK.lu”. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants.
Campagnes de sensibilisation
Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministère de la Fonction Publique et de la Réforme administrative, Trésorerie de l’État, Centre de Logopédie, du Cadastre et de Cercle asbl. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.
CASES a su réaliser un partenariat avec “Le Luxemburger Wort”. CASES a publié chaque semaine un article de sensibilisation dans ce journal de très grande couverture. Ainsi plus de quarante articles de presse ont été publiés.- Dans le cadre de la coopération avec le “Luxemburger Wort”,
un test de “Wardriving” a été réalisé dans la Ville de Luxembourg. Ce test a démontré que la sécurité dans le domaine des réseaux sans fil est déplorable.
– CASES a contribué à une dizaine d’émissions radio sur 100,7.
– CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations sur des attaques via “Chevaux de Troie”. Un espace de jeu pour enfants avec un quiz sécurité a été proposé avec un très grand succès. Lors de la foire d’automne, une campagne de sensibilisation aux risques liés à “Bluetooth” a été réalisée.
– Une enquête sur les performances du social engineering a été réalisée en partenariat avec l’Université de Luxembourg. Lors de cette enquête, il a été essayé d’inciter les personnes questionnées à donner leur mot de passe. Plus de 1000 personnes ont été questionnées. Un rapport détaillé a été publié sur le site de CASES.
– CASES a lancé le label “suivant les réflexes CASES”. Une première déclinaison de ce label a été réalisée avec le label “WiFi sécurisé” qui a été attribué, après audit, à 3 sociétés sur 6 sites
Projet Politique de Sécurité
CASES a, ensemble avec le ministère de la Famille et le SNJ, réalisé un projet d„envergure pour mettre en sécurité les Maisons de Jeunes. Une politique de sécurité ainsi que des guides de bonnes pratiques ont été réalisés.
En collaboration avec le ministère de l’Éducation, un projet pour la mise en sécurité des Écoles primaires a été entamé. Deux projets pilotes ont été entamés.
Un projet de mise en place d’une politique de sécurité a été lancé en 2008 au sein d’une administration gouvernementale
2009
CASES a su réaliser l’exploit de former dans l’année scolaire 2008-2009, tous les enfants des lycées classiques et techniques fréquentant les classes de 7èmeau Luxembourg. Beaucoup de classes primaires ont été formées, et ce à partir de l’âge de 9 ans. En tout CASES a sensibilisé les enfants de plus de 300 classes. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet. CASES a aussi réalisé une vingtaine de soirées d’informations pour parents d’élèves.
CASES a participé au «Kannerstaat» de la ville de Junglinster.
CASES a publié un support scolaire, destiné aux instituteurs et aux parents. Ce livre vise à fournir les informations nécessaires pour pouvoir éduquer les enfants dans différents domaines liés à la sécurité de l’information. LEITFADEN
Collaboration avec le DNR
NACKT im NETZ
2010
Campagne brosses à dents
Création de smile GIE
2010: BEESECURE
Le ministre de l’économie Jeannot Krecké a présenté le 8 novembre 2010 BEE SECURE, un projet commun du Ministère de l’Economie et du Commerce extérieur, du Ministère de la Famille et de l’Intégration et du Ministère de l’Education et de la Formation Professionnelle.
5 Jahre sind im Internetzeitalter ganz schön lange und für BEE SECURE auf jeden Fall Grund genug, Partner und Unterstützer zusammenzurufen und gemeinsam einen Blick in die Vergangenheit zu werfen.
So versammelten sich am 9. Oktober rund 100 geladene Gäste im Forum Geesseknäppchen, wo allerhand „Requisiten“ der letzten fünf Jahre ausgestellt waren. Im Fokus standen die Sensibilisierungskampagnen, die seit 2010 BEE SECURE zur wichtigsten Anlaufstelle im Land machen, wenn es um die sichere Benutzung von Computer und Co geht.
May 2012: Gust MEES published FREE Cyber Security courses about Cyber Security on WordPress https://gustmees.wordpress.com
2013-2014: Cyber-Security on Social Media twitter, Gust MEES introduces the hashtag <===> #FSCD<===> “Friday Security Check Day”, where users get reminded about Security by posting different blog posts and articles.
2013
.
Gust MEESgot interviewed about Cyber Security through Social Media twitter by Doug PETERSON who is ALSO featured At EdTech:we strive to create the most valuable resources for higher education technology professionals. One of the ways we do that is by highlighting the smartest and most innovative education tech bloggers on the web.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure). L’auteur était aussi gagnant d’un concours en électronique en 1979 ( Pays germaniques ) et voyait son projet publié dans le magazine électronique “ELO”.
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
The author was also a winner of an electronics contest (Germanic countries) in 1979 and got his project published in the “Electronics Magazine ELO”).
.
Stay tuned for next blog post(s) 😉..
.
.
Keywords for me to create this blog post: CLUSSIL, Mysecureit, CASES, LUSI, STOPLINE, Kannertelefon, BEESECURE, CIRCL, Security made in Luxembourg, SMILE, hoffilux, Gust MEES, Internet Monitor, LUSI, LISA-Stopline, Interview,
Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.
Safer Internet Day 2016 will be celebrated on Tuesday 09 February 2016, with the strapline of ===> “Play your part for a better internet” <=== following the success of last year’s campaign.
This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.
For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.
Keep checking back for the latest news as the SID 2016 starts to take shape.
.
.
Click the above image to access the article, please.
.
Check the video below, please, who explains about it.
.
.
.
.
My participation for the SID2016
WHAT is special this year with my participation on SID2016?
I created a ===> #GlobalCollaboration#blog <=== from @knolinfos (my pseudo on twitter) & @ICTPHMS& @kimmindy7 for #LEARNing about #DigitalCitizenShip. The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.
Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).
How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):
Cyber-Security is a shared responsibility, WE are ALL responsible for a more secure Internet and it is ===>OUR responsibility to build up the future for OUR kids, learners and students!<===
WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!
.
======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======
.
.
That is why I am participating on SID2016 with my FREE courses here:
MOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015on their blogs and/or websites
People who are on Twitter may use the hashtag #SID2016 to promote that Event, thanks for Helping to make the Internet a more secure place!
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
The author Dan KIRSCHteaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA. Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.
A GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!
.
« Good habits formed at youth make all the difference. »Aristotle
TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!
The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!
Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall,
Read below please, for more detailed instructions and information, thanks.
.
THE Facts
.
.
.
.
.
Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:
First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:
There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:
OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:
Click the image above to access the video, please.
.
WHO Are The Countries Who Host The Most Botnets!?
It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Educationto teach people aboutCyber Security.
.
Click the above image, please, to access the article who explains in detail.
.
How A Botnet Is Created
[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.
One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.
Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.
An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.
Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]
As already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:
It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet!
.
Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)
The month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance ofGOOD knowledge about Cyber Security then…
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
.
I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉Click the image below to access the FREE game.
WHAT Actions Could Get Taken WHO Are Student Centered?
WHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter @NancyW <===. Here WE go, check the infographic below, please.
.
[GM] Please check my blog posts below, who explain in detail:
When YOU read the above mentioned blog posts, YOU will realize that I mostly use the possibility to include the students, learners in the process of learning (student centered); THEY will go for “Learning by Doing” by working in a team and so taking THEIR OWN responsibility. THEY will be guided by a coach who helps THEM for “Learning To Learn” by asking them questions when (s)he is seeing that the token direction is going the wrong way with its ===> Proactive Thinking<===. As the internet doesn’t forget anything, a ===> Proactive Thinking <=== is a MUST! THE word ===> FAILURE <=== is on the wrong place here, sorry! YOU also will NOT see me using the word ===> FAILURE <=== as it is NOT a positive word, BETTER is ===> Learning by Doing <===, check below, please, the reason for WHY:
.
Click the above image, please, to access the article.
.
[GM] Possible questions could be: “Are YOU sure that it is the right way?“, “Think twice, please, isn’t there something missing?“… Well, I let YOU do some work ALSO, think on it what else could get used as questions and post them below please, with YOUR initials, thanks.
[MK] Mindy KIM (USA)
[MK] What changes could be made to improve the overall message?
[MK] You made a strong point here, where else could you apply the same idea?
[MK] Who is your audience?
[MK] Could you say the same thing using less words? Would your message be understood?
Greetings from Patrick Henry Middle School in Sioux Falls, SD.We are 6-8 middle school ICT class! We blog about Digital Citizenship & Internet Safety. Very excited to participate in the collaborative blog! Please look forward to new posts coming soon. You can find us on twitter @ICTPHMS as well.
The following linkhttp://mrkirsch.edublogs.org/2013/02/27/internet-safety-post-1-pd-2is an archived student contributions to our ICT blog. Topic was Internet Safety (8th graders). We are currently finished up our Digital Citizenship Unit.. more to come. Check the screenshot below, please.
.
.
Student Centered Activity via @ICTPHMS. Creating #infographics on Internet Safety. Our class is going to be resubmitting their infographics during our Digital Citizenship Unit. They will have resources provided. The post will come Friday!
Post: 04/28/2015
The following is a link to my 7th grade student’s Video projects. The objective for the students was for them to create a video describing how “Technology Has Impacted their Lives” in either a positive or negative manner. The students were put in groups in order for them to film and describe their content. I really wanted the students to focus on how technology has become an integral part of everyday life; however can this become bad?? In essence, I wanted students to focus on the content people put on the internet and/or share information they should ==> Privacy. These videos were created by 7th grade students. The following videos depicting students do have permission from parents/guardians to be shown on the blog.
The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.
Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).
The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.
Learning about Digital Citizenship through comic strip creations. See an example below, please.
.
.
Objective: The objective of the post is for students to learn about Digital Citizenship through stories.
Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students are creating comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.
Sample of my 8th grade Blog Prompt for next week. Check Below..
Who owns information?
Objective:
After discussion, students will understand basic concepts of intellectual property such as copyright and plagiarism. Students will understand the purpose of Creative Commons as well as how to find a Creative Commons license for an image on the Internet.
Rationale:
In order to be ethical users of online information, students must understand that they have responsibilities to owners of information and creative works online. They must understand the basics of those rights and strategies to find out how to properly and ethically use what they find online.
Focus question:
When you buy a song, is it really yours to use how you want? Are all images online available to use however you want?
Should creators of information, images, songs etc. be paid for their work?
Students will watch short video on monkey photo and discuss what rights monkey/photographer have in this specific case:
Post: 13/01/2015: Teaching Digital Citizenship using Digital Storytelling (comics).
This semester I wanted to teach Digital Citizenship in a different way with my middle schools students besides just “discussing” the positives & negatives via our blogs. Essentially, I wanted to incorporate our blogs as well as some educational technology platform. After collaboration with Gust M. via twitter I have decided to have my students (8th graders) blog about Digital Citizenship while creating comics (digital storytelling). The platform (many out there) I have decided to use ischogger.com. The following instructions are what I will be giving my students (thought I would share). Thank Gust for the collaboration. 🙂
Students will learn digital literacy and citizenship through combining comics and digital storytelling. In the first 1-2 weeks of the unit, students will research news stories about technology, internet safety, social media, and explore characteristics of comics, while learning about digital storytelling.
In weeks 3-4 students will design their digital stories via chogger, determine their characters. Who is the protagonist and antagonist of their story and what their main idea (origin of story) will be. The students will be instructed that their main idea has to incorporate an aspect of Digital Citizenship; such as social media safety, cyberbullying, identity theft, and scams etc.
Once each student as finished their digital story they will post this on the blogs where the class as access to them and we can learn about Digital Citizenship in a fun and collaborative atmosphere. Once the project is completed examples will be provided.
Post: 16/12/2014: Final Digital Citizenship Mr. Kirsch’s Blog Post (student reflections) Prompt below:
“Taking into account all of the articles & scenarios we have discussed within class this semester in ICT III what factor of Digital Citizenship are you going to take with you (think about social media, and future jobs)?
How can you be sure that you will not fall into the “trap” of posting information on the Internet/Social Media that may or may not hurt you in the future??”
Post: 10/12/2014: Teaching Digital Citizenship through Scenarios (Blog Posts).
Once I decided I was going to teach Digital Citizenship to my 6-8 middle school students it’s was brought to my attention of producing student reflections & insights through creating blog posts on teacher given scenarios. This is a great methodology that allows teachers to see students reflections, insights, as well as allowing students to collaborate with one another.
Storify is a visual way to tell social media stories using your Tweets, Facebook updates, pics, and other social media information. Storify is overwhelmingly a neat way to show how a story develops over social media — without you having to take screenshots and insert your own links.
Click the blue “Create a Story” button in the top right hand corner.
Look at the right side of the new screen where the icons of your favorite social media websites reside.
Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.
Want an Example?
Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.
Post: 25/11/2014
Student reflections (8th graders) in Mr. Kirsch’s ICT class on their Social Media Profiles verse their “hard copy” resume. Our class discussed how employers are looking at individuals Social Media profiles (first) before their actual resume. Teaching students to be aware of their online presence aka “Digital Footprints.” The link is provided below:
Our 8th grade (12-13 years old) ICT students just finished posting their reflections via #blogging on our topic: Social Media: Good or Bad? The objective is teaching students to be aware of what they share on Social Media, but at the same time realizing the benefits of Social Media as well. Check the link below, please:
The following link is directly from my class blog:http://mrkirsch.edublogs.org/2014/04/17/ksfy-story-on-cybersecurity . The story conduct by the news-station come from one of my 8th grade ICT classes. Our focus was teaching students CyberSecurity. Please check it out! I do have the rights to the video if anyone would like a copy.
[GM] Gust MEES (Luxembourg/Europe)
Added on 07/01/2015:
Ideas: using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style where THEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.
I created these comics with dialogues with the following online program:
If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:
The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <=== 😉
Find below, please, WHAT skills the learners will need in the future. Thus as a reminder for getting NEW ideas 😉
.
.
By analyzing WHAT WE are doing through the “Coaching” and “Collaboration“, YOU will realize that WE could cover ALL the abilities and skills needed from the above mentioned. BTW: the above screenshot is from the book of “Howard GARDNER” ===> Five Minds For The Future <===, a book any teacher should read to understand what is needed for the future. It should be considered as required reading! YOU will understand then ALSO WHY interdisciplinary teaching and learning is a MUST to be on a modern way and to catch up as quick as possible with the growing NEW pedagogy and technical possibilities.
Well, present authors are following each other since long through Social Media Twitter and through a tweet (Twitter Post) it happend, see screenshot below, please.
.
.
Through curation and by using Social Media Twitter the authors met virtually (NEVER met in real world) because THEY are in a common “PLN” (Personal [Professional] Learning Network) and appreciated each other through THEIR posts on Twitter, blogs, skills and competency. THEY found a common point ===> Digital Citizen Ship <=== and want to share THEIR competency with YOU dear readers, students and learners.
The authors [GM], [MK], [ICTPHMS] will comment here THEIR experiences through the adventure of global collaboration which THEY experienced.
[GM] My advice (as I am used to it since ages ===> (2002-2003) <===:
Before starting such a BIG project, YES it is a BIG one as YOU are dealing withdifferent mentalities and cultures, is to set up rules up from the beginning to avoid BIG mistakes and not necessary stress for ALL.
This is called ===> Proactive THINKing <=== BETTER to use it as as YOU could come into situations without an issue when NOT doing it and WHO wants that!?
Concerning ===> Proactive THINKing <===: most people don’t know about WHAT it is, I will explain very shortly: deep thinking on what could happen in case of to avoid it up from the beginning. YOU could ALSO say: thinking of the “Worst case” who could happen and preparing to that it would NOT happen. OR, if YOU are smart, using Psychology for that it will happen (ONLY positive things…)!TIP: read ONLY the bold text to understand it quickly 😉
Check ALSO these links, please, who explain about “International Collaboration”:
The authors are from Europe (Luxembourg) and the USA, please check below:
.
The authors: actually on October 11th, 2014: Gust MEES (Administrator), Mindy KIM (Editor), ICTPHMS (Editor)will be represented by THEIR initials such as:
Here below is a little reminder on the How-To WE are using this blog post, please respect it, thank You.
.
Please click this link first before STARTING ===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media<=== where YOU will find the necessary information on ===> How To <=== work on OUR global collaboration blog, thanks to respect this.
.
Student Centered Initiatives
[GM] Well, that’s WHY I was inviting @ICTPHMS as THEY know the How-To by using curation and blogging with THEIR students. THEY will explain it to YOU here below 😉 My 8th grade ICT class blog about Internet Safety and Digital Citizenship with one another via edublogs. The goal is to teach the students how to communicate and share information on the Internet and/or Social Media! I post a blog topic for the week and my students have the rest of the week to respond with their thoughts as well as commenting on another’s blog posts as well. Trying to keep them from falling into the trap we see so much – people posting and sharing information they should NOT on the internet.
[MK]My classroom is a unique blend of students. We focus mainly on helping students develop communication and the belief in their abilities. To do this we have a classroom blog where we showcase our accomplishments, what we are working on, and students come up with conversation topics for our class and parents. Students review the blog and give their opinions. I am there to help them navigate.
Since then my class has taken time to build our writing skills, comprehension skills, and our ability to synthesize information. We are learning about shapes and where they are in nature and around them in everyday life. We will be reviewing these key ideas.
We begin lessons by learning important vocabulary and learning basic knowledge:
.
.
.
.
This is what was added to the anchor chart after learning vocabulary, discussing characteristics of shapes, and looking for objects within the classroom that we use daily to connect to the 2D and 3D shapes. We talked about sides, corners, solid shapes, flat shapes, and started coming up with questions we wanted to answer throughout our shape study. Questions we have:
1). Why do circles have no sides?
2). How many squares make up a box?
.
.
.
.
WHAT Is Already Realized From The Authors For A GOOD Digital CitizenShip Learning?
[ICTPHMS]
Online is a great place to compete for scholarships and it is also a great place to be disqualified from them. Find out how you can unknowingly lose scholarships.
Two Sides of the Coin
The Internet is a great source for finding generous scholarships. Fastweb.com is a popular scholarship vault holding 1.3 million scholarships for students that qualify. It is free. Students register and complete an online interview and scholarship applications will begin arriving soon after that.
Colleges are known for giving the largest scholarships and frequently for all four years of college. And, local organizations give scholarships to students for college—usually for the freshman year only.
These scholarships can be easily lost if students post inappropriate profiles on various sites like
Twitter
Facebook
MySpace
Colleges’ admission counselors are beginning to investigate students considered for scholarships beyond the usual letter of recommendations. They are beginning to Google in student names and see what they have posted on the Internet.
Google Search to Screen Students
In increasing numbers, colleges are using a Google search to screen students. Some check students randomly, some check only if students have been brought to their attention, and others are actively researching students online.
Air-Tight Online Profile
How can students make sure they are squeaky clean online?
Do not post anything to your site that would be morally or ethically questionable.
Never post personal information such as your address, daily schedule, or phone number.
Make your profiles private so only a selected group can view your information.
Don’t add “friends” you don’t personally know.
Ask friends to remove any photos of you that could be seen as unflattering.
Make sure they never use your name when they add you to their site.
Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)
The month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance ofGOOD knowledge about Cyber Security then…
.
Click the above image to access the article, please.
.
Click the above image to access the article, please.
.
[GM] I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.
Do WE Still Have Privacy Rights In The Digital World!?
.
According to latest press releases: Based on internal NSA documents, “Der Spiegel” reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung.
[MK] Online perceptions, everyone can “learn” about who you are.
[MK] Future jobs, interactions, and networks are informed about you from your online “profile”.
[MK] Beware what you share, share what you would not mind the whole world knowing.
.
.
.
.
.
How Can Education Help To Lower Cybercrime?
A GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer.
.
.
.
.
.
Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:
OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:
Click the image above to access the video, please.
.
WHO Are The Countries Who Host The Most Botnets!?
It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Educationto teach people aboutCyber Security.
.
Click the above image, please, to access the article who explains in detail.
.
How A Botnet Is Created
[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.
One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.
Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.
An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.
Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]
Cyber Security Month, NCSAM and Cybercrime, screenshot lost money, visual cybersecurity screenshot + link,
.
.
.
.
A NEVER Ending Story Which WE MUST Be Prepared For, But How!?
Technology is evolving mostly much more quick as MOST persons can follow and learn about it, so… We will create a “FAQ’s” list, a “Frequently Asked Questions” list together, which I will ask YOU to elaborate below please, thanks in advance.
Team, YOUR collaboration is required, please propose YOUR questions:
A: Students gain many academic and social skills from using many methods of demonstrating what they know. In the blog students will be able to capture their ideas, comments, and pictures of what they learned. They will have the ability to reflect on their work and their peers. These are advanced skills they will use beyond the classroom.
Q: Can my child do this?
A: Yes. Your child will learn step by step. They will utilize help from me and their peers to understand how they can communicate their ideas, ask questions, and comment on what they are learning about. They will learn internet safety, how the internet can be used to learn, and how it applies to them.
Q: How can I access the blog?
A: I have the password and username set for each student. You log in using the four steps and your child will be able to show you as well. If you have any questions ask your child first and then bring the questions to me for further information.
Q:…
A:…
Q:…
A:…
Q:…
A:…
Q:…
A:…
[ICTPHMS] (Editor)
Q:…
A:…
Q:…
A:…
Q:…
A:…
.
[GM]Together with[MK] I created such a FAQ’s list which YOU can check below, please, to get an idea:
How Will WE Handle This Blog Post To Stay Up-To-Date?
[GM] Well, that isn’tTHAT difficult as most would think 😉 As the present authors here are ALL using ===> #Curation <===, they update already THEIR curation platform. SO… WHAT more easy then ONLY present below the links to THEIR curation which is permanently updated. Same for the blogs which the authors are maintaining… Check below, please:
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
.
.
The author Dan KIRSCHteaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA. Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge of being a member of my school district’s ICT curriculum committee. We are rewriting & updating our ICT curriculum for students 6-8 for the 2015-2016 School Year.
Well, there is a lot of different views! WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter @NancyW<===. Here WE go, check the infographic below, please. .
.
WHEN WE have a deep look on it WE will see ALSO ===> Digital Security <=== which I will define here as ===> Cyber Security <=== where ===> Internet Safety <=== is included as well in it.
I prefer using only one word for NOT making people dizzy ===> Cyber Security <===, later, after learning about, YOU will automatically know what is belonging to it…
We will use ALSO Social Media twitter to communicate with OTHERS, here below an example on how this could be done:.
=> 9/n Concerning ===> #CyberSecurity <===: WE will install #Protection #Software on #AnyOS#AnyDevice for OUR own protection AND to protect ALSO OUR #Community as WE know THAT any infected device can infect OTHERS!
Check out WHAT the “ISTE” says about Digital Citizenship below, please. The International Society for Technology in Education (ISTE®) is the premier nonprofit organization serving educators and education leaders committed to empowering connected learners in a connected world. ISTE serves more than 100,000 education stakeholders throughout the world.
As WE know NOW know about WHAT ===> Digital Citizen Ship <=== is about, my idea about the How-To students could learn it through THEIR OWN responsibility by creating an ===> Advisory Board <=== on each school where THEY run it.
.
Digital Citizen Ship | Advisory Board Run By Students
What would be BETTER than using practice to learn about a difficult task such as ===> Digital Citizen Ship <===, isn’t it!? Well, how to do this? It’s a question which I was asking myself a lot and after ===> Deep THINKing <=== I got this idea: let the students, learners, create themselvesan ===> Advisory Board <=== on each school where THEY learn the practice, where THEY have their OWN voice and where THEY HELP each other to resolve problems (Cyber Bullying…), to get NEW ideas, to learn together, to take their OWN ===> Responsibility<===, where they learn to communicate, organizing meetings with parents and teachers to discuss…
How could that be done, organized?
Well, WHY NOT getting students, learners from any age of the school being part of such an ===> Advisory Board <===, together with one adult person who is present as a coach, not controlling them but guiding them. THEY should meat at least once a week and also taking care of THEIR school community (learning responsibility) by remembering THEM about the ===> #FSCD <===, THE “Friday Security Check Day“, where people learn to get the right reflexes about looking for “Updates” of installed software, checking the browsers if they are updated, helping to create a ===> Coding Club <===, helping to create a ===> Maker Space <===, and a lot more… Use YOUR creativity to find some more ideas 😉
SO… Let it GO, let it FLOW! Go for ===> DeepTHINKing <=== about the idea and THINK about the word ===> together <=== who brings people on a ===> Win-Win situation <===.
.
Keywords necessary for me to create this blog post:Proactive THINKing, understanding the internet, out of NAIVETY status, community protecting, Internet Of Things, Critical Thinking, Awareness, Internet Safety, Cyber Security, using Maker Space and Coding for the PRAXIS, IT Security-Scouts,
.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
On Thursday, September 4th there will be #SecChat who will explore the The Economic Impact Of Cybercrime and is an hour-long Twitter chat. I got invited through Twitter by @McAfeeBusiness
.
.
After long reflection I decided to create a blog about my advice as I think that it would be very difficult to answer these questions by Tweets. There are TOO MANY links and information, as well as advice to share that in the mass of shared Tweets they would get lost 😉 This allows me then in the Tweet on the Chat to post ONLY one link, the link to this blog, where ALL the necessary information are included and I could concentrate on the other Tweets much more easy!
AND I could ALSO use this blog post for my FREE courses about CyberSecurity!
As a reminder (ALSO for me), here below the blog posts about WHAT would get discussed:
As nearly everyone is using a smartphone today so there is ALSO a MUST to consider a “BYOD-Policy” (Bring Your Own Device) as the use of smartphones could be a BIG security risk to the SMB’s as MOST employees don’t have any knowledge about the basics of Cyber-Security, even that there smartphones and/or tablets, laptops could be infected with virus, trojans, keylogger…
AND Today on September 1st 2014 I found this on the internet which I highly WELCOME! Coding in the curriculum for Five-Year-Old with introduction to CyberSecurity, GREAT!
.
Click the image to access the article, please.
.
Q3: WHY aren’t CyberSecurity professionals, especially CyberSecurity companies present at schools!?
.
.
.
.
.
.
Q4: WHAT could get done to lowering Cybercrime?
Well, there are a lot of possibilities, who are MOSTLY related to ===> EDUCATION <=== and while using Social Media. Personally I use very often Twitter to send my advice to my readers. I started ages ago the ===> Friday Security Check Day <===, hashtag is ===> #FSCD <=== as areminder and to wake up people to get THE reflexes, check below, please.
.
.
I would feel happy if anybody else would join in to the ===> #FSCD <=== to remind people and to give them good advice, and/or to retweet it, thanks.
.
Concerning the ===> Internet Of Things <=== here below my advice. Would be good if discussed…
And for me the MOST IMPORTANT is to teach ===> Cyber Hygiene <=== in schools and in companies! THE user (us ALL) must have basics knowledge of Cyber Security as it is a national security issue and also a priority for the economy!
.
National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOV An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.
DYK: #ProactiveTHINKing can GET used on 2 ways? 1 way to avoid the worst, another way 2 make things happen by knowing habits, behavior😉
.
How To Use Curation For Learning and Even Teaching
I will give you some visual examples below who show you, so you can have a direct impression of it. No need to talk too much (what most of the teachers and educators do, sorry…), we go straight to the point…
A security by 100% doesn’t exist and probably NEVER will exist (I am sure about THAT!) , remind the human behavior…, and ALSO the bugs in programming code of software!
There is one word which any SMB MUST remember ===> Proactive THINKing <===, anything is changing that quick that nobody could act mostly in time!
Stay informed about what is happening on a daily base about Cyber-Security to get prepared for the UNKNOWN! It’s the letter “I” in “ICT“, which means “Information“! Once NEW information gathered which isn’t known YET by the employees, then comes the letter “C“, which means “Communication“! Inform YOUR employees and ICT-Staff as soon as possible, remember that in the “Security Chain” anyone MUST be strong!
===> THE MOST IMPORTANT when making training is to NOT use TOO MUCH technology words so that the employees might be able to UNDERSTAND! <===
Since already 1999 I was publishing online about the risks and Cyber Security and by seeing the unwillingness of people to learn about it I was going for ===> #DeepTHINKing <=== about WHAT could get done, here below my ideas:
I encourage my readers and followers from Twitter to be ===> lurkers <=== on the #SecChat to learn about it, thanks.
.
.
Keywords necessary for me to create this blog post: economy, CyberSecurity, CyberCrime, InternetSafety, NAIVETY, Ignorance, data loss, data breaches, reputation, confidence, trust, intellectual property, CyberHygiene, RESPONSIBILITY, Proactive Thinking,
.
.
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
.
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Why (And How) Teachers Should Start Learning and Teaching Cyber-Security
.
What should get be taught and learned more in the 21st Century while using ICT?
.
…
.
.
Being online since 1998 and giving courses aboutICT more than 10 years the practiceand my online excursions show me that IT-Security (basics of Cyber-Security) and Internet-Safety are not yet taught enough. SeriouslyI think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉
In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!
The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…
===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===
HOW COULD THAT BE IN PRACTICE???
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
5 Minds For The Future (Howard GARDNER) to understand what the world needs for abilities from students in 21st Century…
The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:
A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.
Seriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from the early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and Smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!
So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot…) and here are my propositions and advice:
Apart from teaching the basics of Cyber-Security in schoolsby traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:
I created a detailed blog about “Bring Your Own Device” (BYOD) who explains the Dangers, Risks, Policy, Advantages and ALSO Awareness for Cyber-Security on following address (READ IT!):
Internet-Safety ALONE isn’t anymore enough to teach in schools! By having read the above and understood it, YOU should admit that Internet-Safetyand basic knowledge ofCyber-SecurityTOGETHER are a MUST to teach in schools!
.
.
.
PS: Give your brain a kick and start thinking on how yourselves can contribute for a more secure Internet, the solutions are described here in this blog 😉
.
===> We are ALL responsible for a more secure Internet! <===
Some wise words:
With realization of one’s own potential and self-confidence in one’s ability, one can build a better world. Dalai Lama
By developing a sense of concern for others’ well-being, then no matter what others’ attitudes are, you can keep inner peace. Dalai Lama
.
.
.
===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===
Lots of Schools are using BYOD ===> Cyber-Security is a MUST then!
…
When schools, Colleges and Universities are facing a Downtime due to Malware, so are the courses online NOT available, nor can the learners, students access the necessary educational stuff for their learning, communication and sharing! This is a lost of time ===>
.
Under construction…
.
.
EdTech versus ICT?
.
.
.
.
Tonight on April 29, 2013 there will be a Twitter-Chat about this TOPIC which I will (hopefully) follow as it is at 8 pm, which means at 02:00 am in my country and it’s running 1 hour!
.
It looks like there is a big problem between the IT-department in schools and the Teachers as in some institutions Social Media is forbidden and a lot of restrictions to resources are made, which is certainly NOT a big pleasure for the educators, nor for the learners! AND it doesn’t reflect 21st Century Mentality at ALL!
Lots of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:
I created a very easy to follow plan on how schools could make Cyber-Security (IT-Security) much more easy for the IT-Admin when it would get followed; BUT the IT-AdminSHOULD try to make it aREFLEX on any FRIDAYthus to remind people of the Security-Task! That’s why I created on Twitter the #Hashtag ===> #FSCD <=== which means “Friday Security Check Day“!!!
Infographics, Videos and Curation as a pedagogical help for Learning
.
Over the years I have collected and curated a lot of Infographics and videos about IT-Security, Cyber-Security, Internet-Safety, Online-safety, eSafety, eCitizen, Digital Citizen, Digital CitizenShip which are a great way for learners, students to learn on a very quick way, you may check the resources here:
Me profiting from when I help other people, it is me who gives something and not the other person???” Such may be your thinking, but…There are new ways in Psychology who are describing this very well such as:
Barbara FREDRICKSON: Her main work is related to her broaden-and-build theory of positive emotions, which suggests that positive emotions lead to novel, expansive, or exploratory behavior, and that, over time, these actions lead to meaningful, long-term resources such as knowledge and social relationships.
.
When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.
.
===> SO, don’t forget please, to share this blog with others! WE are ALL responsible for a more secure Internet! <===
.
.
.
Final Word
If this blog makes you think and your grey cells are getting activated, so that your filter situated between your two ears (your brain) starts to get more activities as usual, than the author is very happy. Thus meaning that my message(s) made move something. Feel free to leave a constructive message…
.
..
.
.
.
===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===
L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure).
The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Learning from the fails of others for a BETTER more secure Internet!
Keywords for this free course:
.
Naivety, stupidity, Social Engineering, motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
.
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.
Introduction: When YOU are naive in Real World YOU will be even more in Virtual World, called Internet also!
.
What is naivety meaning? [Start Text from Wikipedia] Naivety (or naïvety, naïveté, etc.), is the state of being naive—having or showing a lack of experience, understanding or sophistication, often in a context where one neglectspragmatism in favor of moral idealism. One who is naive may be called a naif. [End Text from Wikipedia]
.
.
Important Message: First of all, I don’t want to blame and offense anybody! But, there is a deep need, even a MUST to say the below, excuse me for my openness and my “Critical Thinking“…
Let us START with sharing photos over the internet, is that really a MUST that everybody worldwide will see OUR private photos!? Sharing normal photos, there isn’t any harm, BUT private photos of family members and about OURSELVES!? Really a need and/or a MUST!? Go for “Deep-THINKing“, please 😉 Check ALSO the below article…
.
Smile: Your Selfie Is A Mugshot For The NSA | Naivety
Image Credit: Click image please to access the article
Strava fitness app divulges heatmap of secretive British SAS base
A secretive special air service base has been inadvertently revealed by a fitness app that has created a heatmap of running routes around the country.
A SAS base in Hereford, along with a nuclear deterrent naval base and the government’s spy agency GCHQ has been placed on a heatmap of Strava’s customers, including the profiles of several people who regularly run to-and-from the highly sensitive buildings.
A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.
Why does this matter? Well, imagine you are a member of websites X, Y and Z – and you use the same password on each site. If X suffers from a data leak and their password database is accessed, or if hackers manage to work out your password for X, then the bad guys will not only have access to your X account, but Y and Z as well!
If that weren’t scary enough, just over a quarter (26%) said that tend to use easy-to-remember passwords such as birthdays or people’s names, opening the door for their online accounts to be hacked into by criminals. [END Text from SOPHOS]
An external hard drive containing the details of 583,000 student loan borrowers has been lost, Human Resources and Skills Development (HRSD) Canada revealed on Friday.
This isn’t the first time when the HRSD compromises the personal details of Canadians. At the end of 2012 they lost a USB stick containing information on 5,000 people.
[Start Text from http://www.wpix.com/news/wpix-confidential-confetti-at-thanksgiving-parade,0,4718007.story] Something far more concerning than marching bands, balloons, cheerleaders and clowns was at the Macy’s Thanksgiving Day Parade. Confidential personal information is what some paradegoers found among confetti tossed during the world’s most famous parade. That information included social security numbers and banking information for police employees, some of whom are undercover officers. Most significant, the confetti strips identified Nassau County detectives by name. Some of them are apparently undercover. Their social security numbers, dates of birth and other highly sensitive personal information was also printed on the confetti strips.
The above shown screenshot (photo taken of my received eMail message) shows (in French) a message received from “apparently” VISA, BUT I don’t have any VISA CARD and so that message is by 100% a scam! NEVER click on the link in such an eMail! YOU will get tricked by the bad boys and your computer and/or SmartPhone infected with Malware! Courageous people and those who have a bit knowledge could follow my FREE course about Spam and Scam here to find out HOW TO fight them:
Trojanized Thanksgiving-themed screensavers lurking online: [Start Text from http://www.net-security.org/malware_news.php?id=2329] If you want to add a little festive cheer to your computer, a screensaver showing beautiful Thanksgiving images might be just the thing. But unfortunately, not all things downloaded from the Internet are safe to use, and cyber crooks love nothing more than to take advantage of popular holidays to saddle you with malware. [End Text from http://www.net-security.org/malware_news.php?id=2329]
In our second monthly Insight, our AVG Viruslab Research Group has uncovered the sheer amount of malware prevalent in file sharing sites, which often visited by eager gamers, intent on, well, gaming the system to get shortcuts that can save a lot of time and effort in progressing their character in their game of choice.
==> And while this may appear a niche attack, the actual scale of the market is far bigger than you may realise. <==
While most of us probably know of the explosion of online gaming over the past few years, we are perhaps unaware of the dollar size of the market. Five of the top multiplayer games alone: World of Warcraft, League of Legends, Runescape, World of Tanks and Minecraft, are played by more than 330 million people worldwide and are part of a multi-billion-dollar industry.
===> In fact, in the investigation by our team they found it to be as high as 90% in some sites. So gamers need to be aware that they are putting themselves at risk. <===
Windows users ALSO should become more aware, it’s NOT ONLY the others! But how to convince people of the need of BETTER Security, how can we measure it ourselves on a Windows machine!? I found recently a very interesting tool who checks YOUR computer: OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.
.. Concerning Apps we need to be very attentive on which Apps we download and also on the permissions we give those Apps to access! Check my Curation about it here:
Good example on how an App accesses your data below .
.
This App from ThingLink is one of the best examples of good practice as it doesn’t access to any private data, ONLY reading your Tweets and who you follow (which is already a lot of information), but one of the serious ones I have seen so far… BTW: I recommend ThingLink as a very good service and I use it also here http://www.thinglink.com/scene/296377469991124993?buttonSource=userPage
===> One of the worst examples I have seen is here below, it accesses even your “Direct Messages” on Twitter and excuse-me NO WAY!!! <===
Concerning the above link, check out carefully this text fom it “While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.““At the same time the companies, consumers and government employees who install these apps often do not understand with who and how they are sharing personal information. Even though a list of permissions is presented when installing an app, most people don’t understand what they are agreeing to or have the proper information needed to make educated decisions about which apps to trust,” Hoffman warns.
As I have talked about bad APPS, so how to know where to get the good APPS and where to download the APPS on trustful websites? That is very easy to answer, ===> download APPS ONLY from the main download places, from the ORIGINAL STORES!!! <===
Awareness: YOU should ALSO take care and install security programs on YOUR smartphones, as nobody is perfect this would help YOU ALSO in these difficult tasks…:
Naivety in the Digital Age means not realizing and accepting thedangers of the Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + TV, fridge …), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough! WE need ALSO to be able with OUR Critical-Thinkingskills to make the difference between bad posts and good posts, between APPS who are harming OUR Privacy and APPS who have a real value!!! NOT EVERYTHING posted on Internet is to accept nor to download!!! One should be able to know the trustful stuff… Don’t get tricked by the bad boys!!!
.
.
.
Concerning download sites, here are the trustful download websites:
One of the best examples of bad use of ICT is certainly coming from the NASA, from whom we wouldn’t expect it actually, but TRUE!
It’s already an OLD article, but still a good “bad example” to show to learners about learning basics of Cyber-Security and the importance to know that USB flash drives could be infected and thus infecting also other computers! Imagine that the whole mission could have failed and this because of naivety and that astronauts could have died!!!
But this not yet enough, NASA didn’t learn anything from it! Check: Stolen NASA laptop contained sensitive staff information:
In21st CenturyInternet-SafetyALONEisn’t enough anymore, a need for sure, but there is a MUST to teach and to learn ALSO about basics of Cyber-Security! Both together are a MUST! NOT ONLY one alone!
Would YOU like to get called a naif because not having those skills?
Certainly NOT, so check out my FREE courses please to become a good e-Citizen, Digital-Citizen and share it with YOUR family, colleagues, friends and…
[Beginning Text from Mashable] In our Cybercrime Series, presented by Norton, Mashableexplores some of the web’s greatest security breaches. From celebrity hacks to mobile hacks to Facebook hacks — these anecdotes will remind why it’s always good to use protection, and that rock-solid passwords and two-factor authentication are the first step toward security. [End Text from Mashable]
Not so clever after all…man falls victim to IQ test scam
A Luxembourg resident fell victim to an online scam after he scored an exceptionally high IQ score in a web-based test.
After completing an online IQ test with a score of 162 a man living in Mondorf-les-Bains was contacted via email by someone claiming to work for Interpol.
Read the whole story here, you will get a big laugh:
It took me a really a while before I took the courage to post the following now:
Following Teachers, Educators, Principals on Social Media for ages I see sometimes very strange attitudesfrom people who SHOULD have the RESPONSIBILITY knowledge about WHAT they are posting, BUT it isn’t so and that is WHY I post this NOW!
.
Because of being lazy, those teaching people make abbreviations of already existing ones to a two letter format such as:
Ss for students: Ss is a word from WWII & SHOULDN’t get used at ALL!!!
SM for “Social Media” ===> #SoMe is BETTER. SM is the official abbreviation for “SadoMaso”, which means Sadism & Masochism :(((
A global view of existing short words should be appreciated for the future as once published it is seen worldwide, please take this as an advice, thanks 😉
.
The bad guys are profiting from that naivety and ignorance and are making very BIG MONEY, even by using our own computers and private data, and all this without our knowledge as we don’t see what is happening on our computers and Smartphones when they are not protected! This should make anybody critical thinking and awareness should be the practice, protecting any device who accesses the Internet!
.Anything else which is important? YES, ICT Awareness!
To make sure that YOU will NOT be in a NAIVETY status, I recommend YOU to read the following:
YOU will learn NOT to be a naif and to see the reality!
Proactive Thinking, 21st Century Tools, motivation, engaging your learners (students), Learning to learn, respect, e-Citizen, Digital-Citizen, competencies, Professional Development (PD), Life-Long-Learning Strategies, Curation, How-To create a Book on WordPress, Critical Thinking, Quality Publishing, How-To use the 21st Century Tools, The SUCCESS of our learners (students) depends on our knowledge, WE as teachers, professors, educators, instructors can always improve, WE as professionals are not allowed to have a “lazy bone attitude”, WE as professionals need to protect the reputation of our profession by providing quality content, Accessibility, Blogging, Online-Safety, Cyber-Hygiene, hygiene, Awareness, motivation, engagement, heroes, Security-Scouts, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of Education, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
===> “Nothing in life is to be feared. It is only to be understood.” – Marie Curie – <===
===> The roots of education are bitter, but the fruit is sweet. Aristotle <===
.Take your time, please! There are a lot of information for some to learn; take it easy .
.
..
WHAT YOU MUST KNOW!
.
We are ALL responsible for a secure Internet!
Automatic Windows Update must be enabled
For Apple devices: ALL the updates must be installed also!
Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)?Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
While using “BYOD” we need a strong “BYOD-Policy” at least!
While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
===> NOBODY is perfect! A security by 100% doesn’t exist! <===
Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee and partner-owned devices as well as unmanaged guest devices.
===> I created a new Hashtag: #FSCD which means “Friday Security Check Day” + will remind YOU any Friday 2 check your devices 4 updates <===
.
. .
Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)….The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).
Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users. They’re looking for unlocked doors and open windows. The path of least resistance will always be the one most beaten down by bad guys.
There are many other reasons a cybercriminal might target your company and your employees, but the message is the same: ===>No business, no individual is immune. <=== Whether you are Sony or a mom-and-pop shop, you may be a target today. How you respond to that threat could make the difference between being safe and being breached. [End Text from www.informationweek.com]
In clear text this means that any private computer could be a target! Click the links below and learn more:
So, we know NOW that anyone could become a target of the cybercriminals, but what could the cybercriminals do with our computers and why is Cybersecurity so important for our Governments?
Well, cybercriminals could infect our computers and once infected they can take the control over our computers and we will even not remark it!
What can cybercriminals do with controlled (hijacked) computers?
===> But, did YOU hear also already about the actual hype around Cyber-War, Cyber-warfare, Cyber-Security? Wondering about what is happening? <===
Let me explain to YOU so that YOU will be able to understand it: AnyOperating System (OS) if they are Microsoft, Apple related devices (Mac, iPad, iPhone and..), Linux and others are vulnerable and so could be at risk to get hijacked by the bad guys!
The bad guys are making big money with infected computers but also they use infected computers for terrorist actions to attack Governments, banks, energy companies and more… The bad guys are connecting ALL the infected computers together to form a huge network, called a botnet.
By reading the above curated content YOU certainly will accept that there is a BIG PROBLEM and that a part of that problem could get solved when everybody has its computers and smartphones well protected, a MUST in the 21st Century! Any infected computer and smartphone could get used to attack YOUR Governments, read my FREE course about it here:
By protecting YOUR own computer(s) and smartphones YOU will not have ONLY best protection for YOU but also for YOUR Government! YOU protect the Community! YOUR computer may help to attack YOUR Government when not protected!
MUST KNOW: once a computer is infected with malware it can infect also thousands of different other computers through Internet! So we all have a certain responsibility to the “Internet Community”, making sure not to infect others by applying best protection on our computers!
What about Mac computers? As I said it already, any Operating System (OS) is vulnerable and the Mac and other Apple related devices are getting targeted ALSO by the bad guys, read my curation about it here, please:
What is the minimum what we can do to help protect our Government?
.
As we learned already in the above mentioned content, any computer and smartphone is vulnerable and by having read my course Your Computer As A Possible Cyber-Weapon!?YOU should know now already that we must:
Update our Operating System (Windows, Mac, Linux + others…)
The above mentioned tasks are very easy to follow and don’t even take YOU a lot of time, so apply them please for YOUR own protection, the community and your Government’s security.
.
===> Be aware of the malware! <===
.
How do I know if my computer is best protected!?
.
I found recently a very interesting tool who checks YOUR computer: OPSWAT Security Score is a free tool that scans your computer for the status of your installed security applications and provides a score along with recommendations on how to improve both the score and the security of your device.
Check my #curation to find best articles, blogs and courses about #education #itsecurity #CyberSecurity #EdCollCoach #GlobalEDU #cyberbullying, #AR #RA #augmentedreality #health #science #QR #qrcodes in EN, FR, DE…
Play the FREE Game and Learn about Cyber Security and Coding
App Advisor
App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
Click image to use this free service and find out of your installed Apps are “privacy-friendly” or check new Apps before installing them!