RSS

Category Archives: SID2015

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

.

programmerman2

.


Let us talk about Hygiene…

Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN’T it?!! Well, there is a reason behind:

WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well…) WE need to take care of them! AND our body? The same: WE need to have the daily reflexes to make for sure that WE don’t expose it to invasions of bacteria, virus, etc. Examples given: brushing teeth, showers, washing the hands after a toilet go, washing the hands before and after a meal, etc. Wearing a Condom when having sex, a necessary protection! Well OUR condom for the technical devices is the Anti-Virus, a MUST for Any-devices!!! Any-Devices, Apple as well?!!! YES!!! Please check the WHY in my Curation below please:

WE are used to these reflexes, aren’t WE?! At least WE should be!! SO, for computers, Laptops, Smartphones, tablets (iPads etc.), IoT devices (Smart-Home), WE should do the same, they costs a LOT of money and expensive stuff should get taken care of!! THE OTHER reason as well is, THAT WE are using the internet with THEM and so WE are meeting OTHER people with OUR technical device (which ever one it is…).

SO, that exactly the same as WHEN WE are meeting (as persons) OTHER people in Real-World: WHEN WE have a flu, WE will infect OTHER persons with it and an epidemic will occur!! WHEN OUR technical devices (which ever one it is…), connected to the internet, are NOT Up-To-date with the latest Updates they are vulnerable to threats (see it as a virus, e.g.) and once infected, WE will infect ALL the OTHERS as well (epidemic…)!!

As WE use these #AnyDevices with #AnyOS on a daily base, WE SHOULD be aware and develop a sense of Responsibility to protect each other! 

ICT RESPONSIBILITYWell, the above written is ONLY an introduction, please read my Blog posts in different languages (EN, FR, DE):

My courses about Cyber-Security were mandatory in Luxembourg (Europe) EDUcation in 2004, learn more here please:

.


.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next blog post(s) 😉

.

.

.

 

 

 
Leave a comment

Posted by on September 10, 2019 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Apple Malware, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Connected Educators, Critical Thinking, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, DDoS, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, European Cyber Security Month, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IoT, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Luxembourg and CyberSecurity, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Often Asked Questions, Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Quality Courses, Reality, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, SID2014, SID2015, SID2016, SID2017, SID2019, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, Tutorials, Twitter, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Luxembourg and Cyber-Security: HOW did it START?

Luxembourg and Cyber-Security: HOW did it START?

.

Evolution of Education: Wordle Logo

 

.


Luxembourg and Cyber-Security: HOW did it START?

HACKATHON LUXEMBOURG-2016.

Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of Europe and one of the smallest countries in the world, WHERE MOST persons don’t even know where to find it on the map, shows up as an international country well known and recognized for its Cyber Security knowledge, as well as its skills in ICT.

.

Learn more:

First of all: there is a lot of internal stuff which I am NOT authorized to publish and also some stuff which I don’t know! Luxembourg has also published a lot of articles in different languages (French, German) which I would attend to translate, it would take me years to do so! SO, I took the decision to publish the texts as as in the published languages!! For the really interested persons they would know how to translate them 😉 But let us GO for the most known important: Luxembourg is actually and since its start on Cyber Security showing UP with <===> Proactive-THINKing <===> in its mind!! Let us find out HOW it started:

 

1996: Creation of the CLUSSIL

Just a few months after the publication of the European Data Protection Directive (officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data) the CLUSSIL (CLUb de la Sécurité de Systèmes d’Information – Luxembourg) was created by 13 IT Security Specialists:
Jean-Marc Buchet, Jean-Marie Déom, Francis Durigneux, Hans-Werner Eiden, Sandrine Gallouédec, Carlo Harpes, Anne Hendrick, Claude Lenert, Bruno Mamer, August Mordijck, Yves Reding, Stephen Purser, Marc Schintgen.

1998: Gust MEES

First website about Cyber Security from a private person, Gust MEES. At the time people told me that I am crazy to publish about Cyber Security as THEY didn’t realize about it (MOST even STILL don’t in 2017!!).

2002: Gust MEES gave courses about Cyber Security in “Internetstuff ETTELBRÜCK” in Luxembourg.

2002: CASES

Personnes :

  • Serge Allegrezza – Directeur Direction de la Propriété Intellectuelle
  • Jean-Marie Reiff – Responsable OLAS
  • Henri Grethen – Ministre de l’Économie
  • François Biltgen – Ministre délégué aux Communication
  • Alexandre Dulaunoy – Consultant serveurs du monde du libre
    • Organisateur Hack.lu
    • Plus tard responsable CIRCL
  • Yves de Pril et William Robinet – CONOSTIX
    • Développeur du premier managed security system pour SME

 

2004-2007: MySecureIT 

Gust-MySecureIT

Click image to enlarge, please.

.

Cyber Security courses from Gust MEES were mandatory in Luxembourg EDUcation up from “7ème” (12-13 year old’s) and were THE FIRST in Luxembourg EDUcation.

2004: Gust MEES created the website http://www.internetmonitor.lu

2004: Lancement du premier projet CERT (23.5.2004 eLuxembourg)

04.02.2005: Lancement officiel de CASES

Le site web de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur. 

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

2005

Personnes

  • Etienne Schneider
  • Angélique Joyeux – rédaction français
  • Cyril Pierre-Bausse
  • Pour Telindus
    • Carlo Harpes
    • Cédric Mauny
    • Thierry Zoller

Le site de CASES a été officiellement lancé le 3 février 2005 par le Ministre de l’Économie et du Commerce extérieur.

Au cours de l’année 2005, CASES a fait trente-deux présentations dans le cadre du Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information et de CASES. Ces présentations ont été faites lors de rencontres de spécialistes au Luxembourg et à l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 14 décembre 2005, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le Ministère de l’Économie et du Commerce extérieur a, dans un commun effort avec le Ministère de l’Éducation nationale et de la Formation professionnelle, organisé une campagne de sensibilisation pour les enfants des classes de septième de tous les lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisé la conférence HACK.LU, une conférence qui a rassemblé de très nombreux professionnelles du domaine de la sécurité informatique. La conférence a connue un très grand succès, tant dans la presse spécialisée que parmi les participants.

La version beta de l’outil de communication CASiX développée par CASES a été présentée et délivré à plusieurs partenaires. Ceux-ci vont l’utiliser pour la communication avec leur communauté et pour la communication avec le nœud national CASES. CASES a lancé une étude d’analyse des risques basée sur la méthode française EBIOS dans le Ministère de l’Économie et du Commerce extérieur, et ce en vue de formaliser une politique de sécurité pour le Ministère.

Lancement officiel de cases 04.02.2005

Première Hack.lu dans la chambre des métiers

Conférence sécurité pour PME dans la chambre des métiers

Début des formations MySecureIt

2005.03.23 Signature du premier contrat de collaboration avec la Suisse – MELANI

2006: Gust MEES

In February 23, 2006 Gust MEES was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it (in French) below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

2006

Le projet CASES a été reconnu comme good practice dans le domaine de «awareness raising » par L’ENISA (European Network and Information Security Agency). Lors d’une conférence tenue à Bruxelles le 4 octobre 2006, le Luxembourg a été demandé de présenter ce projet devant les représentants des autres pays membres de l’Union européenne. CASES a été spécialement félicité pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents ainsi que pour son travail effectué sur l’analyse des routeurs WiFi vendus par les ISP luxembourgeois.

Le Ministère de l’Économie et du Commerce extérieur a signé pour le compte du projet CASES une entente de collaboration avec le Centre de recherche informatique de Montréal dans le domaine de la sensibilisation des PME aux risques informatiques.

Les relations avec la Direction Centrale de Sécurité des Systèmes d’Information en France ont été intensifiées en vue de pouvoir conclure une entente de collaboration en 2007.

Le Ministère de l’Économie et du Commerce extérieur a, dans un effort commun avec le Ministère de l’Éducation nationale et de la Formation professionnelle, continué sa campagne de sensibilisation pour les enfants des classes de septième des lycées au Luxembourg. CASES a élaboré le contenu de la formation qui a déjà été distribué à une trentaine de classes.

2007-LUSI:

.

2007

Présentations et participation aux conférences

  • Au cours de l’année 2007, l’équipe de CASES a fait plus de quarante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le « Internet Security Day » , et à l’étranger, respectivement sous forme de missions de sensibilisation, principalement dans es écoles primaires et secondaires luxembourgeoises.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale HACK.lu. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants. À cause des attaques de type phishing, CASES a organisé un workshop tenu par l’organisation hautement renommée AntiPhishingWorkingGroup.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministèrede l’Économie et du Commerce extérieur, du Centre Informatique de l’État, de la Représentation Permanente du Luxembourg à Bruxelles ainsi que de l’ADEM. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a organisé un stand à la Belle Étoile pour le Safer Internet Day, une initiative de la Commission européenne. Pendant toute une semaine, des adultes et des enfants ont pu s’informer sur les risques d’Internet et passer des tests de connaissance. La commissaire Viviane Reding a été accueillie et plusieurs classes d’école sont venues faire leur permis web.

  • Une campagne contre le cyberbullying (harcèlement via les nouvelles technologies de l’information et de la communication) a été lancée en forme de projet pilote dans un lycée du Luxembourg. CASES a réussi à motiver tous les opérateurs de téléphones mobiles, le ministère de l’Éducation nationale, la Police grand-ducale, le Parquet, l’Université de Luxembourg ainsi que le projet www.lusi.lu à s’investir dans le projet et à trouver une réponse à ce nouveau fléau.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations expliquant comment faire du commerce électronique sécurisé. Grâce aux ordinateurs de l’Internet Stuff” enfants et adultes ont pu passer des tests de connaissance ou consulter le site de CASES pour trouver des conseils pratiques. CASES a aussi invité sur son stand l’ABBL ainsi que le projet Luxembourg Safer Internet (www.lusi.lu).

Le site Internet www.cases.lu

  • De nouveaux contenus (6 grands dossiers et de nombreuses recommandations) ont été publiés sur le site de CASES. Plus de quatre-vingt alertes ont été mises sur le site pour avertir les internautes de vulnérabilités critiques ou importantes. La version allemande du site a également été lancée en 2007. CASES est aujourd’hui un des portails publics les plus visités au Luxembourg.

  • Deux permis web ont été conçus et mis en ligne. Le premier http://pwws.cases.lu est destiné aux enfants et vérifie leur savoir-faire dans plusieurs domaines du cyber-mode. Après avoir passé le test avec succès, les enfants peuvent imprimer un certificat. Pour les adultes, un permis vérifiant les bons reflexes nécessaires pour faire du commerce électronique en toute sécurité a été publié sous l’adresse http://epass.cases.lu.

  • -Des conseils spécifiques pour le commerce électronique sécurisé ont été publiés sur le site de CASES. Un “flyer”commerce électronique a été rédigé et sera mis à disposition dans les guichets de banques dès début 2008.

Les collaborations de CASES

  • CASES, ensemble avec le CERT luxembourgeois, a aidé plusieurs banques de la place ainsi que l’ABBL à réagir de façon coordonnée contre les nombreuses attaques de type Phishing qui ont eu lieu entre fin juillet et fin août 2007. PREMIERES attaques de type physhing.au Luxembourg.

Un projet pilote qui a pour but d’établir de bonnes pratiques sécuritaires au cœur des maisons de jeunesse a été lancé en collaboration avec le Service National de la Jeunesse et le ministèrede la Famille. Le but est de sécuriser le réseau informatique des maisons de jeunesse et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour adolescents.

  • CASES a contribué à l’élaboration d’un guide de bonnes pratiques pour la mise en place de réseaux sans fil dans des locaux publics. Le but de ce guide est de sécuriser le réseau sans fil et d’élaborer une politique de sécurité ainsi qu’un code de bonne conduite pour les clients. WiFi sécurisé

  • CASES a entamé une coopération avec le nouveau service de la DCSSI française en matière de sensibilisation du grand public.

  • CASES a été élu parmi les projets phares du domaine de la sensibilisation en Europe et a été invité pour la troisième fois de suite par l’European Network and Information Security Agency (ENISA) à faire une présentation sur le fonctionnement du projet.

  • CASES a, au cours des dernières années, su acquérir plusieurs partenariats avec des organisations étatiques étrangères ayant les mêmes missions de sensibilisation.

Projet CIP – Critical Infrastructure Protection La Direction du Commerce extérieur et de la Sécurité informatique a lancé, ensemble avec la Direction de l’énergie, un nouveau projet dans le domaine de la protection des infrastructures critiques dans le secteur de l’énergie. Des propositions, en vue de l’harmonisation de la terminologie pour l’analyse de risque et pour la gestion de crises, ont été élaborées. Des principes d’établissement du glossaire contenant les définitions et abréviations utilisées à travers tous les documents du projet ont été définis et un glossaire a été rédigé. Un schéma de classification selon trois dimensions (confidentialité, intégrité, disponibilité) avec plusieurs classes par dimension et règles de sécurité a été conçu et publié sur le site de CASES. Ce schéma servira de base pour un schéma de classification interne aux organisations. Il est destiné en premier lieu à créer un cadre pour l’échange d’informations entre le ministère de l’Economie et du Commerce extérieur et les opérateurs CIP. Finalement une cartographie des menaces a été rédigée.

Projet de mise en place d’un CSIRT gouvernemental

La Direction du Commerce électronique et de la Sécurité informatique, en collaboration avec d’autres acteurs gouvernementaux majeurs du domaine de la sécurité de l’information (CIE, CCG,..), est le chef de file dans le projet de mise en place d’un CSIRT national (CSIRT pour “Computer Security Incident Response Team”). Ce nouveau centre de gestion des incidents de sécurité informatique fournira les services suivants aux entités gouvernementales:

  • gestion et réponse sur incidents,

  • veille technologique,

  • bulletins d’alertes et d’avertissements,

  • point de contact et de coordination national pour toutes questions du domaine de la sécurité de l’information.

Dans le cadre du projet CSIRT, la Direction du Commerce électronique et de la Sécurité informatique a participé aux réunions du TF-CSIRT (http://www.terena.org/activities/tf-csirt/), du FIRST (http://www.first.org), ainsi que d’autres fora internationaux, lui permettant de développer des partenariats importants pour la suite du projet.Démontrant sa forte implication dans le domaine CSIRT, le ministère a co-organisé et hébergé la formation TRANSITS (formation spécialisé CSIRT, effectué par TF-CSIRT, et unique dans sons genre) au Luxembourg.

Projet Politique de Sécurité

La Direction du Commerce extérieur et de la Sécurité informatique a commencé à rédiger une politique de sécurité basée sur les standards de la famille ISO/IEC 27000, standards internationalement reconnus dans le domaine de la sécurité des systèmes d’information. Une vingtaine de politiques ont été rédigées, les procédures y référant sont rédigées au cours de l’année 2008. Ce projet vise premièrement à réaliser une politique de sécurité pour le ministère de l’Économie et du Commerce extérieur et, deuxièmement, à donner aux autres Ministères et administrations intéressées un guide de mise en place.

2008.

2008: LISA Stopline started 2008

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2008: Gust MEES published FREE courses about Cyber Security on Google Knol; Google Knol discontinued its services on MAY 1st 2012; NO trace anymore :(((

Knol-Author-of-the-week

Through the way-back-machine web.archive.org I found back some stuff:

2008

Au cours de l’année 2008, l’équipe de CASES a fait plus que cinquante présentations dans le cadre de ses missions décrites dans le Plan Directeur National de la Sécurité des Systèmes et Réseaux d’Information. Ces présentations ont été tenues lors de conférences en matière de sécurité de l’information au Luxembourg, comme notamment le “Internet Security Day 2.0” ou encore les Midis de l’Europe, et à l’étranger, respectivement sous forme de missions de sen sibilisation, principalement dans des ministères et administrations luxembourgeoises.

  • CASES a su réaliser l’exploit de former dans l’année scolaire 2007-2008, les enfants des lycées classiques et techniques fréquentant les classes de 7 ème au Luxembourg. Dans plus de cent-vingt classes primaires, des actions de sensibilisation similaires ont été réalisées. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet.CASES a aussi réalisé une dizaine de soirées d’informations pour parents d’élèves.CASES sensibilise aussi aux risques d’arnaques sur Internet.

  • CASES a participé au salon de l’éducation organisé par la Ville de Luxembourg et à la journée “Summer –Spill a Spass” organisée par la Ville de Dudelange, aux ateliers pédagogiques du Lycée Marie Consolatrice à Esch/Alzette. CASES est intervenu lors des journées pédagogiques de la Banque de Luxembourg et a participé à la “e-City roadshow” organisée par la Ville de Luxembourg. CASES a activement participé au “LuSI day” tenu au Forum Geesekneppchen, au “SIGI-day” à Contern et aux “Journées du livre” à Bascharage.

  • Enfin, CASES a contribué à l’organisation de la deuxième édition de la conférence internationale “HACK.lu”. Cette conférence a de nouveau su rassembler de très nombreux professionnels du domaine de la sécurité informatique. La conférence a connu un très grand succès, tant dans la presse spécialisée que parmi les participants.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employés ont été lancées au sein du ministère de la Fonction Publique et de la Réforme administrative, Trésorerie de l’État, Centre de Logopédie, du Cadastre et de Cercle asbl. Lors de ces campagnes, les agents ont été sensibilisés dans des séminaires liés aux risques à la société de l’information.

  • CASES a su réaliser un partenariat avec “Le Luxemburger Wort”. CASES a publié chaque semaine un article de sensibilisation dans ce journal de très grande couverture. Ainsi plus de quarante articles de presse ont été publiés.- Dans le cadre de la coopération avec le “Luxemburger Wort”,

  • un test de “Wardriving” a été réalisé dans la Ville de Luxembourg. Ce test a démontré que la sécurité dans le domaine des réseaux sans fil est déplorable.

  • – CASES a contribué à une dizaine d’émissions radio sur 100,7.

  • CASES a accueilli plus de quatre mille personnes intéressées à son stand à la foire d’automne. Les visiteurs ont reçu des brochures sur la sécurité et ont pu assister à des présentations sur des attaques via “Chevaux de Troie”. Un espace de jeu pour enfants avec un quiz sécurité a été proposé avec un très grand succès. Lors de la foire d’automne, une campagne de sensibilisation aux risques liés à “Bluetooth” a été réalisée.

  • Une enquête sur les performances du social engineering a été réalisée en partenariat avec l’Université de Luxembourg. Lors de cette enquête, il a été essayé d’inciter les personnes questionnées à donner leur mot de passe. Plus de 1000 personnes ont été questionnées. Un rapport détaillé a été publié sur le site de CASES.

  • – CASES a lancé le label “suivant les réflexes CASES”. Une première déclinaison de ce label a été réalisée avec le label “WiFi sécurisé” qui a été attribué, après audit, à 3 sociétés sur 6 sites

Projet Politique de Sécurité

  • CASES a, ensemble avec le ministère de la Famille et le SNJ, réalisé un projet d„envergure pour mettre en sécurité les Maisons de Jeunes. Une politique de sécurité ainsi que des guides de bonnes pratiques ont été réalisés.

  • En collaboration avec le ministère de l’Éducation, un projet pour la mise en sécurité des Écoles primaires a été entamé. Deux projets pilotes ont été entamés.

  • Un projet de mise en place d’une politique de sécurité a été lancé en 2008 au sein d’une administration gouvernementale

 

2009

CASES a su réaliser l’exploit de former dans l’année scolaire 2008-2009, tous les enfants des lycées classiques et techniques fréquentant les classes de 7èmeau Luxembourg. Beaucoup de classes primaires ont été formées, et ce à partir de l’âge de 9 ans. En tout CASES a sensibilisé les enfants de plus de 300 classes. Ainsi le Luxembourg est le premier pays en Europe qui a su réaliser un tel exploit. Plus que sept mille enfants et adolescents ont été sensibilisés en 2008. Un rapport sur l’état actuel a été publié sur Internet. CASES a aussi réalisé une vingtaine de soirées d’informations pour parents d’élèves.

CASES a participé au «Kannerstaat» de la ville de Junglinster.

CASES a publié un support scolaire, destiné aux instituteurs et aux parents. Ce livre vise à fournir les informations nécessaires pour pouvoir éduquer les enfants dans différents domaines liés à la sécurité de l’information. LEITFADEN

Collaboration avec le DNR

NACKT im NETZ

2010

  • Campagne brosses à dents
  • Création de smile GIE

 

2010: BEESECURE

Le ministre de l’économie Jeannot Krecké a présenté le 8 novembre 2010 BEE SECURE, un projet commun du Ministère de l’Economie et du Commerce extérieur, du Ministère de la Famille et de l’Intégration et du Ministère de l’Education et de la Formation Professionnelle.

5 Jahre sind im Internetzeitalter ganz schön lange und für BEE SECURE auf jeden Fall Grund genug, Partner und Unterstützer zusammenzurufen und gemeinsam einen Blick in die Vergangenheit zu werfen.

So versammelten sich am 9. Oktober rund 100 geladene Gäste im Forum Geesseknäppchen, wo allerhand „Requisiten“ der letzten fünf Jahre ausgestellt waren. Im Fokus standen die Sensibilisierungskampagnen, die seit 2010 BEE SECURE zur wichtigsten Anlaufstelle im Land machen, wenn es um die sichere Benutzung von Computer und Co geht.

Annual Reports BEESECURE – Starting 2010

 

2011

Analyse des risques

2012

Stopline

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2012

My.cases.lu

 

May 2012: Gust MEES published FREE Cyber Security courses about Cyber Security on WordPress https://gustmees.wordpress.com

 

2013-2014: Cyber-Security on Social Media twitter, Gust MEES introduces the hashtag <===> #FSCD <===> “Friday Security Check Day”, where users get reminded about Security by posting different blog posts and articles.

2013

higher-education-tech-blogs-2013-Doug PETERSON.

Gust MEES got interviewed about Cyber Security through Social Media twitter by Doug PETERSON who is ALSO featured At EdTech: we strive to create the most valuable resources for higher education technology professionals. One of the ways we do that is by highlighting the smartest and most innovative education tech bloggers on the web.

.


More to come here, lots of research necessary… Meanwhile follow the following articles (curation) and links:


2017: 

Cybersecurity week in October:

 

.


2016: WHAT is done in the country!? WHICH actors are helping to boost Cyber-Security!?

There are more and more companies and organisations offering courses about Cyber Security, such as:

 


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure). L’auteur était aussi gagnant d’un concours en électronique en 1979 ( Pays germaniques ) et voyait son projet publié dans le magazine électronique “ELO”.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author was also a winner of an electronics contest (Germanic countries) in 1979 and got his project published in the “Electronics Magazine ELO”).

.

Stay tuned for next blog post(s) 😉..

.

 

.

Keywords for me to create this blog post: CLUSSIL, Mysecureit, CASES, LUSI, STOPLINE, Kannertelefon, BEESECURE, CIRCL, Security made in Luxembourg, SMILE, hoffilux, Gust MEES, Internet Monitor, LUSI, LISA-Stopline, Interview,

.

 

 

 
Leave a comment

Posted by on November 22, 2017 in 21st Century Skills, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, Encryption, EQ, eSkills, Ethical Mind, ethics, Europe, European Cyber Security Month, History, History of the web, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning about Social Medias, Learning basics of Cyber-Security-Practice, Luxembourg, Luxembourg and CyberSecurity, Mobile Botnet, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Phishing, Potentially Unwanted Programs, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, PUPs, Quality Courses, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2014, SID2015, SID2016, SID2017, Skills, Skype insecurity, Smart TV's, Social Engineering, Social Media, Spam, Synthesizing Mind, Teacherpreneurs, Third Party Applications, TOR-Anonymat, TU-DRESDEN

 

Tags: , , , , , , , , , , ,

PracTICE: Learning To Learn-Digital CitizenShip

PracTICE: Learning To Learn-Digital CitizenShip

.

Evolution of Education: Wordle Logo

.


.

SID15_Banner_anim

.

Authentic PracTICE Through Global Collaboration

GUST-AVRIL2014-800px-2[GM] The authors of this blog post “@ICTPHMS (Dan KIRSCH‘s Blog)” and “@knolinfos (Gust MEES‘s Blog)” have met each other on Social MediaTwitter” and decided one day to work together on a common blog about “Digital CitizenShip“, a “Global Collaboration” from authors of the USA and Luxembourg (Europe) was born. Find below, please, OUR collaboration blog:

.

[GM]: below, part of the discussed on twitter

Added on 07/01/2015:

Lots of stuff I learned

Ideas:  using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style whereTHEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.

I created these comics with dialogues with the following online program:

If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:

.

The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <===

.


WHY do WE use a bunch of different so-called tools to LEARN about Digital Citizenship?

Please check the below picture, who explains 😉

.

Synthesizing Mind-5 Minds for the future

.

I will let “Dan KIRSCH” explain to YOU in detail about WHAT WE were working together

.

[DK] Dan KIRSCH‘s insight

Dan KIRSCHI have utilized the collaboration with Gust via twitter on the topic of Digital Citizenship within my 8th grade ICT classes. Currently, I am teaching 3 classes with approximately 30 students in each. One of our curriculum standards is to teach Digital Citizenship/Internet Safety. I began to investigate different ways of teaching this to my 8th graders where it could be authentic and actually “practice what is being taught“. Through collaboration with Gust and other social media colleagues on twitter I began to utilize blogging (Edublogs) as a platform to teach Digital Citizenship.

Each student has their own blog, which is contained under my class blog. In this platform, we treat our blogs as our “social network” where students comment on blog prompts given by me or themselves containing information on Digital Citizenship, real-life scenarios, and social media. It is also used to teach other “edtechskills; such as inserting media, using embed code, and RSS Feeds. This is the fourth year I have used edublogs and I enjoy reading what my students produce; especially the reflections and connections they make with one another.

It’s amazing to see how students communicate via the technology “more” than they would face to face; especially on how to become a positive Digital Citizen! Recently, I have begun to archive their posts on to storify (with no last names) to use for future classes you can access this via my edublog: http://mrkirsch.edublogs.org


Post: 20/03/15

The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.


New Post: 04/03/15

Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).

The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.


Post: 18/02/15

.

Understanding what your digital footprint says about you. The following blog post (prompt) ==> check link here <== was given to my 8th grade students as a more interpersonal digital citizenship reflection. The previous posts have been more focused on the “broad” perspective of Digital Citizenship and what it is ==> what it means. <== The objective was for students to take an interpersonal “look” at themselves and reflect on the ==>HOW TO<== become & maintain a positive digital footprint as they progress through their high school years,  and into college. My goal as their ICT instructor is to make students  realize that once they enter college and are “away” from parents/guardians peer pressure can and often times does involve them in negative way. The point is ==> teaching students to be aware of this now they will be able to think twice before they “make the choice” to share/post negative material on the internet/social media, which in return could damage their “digital footprints.”


Post: 06/02/15

capture

Student example as seen on mrkirsch.edublogs.org of Digital Citizenship.

Teaching Digital Citizenship Through Comics

Objective:
The objective of the post is for students to learn about Digital Citizenship through stories.

Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students created comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.

The following link is a curate blog reflections from my students on Digital Citizenship/Internet Safety. This was a “lead-up” activity to the comic strips seen above. The curation tool I utilized for this is Storify.


Teaching with Content Curation (added February, 3, 2015)

Content curation is the “…process of collecting, organizing and displaying information relevant to a particular topic. Teacher content curation can be used by students and students can be asked to show expertise with examples of curation.” In my 8th grade ICT class we will be completing webquests on content curation as a teach method of introducing students to “Content Curation.” The following text reviews what content curation is and it’s purpose, along with several content curation platforms, what a webquest is, and followed by a lesson plan I will use in my classes. 


Storify:

  • create stories or timelines using social media such as Twitter, Facebook and Instagram.

Flipboard: 

  • Flipboard.
  • .
  • Flipboard is your personal magazine.
  • It’s a single place to discover, collect and share the news you care about.
  • Add your favorite social networks, publications and blogs to stay connected with topics and people closest to you.
  • .

.

Scoop.it!

  • Build engaged audiences through publishing by curation.
  • Think of it as a way to build content.
  • You can bookmark and share your sources.
  • Can be used to increase your authority on a topic. 

Paper.li

  • Automatically find, publish & promote engaging articles, photos and videos from across the web
  • Display Content Marketing Information.
    Capture

Introduction into Content Curation

What is Content Curation?

Content curation is the “…process of sorting through the vast amounts of content on the web and presenting it in a meaningful and organized way around a specific theme.  The work  involves  sifting, sorting, arranging, and publishing information.”  A content curator picks the best content that is “…important and relevant to share with their community (in the case our class community). It isn’t unlike what a museum curator does to produce an exhibition:   They identify the theme, they provide the context, they decide which paintings to hang on the wall, how they should be annotated, and how they should be displayed for the public.”

Content curation is not about collecting links or being an information pack rat, it is more about “…putting them into a context with organization, annotation, and presentation. Content curators provide a customized selection of the best and most relevant resources on a very specific topic or theme” (in this case ours will be on Digital Citizenship, ICT, and Educational Technology). A content curator “…continually seeks,  makes sense of,  and shares the best and most relevant content on a particular topic online.”

Why is Content Curation Valuable?

Individuals and organizations are making, sharing media, and content all over the social web.   For example, on Facebook the average user creates 90 pieces of content each month.  If you “…multiply that by the 800 million Facebook users,  it isn’t surprising that  data or content on the Internet is  measured in billions of gigabytes.” Essentially, we are living an era of content overload!!! A content curator offers high value to anyone looking for quality content because finding that information (and making sense of it) requires more and more time, attention, and focus.

For individuals and organizations, content curation can help establish their “thought” leadership and capture attention in today’s information “overloaded” world.    Content curation can “…help your organization become the go-to authority on an issue or topic area.”   It can be done as simply as writing a blog post (this is excatly what we will be doing with our edublogs in my classes) with links or sharing annotated links on Twitter around your topic.

capture

.

Getting Started

This questionnaire (citation on pic) can help you think through a plan for content curation before you dive into the curation tools.  There has been an explosion of tools and you can distracted by useless features.    Even better, “… perhaps focus on the skills with the tools you know how to use already.”   You might want to integrate the process of content curation into a channel you’re already using (in my class students will be including this within a category on their blogs).

Citation:
Kanter, B. (n.d.). Beth’s Blog. Retrieved January 14, 2015, from http://www.bethkanter.org/


[DK] Please check the link ==> Content Curation Lesson Plan  to access my recently created content curation lesson plan for my 8th grade students.  This lesson plan is posted for colleagues in my PKM to access. 

[DK] Great twitter chat archive on Digital Citizenship via @mrkempnz & @BevLadd (7/5/2015) curated on storify.

[GM] Through curation one can build up ALSO its own “Personal [Professional] Knowledge Management” (PKM), please check below:

Through curation and using Twitter one builds up ALSO a “PLN” (Personal Learning Network), please check below:

.


 Creating a Webquest

programmerman-animatedWebquests are useful teaching tools for educators. An imaginative webquest can capture the attention of a student as he or she learns about any number of topics. For instance, I have chosen to use my classes edublogs as our webquest platform where we can incorporate curated content on Digital Citizenship.

A teacher who wants to bring his or her own webquest ideas to life must make a detailed plan. Some teachers begin by choosing a web quest template. There are online resources available that outline the specific elements of a webquest. For example, a webquest has an introduction that explains its purpose to students. A webquest also includes a task that lets students know what they are expected to do. Next, the process sets out a path for students to follow that leads them to relevant information. Those are just a few of the steps that a teacher needs to fulfill in order to make an effective webquest.

==> Mr. Kirsch’s Sample Content Curation Webquest <==


Teaching with Content Curation Lesson Plan

  • Focus Question: Do students know where to get quality information from the Internet?
  • Additional Questions: 1. What resources do teachers need to find quality information on the Internet (i.e., content curation)?
  • 2. How should the Internet be used in the classroom?

Lesson Goals/Objectives: To get students to think how to best use the Internet in their classroom.

Activity Description:

  • Spend time discussing the basics of Internet searches (e.g., have students with more experience help others). See Evaluating Websites from the University of California Berkley in Resources. Talk about Search engines and other ways to find information (2nd and 3rd tier investigation).
  • Create a webquest (using our edublogs) and have students write about what sites they come up with using our “curated content.”
  • Have the students support why their “curated content” was appropriate for this lesson within their blog posts.
  • Students will then be assigned a topic (social media, educational technology, digital citizenship, and/or online security) to begin their curated content. Once content as been established and shared via WordPress or social media the students will then blog (webquest) about their thoughts on curated content.

In The 21st Century, The Word TEACHing Gets Replaced By LEARNING TO LEARN, How To

.

Maslow-Use-Of-Technology-2015

Click the above image, please, to access the article.


How To Design A Course About Digital CitizenShip?

Please check below, on How-To YOU could create YOUR own course, based on PracTICE AND student centered:

.

METRO-DigitalCitizenShip-Gust MEES-2015

.

.


 THE Whole FREE Course On ONLY One Interactive Image

Click the image below, please and you will get directed to the “interactive image“. You need to move then your cursor above the image and you will see black “spots“. Click them, you will get directed to FREE courses on each “station” 😉

.

ScreenHunter_07 Feb. 09 00.15

.

.


Using A Flowchart To Design The Course

Check below, please, to find out the how-to.

.

FlowChart-Final-Version

Click the above image, please, to display it larger.

.


THE Whole FREE Course Using FlowCharts On ONLY One Interactive Image

Click the image below, please and you will get directed to the “interactive image“. You need to move then your cursor above the image and you will see black “spots“. Click them, you will get directed to FREE courses on each “station” 😉

.

FlowChart-Final-Version-ThingLink-Version

.

.


 Related links

.

Sci-Tech Today

↑ Grab this Headline Animator

.

book-question-markPlease find below related links to the discussed above, such as:

How to Use Storify:

Luckily, it’s easy.

storify by @ICTPHMS.

  1. First, create an account at Storify (you can log in with Twitter or Facebook).
  2. Click the blue “Create a Story” button in the top right hand corner.
  3. Look at the right side of the new screen where the icons of your favorite social media websites reside.
  4. Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
  5. Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.

Want an Example?

Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.

.

Keywords necessary to create this blog post: @ICTPHMS, @Knolinfos, collaboration, Global Collaboration, Education, Global Education, TRUST, #digcit, Digital CitizenShip, digital citizen, Cyber-Security, Internet-Safety, Best Practices, Learning To Learn, Learning By Doing, Student centered, Coaching, #EdTech #tools, #esafety, #blogging, ICT, #edblogs, authentic practice.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge to be on my school districts ICT curriculum committee. We are rewriting and updating our ICT curriclulum in grades 6-8 for the 2015-2016 school year.

.

You can find me also on:

.
.
Stay tuned for next blog posts 😉
.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2015: Safer Internet Day 2015-Participation

SID2015: Safer Internet Day 2015-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2015 – Save the date!

.

 

.SID15_Banner_anim

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2015 will be celebrated on Tuesday 10 February 2015, with the strapline, once again, of ===> “Let’s create a better internet together” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2015 starts to take shape.

.

SID2015-Poster

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2015

programmerman-animatedWHAT is special this year with my participation on SID2015

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2015 in Luxembourg/Europe.

.

SID2015-BEESECURE

 

Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2015 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2015 AND #Up2Us to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
4 Comments

Posted by on January 6, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Collaboration, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Engagement, Europe, Facebook, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Smart TV's, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Tracing, Tutorials, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

.

screenhunter_03-aug-05-15-24 (1)

.


.

SID15_Banner_anim

.

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | How To?

.

« Good habits formed at youth make all the difference. » Aristotle

.

WE are participating ALSO on “Safer Internet Day 2015“, called #SID2015.

.

SID2015-BEESECURE

Click the above image, please, to access the organization to know more about it (in English).

.

This blog post is a ===> #GlobalCollaboration #blog <=== from & &  for  about .

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter  <===. Here WE go, check the infographic below, please.

.

Digital-Citizenship-infographic-620x965

[GM] Please check my blog posts below, who explain in detail:

When YOU read the above mentioned blog posts, YOU will realize that I mostly use the possibility to include the students, learners in the process of learning (student centered); THEY will go for “Learning by Doing” by working in a team and so taking THEIR OWN responsibility. THEY will be guided by a coach who helps THEM for “Learning To Learn” by asking them questions when (s)he is seeing that the token direction is going the wrong way with its ===> Proactive Thinking <===. As the internet doesn’t forget anything, a ===> Proactive Thinking <=== is a MUST! THE word ===> FAILURE <=== is on the wrong place here, sorry! YOU also will NOT see me using the word ===> FAILURE <=== as it is NOT a positive word, BETTER is ===> Learning by Doing <===, check below, please, the reason for WHY:

.

NOT FAILURE-positive words

 Click the above image, please, to access the article.

.

[GM] Possible questions could be: “Are YOU sure that it is the right way?“, “Think twice, please, isn’t there something missing?“… Well, I let YOU do some work ALSO, think on it what else could get used as questions and post them below please, with YOUR initials, thanks.

[MK] Mindy KIM (USA)

[MK] What changes could be made to improve the overall message?

[MK] You made a strong point here, where else could you apply the same idea?

[MK] Who is your audience?

[MK] Could you say the same thing using less words? Would your message be understood?

[DK] Great archived twitter chat on Digital Citizenship (07/05/2015) via @mrkempnz & @BevLadd curated on storify. 

[DK] The Challenges of raising a Digital Native ==> via Devorah Heitner 

[DK] Teaching Digital Citizenship 

.

[ICTPHMS] Patrick Henry Middle School ICT (USA)

Greetings from Patrick Henry Middle School in Sioux Falls, SD. We are 6-8 middle school ICT class! We blog about Digital Citizenship & Internet Safety. Very excited to participate in the collaborative blog! Please look forward to new posts coming soon. You can find us on twitter @ICTPHMS as well.  

The following link  http://mrkirsch.edublogs.org/2013/02/27/internet-safety-post-1-pd-2 is an archived student contributions to our ICT blog. Topic was Internet Safety (8th graders). We are currently finished up our Digital Citizenship Unit.. more to come. Check the screenshot below, please.

.

ICTPHMS Digital CiticenShip Blogs

.

Student Centered Activity via @ICTPHMS. Creating #infographics on Internet Safety. Our class is going to be resubmitting their infographics during our Digital Citizenship Unit. They will have resources provided. The post will come Friday!


Post: 04/28/2015 

The following is a link to my 7th grade student’s Video projects. The objective for the students was for them to create a video describing how “Technology Has Impacted their Lives” in either a positive or negative manner. The students were put in groups in order for them to film and describe their content. I really wanted the students to focus on how technology has become an integral part of everyday life; however can this become bad?? In essence, I wanted students to focus on the content people put on the internet and/or share information they should ==> Privacy. These videos were created by 7th grade students. The following videos depicting students do have permission from parents/guardians to be shown on the blog.


Post: 20/03/15

The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.


Post: 04/03/15

Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).

The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.


Post: 02/06/2015 (Updated) 

Learning about Digital Citizenship through comic strip creations. See an example below, please.

.Pixton-CyberBullying-Example

.

Objective:
The objective of the post is for students to learn about Digital Citizenship through stories.

Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students are creating comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.

The link below is a storify showcasing my students reflections on Digital Citizenship. This was a “lead-up” activity to the comic strips (above).


Post: 16/01/2015

Sample of my 8th grade Blog Prompt for next week. Check Below.. 

Who owns information?

Objective:

After discussion, students will understand basic concepts of intellectual property such as copyright and plagiarism.  Students will understand the purpose of Creative Commons as well as how to find a Creative Commons license for an image on the Internet.

Rationale:

In order to be ethical users of online information, students must understand that they have responsibilities to owners of information and creative works online.  They must understand the basics of those rights and strategies to find out how to properly and ethically use what they find online.

Focus question:

When you buy a song, is it really yours to use how you want?  Are all images online available to use however you want?

Should creators of information, images, songs etc. be paid for their work?

Something to think about was you blog about your reflections of information security and digital citizenship:

Should everything online be available to use for free?  What responsibilities do we have to the creators of information?

Addition from [GM]: some resources about copyright and Creative Commons


Post: 13/01/2015: Teaching Digital Citizenship using Digital Storytelling (comics). 

This semester I wanted to teach Digital Citizenship in a different way with my middle schools students besides just “discussing” the positives & negatives via our blogs. Essentially, I wanted to incorporate our blogs as well as some educational technology platform. After collaboration with Gust M. via twitter I have decided to have my students (8th graders) blog about Digital Citizenship while creating comics (digital storytelling). The platform (many out there) I have decided to use is chogger.com. The following instructions are what I will be giving my students (thought I would share). Thank Gust for the collaboration. 🙂 

  • Students will learn digital literacy and citizenship through combining comics and digital storytelling. In the first 1-2 weeks of the unit, students will research news stories about technology, internet safety, social media, and explore characteristics of comics, while learning about digital storytelling.
  • In weeks 3-4 students will design their digital stories via chogger, determine their characters. Who is the protagonist and antagonist of their story and what their main idea (origin of story) will be. The students will be instructed that their main idea has to incorporate an aspect of Digital Citizenship; such as social media safety, cyberbullying, identity theft, and scams etc.
  • Once each student as finished their digital story they will post this on the blogs where the class as access to them and we can learn about Digital Citizenship in a fun and collaborative atmosphere.  Once the project is completed examples will be provided.

Post: 16/12/2014: Final Digital Citizenship Mr. Kirsch’s Blog Post (student reflections) Prompt below:

“Taking into account all of the articles & scenarios we have discussed within class this semester in ICT III what factor of Digital Citizenship are you going to take with you (think about social media, and future jobs)?

How can you be sure that you will not fall into the “trap” of posting information on the Internet/Social Media that may or may not hurt you in the future??”


Post: 10/12/2014: Teaching Digital Citizenship through Scenarios (Blog Posts). 

Once I decided I was going to teach Digital Citizenship to my 6-8 middle school students it’s was brought to my attention of producing student reflections & insights through creating blog posts on teacher given scenarios. This is a great methodology that allows teachers to see students reflections, insights, as well as allowing students to collaborate with one another. 


Post: 1/12/2014:  How to Use Storify

What is Storify?

Storify is a visual way to tell social media stories using your Tweets, Facebook updates, pics, and other social media information.  Storify is overwhelmingly a neat way to show how a story develops over social media — without you having to take screenshots and insert your own links.

How to Use Storify:

Luckily, it’s easy.

storify by @ICTPHMS.

  1. First, create an account at Storify (you can log in with Twitter or Facebook).
  2. Click the blue “Create a Story” button in the top right hand corner.
  3. Look at the right side of the new screen where the icons of your favorite social media websites reside.
  4. Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
  5. Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.

Want an Example?

Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.


Post: 25/11/2014

Student reflections (8th graders) in Mr. Kirsch’s ICT class on their Social Media Profiles verse their “hard copy” resume. Our class discussed how employers are looking at individuals Social Media profiles (first) before their actual resume. Teaching students to be aware of their online presence aka “Digital Footprints.”  The link is provided below: 


Post: 18/11/2014

Our 8th grade (12-13 years old) ICT students just finished posting their reflections via #blogging on our topic: Social Media: Good or Bad? The objective is teaching students to be aware of what they share on Social Media, but at the same time realizing the benefits of Social Media as well. Check the link below, please:


Post: 12/11/2014

The following link is directly from my class blog: http://mrkirsch.edublogs.org/2014/04/17/ksfy-story-on-cybersecurity . The story conduct by the news-station come from one of my 8th grade ICT classes. Our focus was teaching students CyberSecurity. Please check it out! I do have the rights to the video if anyone would like a copy. 


[GM] Gust MEES (Luxembourg/Europe)

Added on 07/01/2015:

Lots of stuff I learned

Ideas:  using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style where THEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.

I created these comics with dialogues with the following online program:

If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:

.

The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <=== 😉

Added on 03/12/2014: 

Added on 27/11/2014: Privacy is ALSO IMPORTANT, please check below:


 In The 21st Century, The Word TEACHing Gets Replaced By LEARNING TO LEARN, How To

.

Maslow-Use-Of-Technology-2015

Click the above image, please, to access the article.

.


 Global Digital Citizenship Education (GCE)

UNESCO-Global-Digital-Citizenship-Education-2013

Click the above image, please, to access the article.

.

UNESCO-Global-Digital-Citizenship-Education-2013-2

Click the above image, please, to access the article.

.

Are there differences between Europe and the USA and the rest of the world?

sharing-icon.

Here below WHAT the EU is doing:

.

.

eSkills-EU-EPALE

Click the above image to access the article, please.

.

Here below a good approach from the USA:

Find below, please, WHAT skills the learners will need in the future. Thus as a reminder for getting NEW ideas 😉

.

5 Minds For The Future

.

By analyzing WHAT WE are doing through the “Coaching” and “Collaboration“, YOU will realize that WE could cover ALL the abilities and skills needed from the above mentioned. BTW: the above screenshot is from the book of “Howard GARDNER” ===> Five Minds For The Future <===, a book any teacher should read to understand what is needed for the future. It should be considered as required reading! YOU will understand then ALSO WHY interdisciplinary teaching and learning is a MUST to be on a modern way and to catch up as quick as possible with the growing NEW pedagogy and technical possibilities.

Learn more:

.


How Did This Blog Post Start?

Well, present authors are following each other since long through Social Media Twitter and through a tweet (Twitter Post) it happend, see screenshot below, please.

.

digcit-twitter-collaboration-1

digcit-twitter-collaboration-1

.

Through curation and by using Social Media Twitter the authors met virtually (NEVER met in real world) because THEY are in a common “PLN” (Personal [Professional] Learning Network) and appreciated each other through THEIR posts on Twitter, blogs, skills and competency. THEY found a common point ===> Digital Citizen Ship <=== and want to share THEIR competency with YOU dear readers, students and learners.

Learn more:


THE Authors, The Team

globe-pc[GM]

The authors [GM], [MK], [ICTPHMS]  will comment here THEIR experiences through the adventure of global collaboration which THEY experienced.

[GM] My advice (as I am used to it since ages ===> (2002-2003) <===:

Before starting such a BIG project, YES it is a BIG one as YOU are dealing withdifferent mentalities and cultures, is to set up rules up from the beginning to avoid BIG mistakes and not necessary stress for ALL.

This is called ===> Proactive THINKing <=== BETTER to use it as as YOU could come into situations without an issue when NOT doing it and WHO wants that!?

Concerning ===> Proactive THINKing <===: most people don’t know about WHAT it is, I will explain very shortly: deep thinking on what could happen in case of to avoid it up from the beginning. YOU could ALSO say: thinking of the “Worst case” who could happen and preparing to that it would NOT happen. OR, if YOU are smart, using Psychology for that it will happen (ONLY positive things…)! TIP: read ONLY the bold text to understand it quickly 😉

Check ALSO these links, please, who explain about “International Collaboration”:

The authors are from Europe (Luxembourg) and the USA, please check below:

.

The authors: actually on October 11th, 2014: Gust MEES (Administrator), Mindy KIM (Editor), ICTPHMS (Editor) will be represented by THEIR initials such as:

.

Here below is a little reminder on the How-To WE are using this blog post, please respect it, thank You.

.

Please click this link first before STARTING ===> Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media ===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media<=== where YOU will find the necessary information on ===> How To <=== work on OUR global collaboration blog, thanks to respect this.

.


Student Centered Initiatives

programmerman-animated[GM] Well, that’s WHY I was inviting  as THEY know the How-To by using curation and blogging with THEIR students. THEY will explain it to YOU here below 😉 My 8th grade ICT class blog about Internet Safety and Digital Citizenship with one another via edublogs. The goal is to teach the students how to communicate and share information on the Internet and/or Social Media! I post a blog topic for the week and my students have the rest of the week to respond with their thoughts as well as commenting on another’s blog posts as well. Trying to keep them from falling into the trap we see so much – people posting and sharing information they should NOT on the internet. 

[MK] My classroom is a unique blend of students. We focus mainly on helping students develop communication and the belief in their abilities. To do this we have a classroom blog where we showcase our accomplishments, what we are working on, and students come up with conversation topics for our class and parents. Students review the blog and give their opinions. I am there to help them navigate.

Learn more:

.

.Digital CitizenShip

.

Since then my class has taken time to build our writing skills, comprehension skills, and our ability to synthesize information. We are learning about shapes and where they are in nature and around them in everyday life. We will be reviewing these key ideas.

We begin lessons by learning important vocabulary and learning basic knowledge:

.

shapes-discussion-2.

.

.

This is what was added to the anchor chart after learning vocabulary, discussing characteristics of shapes, and looking for objects within the classroom that we use daily to connect to the 2D and 3D shapes. We talked about sides, corners, solid shapes, flat shapes, and started coming up with questions we wanted to answer throughout our shape study. Questions we have:

1). Why do circles have no sides?

2). How many squares make up a box?

.

.

.

.


WHAT Is Already Realized From The Authors For A GOOD Digital CitizenShip Learning?

[ICTPHMS]

TagxedoOnline is a great place to compete for scholarships and it is also a great place to be disqualified from them. Find out how you can unknowingly lose scholarships.

Two Sides of the Coin

The Internet is a great source for finding generous scholarships. Fastweb.com is a popular scholarship vault holding 1.3 million scholarships for students that qualify. It is free. Students register and complete an online interview and scholarship applications will begin arriving soon after that.

Colleges are known for giving the largest scholarships and frequently for all four years of college. And, local organizations give scholarships to students for college—usually for the freshman year only.

These scholarships can be easily lost if students post inappropriate profiles on various sites like

  • Twitter
  • Facebook
  • MySpace

Colleges’ admission counselors are beginning to investigate students considered for scholarships beyond the usual letter of recommendations. They are beginning to Google in student names and see what they have posted on the Internet.

Google Search to Screen Students

In increasing numbers, colleges are using a Google search to screen students. Some check students randomly, some check only if students have been brought to their attention, and others are actively researching students online.

Air-Tight Online Profile

How can students make sure they are squeaky clean online?

  • Do not post anything to your site that would be morally or ethically questionable.
  • Never post personal information such as your address, daily schedule, or phone number.
  • Make your profiles private so only a selected group can view your information.
  • Don’t add “friends” you don’t personally know.
  • Ask friends to remove any photos of you that could be seen as unflattering.
  • Make sure they never use your name when they add you to their site.

.

Our projects and curation: 


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

[GM] I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

.


WHY is Privacy so important?

[GM] Just think on George ORWELL… Phishing and Spear-Phishing To be updated by [GM]…

.

The Future Of Advertising (Cartoon)

Image credit ===>  http://tomfishburne.com/2014/01/internet-of-things.html <===

.

I don’t talk too much about it, BUT check the video below and YOU SHOULD understand

.

.

Related links:

.


Do WE Still Have Privacy Rights In The Digital World!?

1ibdy1vf6wghd-n05dgl-aigainformation1.

According to latest press releases: Based on internal NSA documents, “Der Spiegel” reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. 

Check:

Learn more:

[MK] Online perceptions, everyone can “learn” about who you are.

[MK] Future jobs, interactions, and networks are informed about you from your online “profile”.

[MK] Beware what you share, share what you would not mind the whole world knowing.

.

.

.

.

.


How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer.

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:

To be updated by [GM]… 

.

Cyber Security Month, NCSAM and Cybercrime, screenshot lost money, visual cybersecurity screenshot + link,

.

.

.

.


A NEVER Ending Story Which WE MUST Be Prepared For, But How!?

sharing-iconTechnology is evolving mostly much more quick as MOST persons can follow and learn about it, so… We will create a “FAQ’s” list, a “Frequently Asked Questions” list together, which I will ask YOU to elaborate below please, thanks in advance.

Team, YOUR collaboration is required, please propose YOUR questions:

.

  • [MK] Mindy KIM (Editor)
    • Q: How will this help my child in school?
      • A: Students gain many academic and social skills from using many methods of demonstrating what they know. In the blog students will be able to capture their ideas, comments, and pictures of what they learned. They will have the ability to reflect on their work and their peers. These are advanced skills they will use beyond the classroom.
    • Q: Can my child do this?
      • A: Yes. Your child will learn step by step. They will utilize help from me and their peers to understand how they can communicate their ideas, ask questions, and comment on what they are learning about. They will learn internet safety, how the internet can be used to learn, and how it applies to them.
    • Q: How can I access the blog?
      • A: I have the password and username set for each student. You log in using the four steps and your child will be able to show you as well. If you have any questions ask your child first and then bring the questions to me for further information.
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
  • [ICTPHMS]  (Editor)
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…

.

[GM] Together with [MK] I created such a FAQ’s list which YOU can check below, please, to get an idea:

.


How Will WE Handle This Blog Post To Stay Up-To-Date?

sharing-icon[GM] Well, that isn’t THAT difficult as most would think 😉 As the present authors here are ALL using ===> #Curation <===, they update already THEIR curation platform. SO… WHAT more easy then ONLY present below the links to THEIR curation which is permanently updated. Same for the blogs which the authors are maintaining… Check below, please:

.

.

Curation, authors blog posts, explaining curation, blogs


Author’s Portfolio, Curation And Blogs

sharing-icon

.

[GM] Please check below to find out about WHAT the authors realized already:

.

.

[GM] Please check below, please:

.

[MK] Please check below, please:

.

[ICTPHMS] Please check below, please:

.

.

..


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge of being a member of my school district’s ICT curriculum committee. We are rewriting & updating our ICT curriculum for students 6-8 for the 2015-2016 School Year.

.

You can find me also on:

.

Stay tuned for next blog post(s) 😉

.

 
22 Comments

Posted by on October 11, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Comics, Competency, Connected Educators, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Digital Citicenship, Digital CitizenShip, Education, Engagement, Europe, European Cyber Security Month, FAQ, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Social Engineering, Social Media, Spam, Storify, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,