RSS

Category Archives: Spam

Social-Media: Twitter and CO, do I STILL really need to have it as THEY JUST WANT MY information?!!! WHERE is SOCIAL?!!!

.

programmerman2

.


THEY JUST WANT MY information?!!! WHERE is SOCIAL?!!!

programmerman-animatedExcuse-me, please, BUT I am getting more than upset about WHAT is happening actually on Social-Media!!! Online since 1998 and having reached the internet maturity (more than 21 years online…), I have serious concerns about WHAT STILL is ===> social <=== with Social-Media!!! It is actually becoming ONLY and purely a platform(s) for collecting information about persons to collect the MAXIMUM of information to GET a MAXIMUM out for state spying and commercial use to track the users!!!

I DON’T go in further in here, YOU have a brain, use it and GO for #CriticalTHINKing and #ProactiveTHINKing, worth to do!!! It’s YOUR future with #ICT, do YOU really want THIS to happen???!!! ME NOT!!!

I am fed up with such behavior and I am backing UP Tim BERNERS-LEE, check below please:

Learn more:

You might be interested in having MORE information about Critical-Thinking AND Proactive-Thinking to make YOUR OWN “Thinking” and “Understanding“, please check below and read it 😉

AND as I was talking about Curation, WHAT is it? A reminder for the readers WHO don’t know yet:

 

UP to you NOW, to make YOUR grey cells working…

.

.

Key words necessary for me to create this blog post: Tim BERNERS-LEE, Trump, US, Privacy, AI, Big Data, Critical Thinking, Proactive Thinking

.

L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

 

 

 

Tags: ,

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

.

programmerman2

.


Let us talk about Hygiene…

Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN’T it?!! Well, there is a reason behind:

WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well…) WE need to take care of them! AND our body? The same: WE need to have the daily reflexes to make for sure that WE don’t expose it to invasions of bacteria, virus, etc. Examples given: brushing teeth, showers, washing the hands after a toilet go, washing the hands before and after a meal, etc. Wearing a Condom when having sex, a necessary protection! Well OUR condom for the technical devices is the Anti-Virus, a MUST for Any-devices!!! Any-Devices, Apple as well?!!! YES!!! Please check the WHY in my Curation below please:

WE are used to these reflexes, aren’t WE?! At least WE should be!! SO, for computers, Laptops, Smartphones, tablets (iPads etc.), IoT devices (Smart-Home), WE should do the same, they costs a LOT of money and expensive stuff should get taken care of!! THE OTHER reason as well is, THAT WE are using the internet with THEM and so WE are meeting OTHER people with OUR technical device (which ever one it is…).

SO, that exactly the same as WHEN WE are meeting (as persons) OTHER people in Real-World: WHEN WE have a flu, WE will infect OTHER persons with it and an epidemic will occur!! WHEN OUR technical devices (which ever one it is…), connected to the internet, are NOT Up-To-date with the latest Updates they are vulnerable to threats (see it as a virus, e.g.) and once infected, WE will infect ALL the OTHERS as well (epidemic…)!!

As WE use these #AnyDevices with #AnyOS on a daily base, WE SHOULD be aware and develop a sense of Responsibility to protect each other! 

ICT RESPONSIBILITYWell, the above written is ONLY an introduction, please read my Blog posts in different languages (EN, FR, DE):

My courses about Cyber-Security were mandatory in Luxembourg (Europe) EDUcation in 2004, learn more here please:

.


.

L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next blog post(s) 😉

.

.

.

 

 

 
Leave a comment

Posted by on September 10, 2019 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Apple Malware, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Connected Educators, Critical Thinking, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, DDoS, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital LĂ«tzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, European Cyber Security Month, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IoT, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Luxembourg and CyberSecurity, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Often Asked Questions, Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Quality Courses, Reality, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, SID2014, SID2015, SID2016, SID2017, SID2019, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, Tutorials, Twitter, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Luxembourg and Cyber-Security: HOW did it START?

Luxembourg and Cyber-Security: HOW did it START?

.

Evolution of Education: Wordle Logo

 

.


Luxembourg and Cyber-Security: HOW did it START?

HACKATHON LUXEMBOURG-2016.

Luxembourg, a tiny country with ONLY 590.667 inhabitants (January 2017) in the heart of Europe and one of the smallest countries in the world, WHERE MOST persons don’t even know where to find it on the map, shows up as an international country well known and recognized for its Cyber Security knowledge, as well as its skills in ICT.

.

Learn more:

First of all: there is a lot of internal stuff which I am NOT authorized to publish and also some stuff which I don’t know! Luxembourg has also published a lot of articles in different languages (French, German) which I would attend to translate, it would take me years to do so! SO, I took the decision to publish the texts as as in the published languages!! For the really interested persons they would know how to translate them 😉 But let us GO for the most known important: Luxembourg is actually and since its start on Cyber Security showing UP with <===> Proactive-THINKing <===> in its mind!! Let us find out HOW it started:

 

1996: Creation of the CLUSSIL

Just a few months after the publication of the European Data Protection Directive (officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data) the CLUSSIL (CLUb de la SĂ©curitĂ© de SystĂšmes d’Information – Luxembourg) was created by 13 IT Security Specialists:
Jean-Marc Buchet, Jean-Marie Déom, Francis Durigneux, Hans-Werner Eiden, Sandrine Gallouédec, Carlo Harpes, Anne Hendrick, Claude Lenert, Bruno Mamer, August Mordijck, Yves Reding, Stephen Purser, Marc Schintgen.

1998: Gust MEES

First website about Cyber Security from a private person, Gust MEES. At the time people told me that I am crazy to publish about Cyber Security as THEY didn’t realize about it (MOST even STILL don’t in 2017!!).

2002: Gust MEES gave courses about Cyber Security in “Internetstuff ETTELBRÜCK” in Luxembourg.

2002: CASES

Personnes :

  • Serge Allegrezza – Directeur Direction de la PropriĂ©tĂ© Intellectuelle
  • Jean-Marie Reiff – Responsable OLAS
  • Henri Grethen – Ministre de l’Économie
  • François Biltgen – Ministre dĂ©lĂ©guĂ© aux Communication
  • Alexandre Dulaunoy – Consultant serveurs du monde du libre
    • Organisateur Hack.lu
    • Plus tard responsable CIRCL
  • Yves de Pril et William Robinet – CONOSTIX
    • DĂ©veloppeur du premier managed security system pour SME

 

2004-2007: MySecureIT 

Gust-MySecureIT

Click image to enlarge, please.

.

Cyber Security courses from Gust MEES were mandatory in Luxembourg EDUcation up from “7Ăšme” (12-13 year old’s) and were THE FIRST in Luxembourg EDUcation.

2004: Gust MEES created the website http://www.internetmonitor.lu

2004: Lancement du premier projet CERT (23.5.2004 eLuxembourg)

04.02.2005: Lancement officiel de CASES

Le site web de CASES a Ă©tĂ© officiellement lancĂ© le 3 fĂ©vrier 2005 par le Ministre de l’Économie et du Commerce extĂ©rieur. 

Au cours de l’annĂ©e 2005, CASES a fait trente-deux prĂ©sentations dans le cadre du Plan Directeur National de la SĂ©curitĂ© des SystĂšmes et RĂ©seaux d’Information et de CASES. Ces prĂ©sentations ont Ă©tĂ© faites lors de rencontres de spĂ©cialistes au Luxembourg et Ă  l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a Ă©tĂ© reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une confĂ©rence tenue Ă  Bruxelles le 14 dĂ©cembre 2005, le Luxembourg a Ă©tĂ© demandĂ© de prĂ©senter ce projet devant les reprĂ©sentants des autres pays membres de l’Union europĂ©enne. CASES a Ă©tĂ© spĂ©cialement fĂ©licitĂ© pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le MinistĂšre de l’Économie et du Commerce extĂ©rieur a, dans un commun effort avec le MinistĂšre de l’Éducation nationale et de la Formation professionnelle, organisĂ© une campagne de sensibilisation pour les enfants des classes de septiĂšme de tous les lycĂ©es au Luxembourg. CASES a Ă©laborĂ© le contenu de la formation qui a dĂ©jĂ  Ă©tĂ© distribuĂ© Ă  une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisĂ© la confĂ©rence HACK.LU, une confĂ©rence qui a rassemblĂ© de trĂšs nombreux professionnelles du domaine de la sĂ©curitĂ© informatique. La confĂ©rence a connue un trĂšs grand succĂšs, tant dans la presse spĂ©cialisĂ©e que parmi les participants.

2005

Personnes

  • Etienne Schneider
  • AngĂ©lique Joyeux – rĂ©daction français
  • Cyril Pierre-Bausse
  • Pour Telindus
    • Carlo Harpes
    • CĂ©dric Mauny
    • Thierry Zoller

Le site de CASES a Ă©tĂ© officiellement lancĂ© le 3 fĂ©vrier 2005 par le Ministre de l’Économie et du Commerce extĂ©rieur.

Au cours de l’annĂ©e 2005, CASES a fait trente-deux prĂ©sentations dans le cadre du Plan Directeur National de la SĂ©curitĂ© des SystĂšmes et RĂ©seaux d’Information et de CASES. Ces prĂ©sentations ont Ă©tĂ© faites lors de rencontres de spĂ©cialistes au Luxembourg et Ă  l’étranger ou sous forme de missions de sensibilisation.

Le projet CASES a Ă©tĂ© reconnu comme good practice dans le domaine de «awareness raising» par L’ENISA (European Network and Information Security Agency). Lors d’une confĂ©rence tenue Ă  Bruxelles le 14 dĂ©cembre 2005, le Luxembourg a Ă©tĂ© demandĂ© de prĂ©senter ce projet devant les reprĂ©sentants des autres pays membres de l’Union europĂ©enne. CASES a Ă©tĂ© spĂ©cialement fĂ©licitĂ© pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents.

Le MinistĂšre de l’Économie et du Commerce extĂ©rieur a, dans un commun effort avec le MinistĂšre de l’Éducation nationale et de la Formation professionnelle, organisĂ© une campagne de sensibilisation pour les enfants des classes de septiĂšme de tous les lycĂ©es au Luxembourg. CASES a Ă©laborĂ© le contenu de la formation qui a dĂ©jĂ  Ă©tĂ© distribuĂ© Ă  une quinzaine de classes.

CASES a, ensemble avec le CSRRT-LU (Computer Security Research and Response Team – Luxembourg) organisĂ© la confĂ©rence HACK.LU, une confĂ©rence qui a rassemblĂ© de trĂšs nombreux professionnelles du domaine de la sĂ©curitĂ© informatique. La confĂ©rence a connue un trĂšs grand succĂšs, tant dans la presse spĂ©cialisĂ©e que parmi les participants.

La version beta de l’outil de communication CASiX dĂ©veloppĂ©e par CASES a Ă©tĂ© prĂ©sentĂ©e et dĂ©livrĂ© Ă  plusieurs partenaires. Ceux-ci vont l’utiliser pour la communication avec leur communautĂ© et pour la communication avec le nƓud national CASES. CASES a lancĂ© une Ă©tude d’analyse des risques basĂ©e sur la mĂ©thode française EBIOS dans le MinistĂšre de l’Économie et du Commerce extĂ©rieur, et ce en vue de formaliser une politique de sĂ©curitĂ© pour le MinistĂšre.

Lancement officiel de cases 04.02.2005

PremiÚre Hack.lu dans la chambre des métiers

Conférence sécurité pour PME dans la chambre des métiers

DĂ©but des formations MySecureIt

2005.03.23 Signature du premier contrat de collaboration avec la Suisse – MELANI

2006: Gust MEES

In February 23, 2006 Gust MEES was presenting an innovation, a theater piece about Cyber-Security to explain the youth about the dangers of the Virtual-World (the internet). It was a great success, read my blog about it (in French) below, please:

.

LTML-TIP-Gust-Artikel-Presse

Click the image to enlarge it, please.

2006

Le projet CASES a Ă©tĂ© reconnu comme good practice dans le domaine de «awareness raising » par L’ENISA (European Network and Information Security Agency). Lors d’une confĂ©rence tenue Ă  Bruxelles le 4 octobre 2006, le Luxembourg a Ă©tĂ© demandĂ© de prĂ©senter ce projet devant les reprĂ©sentants des autres pays membres de l’Union europĂ©enne. CASES a Ă©tĂ© spĂ©cialement fĂ©licitĂ© pour ses efforts notamment dans le domaine des PME et de la sensibilisation des adolescents ainsi que pour son travail effectuĂ© sur l’analyse des routeurs WiFi vendus par les ISP luxembourgeois.

Le MinistĂšre de l’Économie et du Commerce extĂ©rieur a signĂ© pour le compte du projet CASES une entente de collaboration avec le Centre de recherche informatique de MontrĂ©al dans le domaine de la sensibilisation des PME aux risques informatiques.

Les relations avec la Direction Centrale de SĂ©curitĂ© des SystĂšmes d’Information en France ont Ă©tĂ© intensifiĂ©es en vue de pouvoir conclure une entente de collaboration en 2007.

Le MinistĂšre de l’Économie et du Commerce extĂ©rieur a, dans un effort commun avec le MinistĂšre de l’Éducation nationale et de la Formation professionnelle, continuĂ© sa campagne de sensibilisation pour les enfants des classes de septiĂšme des lycĂ©es au Luxembourg. CASES a Ă©laborĂ© le contenu de la formation qui a dĂ©jĂ  Ă©tĂ© distribuĂ© Ă  une trentaine de classes.

2007-LUSI:

.

2007

Présentations et participation aux conférences

  • Au cours de l’annĂ©e 2007, l’équipe de CASES a fait plus de quarante prĂ©sentations dans le cadre de ses missions dĂ©crites dans le Plan Directeur National de la SĂ©curitĂ© des SystĂšmes et RĂ©seaux d’Information. Ces prĂ©sentations ont Ă©tĂ© tenues lors de confĂ©rences en matiĂšre de sĂ©curitĂ© de l’information au Luxembourg, comme notamment le « Internet Security Day » , et Ă  l’étranger, respectivement sous forme de missions de sensibilisation, principalement dans es Ă©coles primaires et secondaires luxembourgeoises.

  • Enfin, CASES a contribuĂ© Ă  l’organisation de la deuxiĂšme Ă©dition de la confĂ©rence internationale HACK.lu. Cette confĂ©rence a de nouveau su rassembler de trĂšs nombreux professionnels du domaine de la sĂ©curitĂ© informatique. La confĂ©rence a connu un trĂšs grand succĂšs, tant dans la presse spĂ©cialisĂ©e que parmi les participants. À cause des attaques de type phishing, CASES a organisĂ© un workshop tenu par l’organisation hautement renommĂ©e AntiPhishingWorkingGroup.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employĂ©s ont Ă©tĂ© lancĂ©es au sein du ministĂšrede l’Économie et du Commerce extĂ©rieur, du Centre Informatique de l’État, de la ReprĂ©sentation Permanente du Luxembourg Ă  Bruxelles ainsi que de l’ADEM. Lors de ces campagnes, les agents ont Ă©tĂ© sensibilisĂ©s dans des sĂ©minaires liĂ©s aux risques Ă  la sociĂ©tĂ© de l’information.

  • CASES a organisĂ© un stand Ă  la Belle Étoile pour le Safer Internet Day, une initiative de la Commission europĂ©enne. Pendant toute une semaine, des adultes et des enfants ont pu s’informer sur les risques d’Internet et passer des tests de connaissance. La commissaire Viviane Reding a Ă©tĂ© accueillie et plusieurs classes d’école sont venues faire leur permis web.

  • Une campagne contre le cyberbullying (harcĂšlement via les nouvelles technologies de l’information et de la communication) a Ă©tĂ© lancĂ©e en forme de projet pilote dans un lycĂ©e du Luxembourg. CASES a rĂ©ussi Ă  motiver tous les opĂ©rateurs de tĂ©lĂ©phones mobiles, le ministĂšre de l’Éducation nationale, la Police grand-ducale, le Parquet, l’UniversitĂ© de Luxembourg ainsi que le projet www.lusi.lu Ă  s’investir dans le projet et Ă  trouver une rĂ©ponse Ă  ce nouveau flĂ©au.

  • CASES a accueilli plus de quatre mille personnes intĂ©ressĂ©es Ă  son stand Ă  la foire d’automne. Les visiteurs ont reçu des brochures sur la sĂ©curitĂ© et ont pu assister Ă  des prĂ©sentations expliquant comment faire du commerce Ă©lectronique sĂ©curisĂ©. GrĂące aux ordinateurs de l’Internet Stuff” enfants et adultes ont pu passer des tests de connaissance ou consulter le site de CASES pour trouver des conseils pratiques. CASES a aussi invitĂ© sur son stand l’ABBL ainsi que le projet Luxembourg Safer Internet (www.lusi.lu).

Le site Internet www.cases.lu

  • De nouveaux contenus (6 grands dossiers et de nombreuses recommandations) ont Ă©tĂ© publiĂ©s sur le site de CASES. Plus de quatre-vingt alertes ont Ă©tĂ© mises sur le site pour avertir les internautes de vulnĂ©rabilitĂ©s critiques ou importantes. La version allemande du site a Ă©galement Ă©tĂ© lancĂ©e en 2007. CASES est aujourd’hui un des portails publics les plus visitĂ©s au Luxembourg.

  • Deux permis web ont Ă©tĂ© conçus et mis en ligne. Le premier http://pwws.cases.lu est destinĂ© aux enfants et vĂ©rifie leur savoir-faire dans plusieurs domaines du cyber-mode. AprĂšs avoir passĂ© le test avec succĂšs, les enfants peuvent imprimer un certificat. Pour les adultes, un permis vĂ©rifiant les bons reflexes nĂ©cessaires pour faire du commerce Ă©lectronique en toute sĂ©curitĂ© a Ă©tĂ© publiĂ© sous l’adresse http://epass.cases.lu.

  • -Des conseils spĂ©cifiques pour le commerce Ă©lectronique sĂ©curisĂ© ont Ă©tĂ© publiĂ©s sur le site de CASES. Un “flyer”commerce Ă©lectronique a Ă©tĂ© rĂ©digĂ© et sera mis Ă  disposition dans les guichets de banques dĂšs dĂ©but 2008.

Les collaborations de CASES

  • CASES, ensemble avec le CERT luxembourgeois, a aidĂ© plusieurs banques de la place ainsi que l’ABBL Ă  rĂ©agir de façon coordonnĂ©e contre les nombreuses attaques de type Phishing qui ont eu lieu entre fin juillet et fin aoĂ»t 2007. PREMIERES attaques de type physhing.au Luxembourg.

Un projet pilote qui a pour but d’établir de bonnes pratiques sĂ©curitaires au cƓur des maisons de jeunesse a Ă©tĂ© lancĂ© en collaboration avec le Service National de la Jeunesse et le ministĂšrede la Famille. Le but est de sĂ©curiser le rĂ©seau informatique des maisons de jeunesse et d’élaborer une politique de sĂ©curitĂ© ainsi qu’un code de bonne conduite pour adolescents.

  • CASES a contribuĂ© Ă  l’élaboration d’un guide de bonnes pratiques pour la mise en place de rĂ©seaux sans fil dans des locaux publics. Le but de ce guide est de sĂ©curiser le rĂ©seau sans fil et d’élaborer une politique de sĂ©curitĂ© ainsi qu’un code de bonne conduite pour les clients.  WiFi sĂ©curisĂ©

  • CASES a entamĂ© une coopĂ©ration avec le nouveau service de la DCSSI française en matiĂšre de sensibilisation du grand public.

  • CASES a Ă©tĂ© Ă©lu parmi les projets phares du domaine de la sensibilisation en Europe et a Ă©tĂ© invitĂ© pour la troisiĂšme fois de suite par l’European Network and Information Security Agency (ENISA) Ă  faire une prĂ©sentation sur le fonctionnement du projet.

  • CASES a, au cours des derniĂšres annĂ©es, su acquĂ©rir plusieurs partenariats avec des organisations Ă©tatiques Ă©trangĂšres ayant les mĂȘmes missions de sensibilisation.

Projet CIP – Critical Infrastructure Protection La Direction du Commerce extĂ©rieur et de la SĂ©curitĂ© informatique a lancĂ©, ensemble avec la Direction de l’énergie, un nouveau projet dans le domaine de la protection des infrastructures critiques dans le secteur de l’énergie. Des propositions, en vue de l’harmonisation de la terminologie pour l’analyse de risque et pour la gestion de crises, ont Ă©tĂ© Ă©laborĂ©es. Des principes d’établissement du glossaire contenant les dĂ©finitions et abrĂ©viations utilisĂ©es Ă  travers tous les documents du projet ont Ă©tĂ© dĂ©finis et un glossaire a Ă©tĂ© rĂ©digĂ©. Un schĂ©ma de classification selon trois dimensions (confidentialitĂ©, intĂ©gritĂ©, disponibilitĂ©) avec plusieurs classes par dimension et rĂšgles de sĂ©curitĂ© a Ă©tĂ© conçu et publiĂ© sur le site de CASES. Ce schĂ©ma servira de base pour un schĂ©ma de classification interne aux organisations. Il est destinĂ© en premier lieu Ă  crĂ©er un cadre pour l’échange d’informations entre le ministĂšre de l’Economie et du Commerce extĂ©rieur et les opĂ©rateurs CIP. Finalement une cartographie des menaces a Ă©tĂ© rĂ©digĂ©e.

Projet de mise en place d’un CSIRT gouvernemental

La Direction du Commerce Ă©lectronique et de la SĂ©curitĂ© informatique, en collaboration avec d’autres acteurs gouvernementaux majeurs du domaine de la sĂ©curitĂ© de l’information (CIE, CCG,..), est le chef de file dans le projet de mise en place d’un CSIRT national (CSIRT pour “Computer Security Incident Response Team”). Ce nouveau centre de gestion des incidents de sĂ©curitĂ© informatique fournira les services suivants aux entitĂ©s gouvernementales:

  • gestion et rĂ©ponse sur incidents,

  • veille technologique,

  • bulletins d’alertes et d’avertissements,

  • point de contact et de coordination national pour toutes questions du domaine de la sĂ©curitĂ© de l’information.

Dans le cadre du projet CSIRT, la Direction du Commerce Ă©lectronique et de la SĂ©curitĂ© informatique a participĂ© aux rĂ©unions du TF-CSIRT (http://www.terena.org/activities/tf-csirt/), du FIRST (http://www.first.org), ainsi que d’autres fora internationaux, lui permettant de dĂ©velopper des partenariats importants pour la suite du projet.DĂ©montrant sa forte implication dans le domaine CSIRT, le ministĂšre a co-organisĂ© et hĂ©bergĂ© la formation TRANSITS (formation spĂ©cialisĂ© CSIRT, effectuĂ© par TF-CSIRT, et unique dans sons genre) au Luxembourg.

Projet Politique de Sécurité

La Direction du Commerce extĂ©rieur et de la SĂ©curitĂ© informatique a commencĂ© Ă  rĂ©diger une politique de sĂ©curitĂ© basĂ©e sur les standards de la famille ISO/IEC 27000, standards internationalement reconnus dans le domaine de la sĂ©curitĂ© des systĂšmes d’information. Une vingtaine de politiques ont Ă©tĂ© rĂ©digĂ©es, les procĂ©dures y rĂ©fĂ©rant sont rĂ©digĂ©es au cours de l’annĂ©e 2008. Ce projet vise premiĂšrement Ă  rĂ©aliser une politique de sĂ©curitĂ© pour le ministĂšre de l’Économie et du Commerce extĂ©rieur et, deuxiĂšmement, Ă  donner aux autres MinistĂšres et administrations intĂ©ressĂ©es un guide de mise en place.

2008.

2008: LISA Stopline started 2008

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2008: Gust MEES published FREE courses about Cyber Security on Google Knol; Google Knol discontinued its services on MAY 1st 2012; NO trace anymore :(((

Knol-Author-of-the-week

Through the way-back-machine web.archive.org I found back some stuff:

2008

Au cours de l’annĂ©e 2008, l’équipe de CASES a fait plus que cinquante prĂ©sentations dans le cadre de ses missions dĂ©crites dans le Plan Directeur National de la SĂ©curitĂ© des SystĂšmes et RĂ©seaux d’Information. Ces prĂ©sentations ont Ă©tĂ© tenues lors de confĂ©rences en matiĂšre de sĂ©curitĂ© de l’information au Luxembourg, comme notamment le “Internet Security Day 2.0” ou encore les Midis de l’Europe, et Ă  l’étranger, respectivement sous forme de missions de sen sibilisation, principalement dans des ministĂšres et administrations luxembourgeoises.

  • CASES a su rĂ©aliser l’exploit de former dans l’annĂ©e scolaire 2007-2008, les enfants des lycĂ©es classiques et techniques frĂ©quentant les classes de 7 Ăšme au Luxembourg. Dans plus de cent-vingt classes primaires, des actions de sensibilisation similaires ont Ă©tĂ© rĂ©alisĂ©es. Ainsi le Luxembourg est le premier pays en Europe qui a su rĂ©aliser un tel exploit. Plus que sept mille enfants et adolescents ont Ă©tĂ© sensibilisĂ©s en 2008. Un rapport sur l’état actuel a Ă©tĂ© publiĂ© sur Internet.CASES a aussi rĂ©alisĂ© une dizaine de soirĂ©es d’informations pour parents d’élĂšves.CASES sensibilise aussi aux risques d’arnaques sur Internet.

  • CASES a participĂ© au salon de l’éducation organisĂ© par la Ville de Luxembourg et Ă  la journĂ©e “Summer –Spill a Spass” organisĂ©e par la Ville de Dudelange, aux ateliers pĂ©dagogiques du LycĂ©e Marie Consolatrice Ă  Esch/Alzette. CASES est intervenu lors des journĂ©es pĂ©dagogiques de la Banque de Luxembourg et a participĂ© Ă  la “e-City roadshow” organisĂ©e par la Ville de Luxembourg. CASES a activement participĂ© au “LuSI day” tenu au Forum Geesekneppchen, au “SIGI-day” Ă  Contern et aux “JournĂ©es du livre” Ă  Bascharage.

  • Enfin, CASES a contribuĂ© Ă  l’organisation de la deuxiĂšme Ă©dition de la confĂ©rence internationale “HACK.lu”. Cette confĂ©rence a de nouveau su rassembler de trĂšs nombreux professionnels du domaine de la sĂ©curitĂ© informatique. La confĂ©rence a connu un trĂšs grand succĂšs, tant dans la presse spĂ©cialisĂ©e que parmi les participants.

Campagnes de sensibilisation

  • Des campagnes de sensibilisation pour fonctionnaires et employĂ©s ont Ă©tĂ© lancĂ©es au sein du ministĂšre de la Fonction Publique et de la RĂ©forme administrative, TrĂ©sorerie de l’État, Centre de LogopĂ©die, du Cadastre et de Cercle asbl. Lors de ces campagnes, les agents ont Ă©tĂ© sensibilisĂ©s dans des sĂ©minaires liĂ©s aux risques Ă  la sociĂ©tĂ© de l’information.

  • CASES a su rĂ©aliser un partenariat avec “Le Luxemburger Wort”. CASES a publiĂ© chaque semaine un article de sensibilisation dans ce journal de trĂšs grande couverture. Ainsi plus de quarante articles de presse ont Ă©tĂ© publiĂ©s.- Dans le cadre de la coopĂ©ration avec le “Luxemburger Wort”,

  • un test de “Wardriving” a Ă©tĂ© rĂ©alisĂ© dans la Ville de Luxembourg. Ce test a dĂ©montrĂ© que la sĂ©curitĂ© dans le domaine des rĂ©seaux sans fil est dĂ©plorable.

  • – CASES a contribuĂ© Ă  une dizaine d’émissions radio sur 100,7.

  • CASES a accueilli plus de quatre mille personnes intĂ©ressĂ©es Ă  son stand Ă  la foire d’automne. Les visiteurs ont reçu des brochures sur la sĂ©curitĂ© et ont pu assister Ă  des prĂ©sentations sur des attaques via “Chevaux de Troie”. Un espace de jeu pour enfants avec un quiz sĂ©curitĂ© a Ă©tĂ© proposĂ© avec un trĂšs grand succĂšs. Lors de la foire d’automne, une campagne de sensibilisation aux risques liĂ©s Ă  “Bluetooth” a Ă©tĂ© rĂ©alisĂ©e.

  • Une enquĂȘte sur les performances du social engineering a Ă©tĂ© rĂ©alisĂ©e en partenariat avec l’UniversitĂ© de Luxembourg. Lors de cette enquĂȘte, il a Ă©tĂ© essayĂ© d’inciter les personnes questionnĂ©es Ă  donner leur mot de passe. Plus de 1000 personnes ont Ă©tĂ© questionnĂ©es. Un rapport dĂ©taillĂ© a Ă©tĂ© publiĂ© sur le site de CASES.

  • – CASES a lancĂ© le label “suivant les rĂ©flexes CASES”. Une premiĂšre dĂ©clinaison de ce label a Ă©tĂ© rĂ©alisĂ©e avec le label “WiFi sĂ©curisĂ©” qui a Ă©tĂ© attribuĂ©, aprĂšs audit, Ă  3 sociĂ©tĂ©s sur 6 sites

Projet Politique de Sécurité

  • CASES a, ensemble avec le ministĂšre de la Famille et le SNJ, rĂ©alisĂ© un projet d„envergure pour mettre en sĂ©curitĂ© les Maisons de Jeunes. Une politique de sĂ©curitĂ© ainsi que des guides de bonnes pratiques ont Ă©tĂ© rĂ©alisĂ©s.

  • En collaboration avec le ministĂšre de l’Éducation, un projet pour la mise en sĂ©curitĂ© des Écoles primaires a Ă©tĂ© entamĂ©. Deux projets pilotes ont Ă©tĂ© entamĂ©s.

  • Un projet de mise en place d’une politique de sĂ©curitĂ© a Ă©tĂ© lancĂ© en 2008 au sein d’une administration gouvernementale

 

2009

CASES a su rĂ©aliser l’exploit de former dans l’annĂ©e scolaire 2008-2009, tous les enfants des lycĂ©es classiques et techniques frĂ©quentant les classes de 7Ăšmeau Luxembourg. Beaucoup de classes primaires ont Ă©tĂ© formĂ©es, et ce Ă  partir de l’ñge de 9 ans. En tout CASES a sensibilisĂ© les enfants de plus de 300 classes. Ainsi le Luxembourg est le premier pays en Europe qui a su rĂ©aliser un tel exploit. Plus que sept mille enfants et adolescents ont Ă©tĂ© sensibilisĂ©s en 2008. Un rapport sur l’état actuel a Ă©tĂ© publiĂ© sur Internet. CASES a aussi rĂ©alisĂ© une vingtaine de soirĂ©es d’informations pour parents d’élĂšves.

CASES a participé au «Kannerstaat» de la ville de Junglinster.

CASES a publiĂ© un support scolaire, destinĂ© aux instituteurs et aux parents. Ce livre vise Ă  fournir les informations nĂ©cessaires pour pouvoir Ă©duquer les enfants dans diffĂ©rents domaines liĂ©s Ă  la sĂ©curitĂ© de l’information. LEITFADEN

Collaboration avec le DNR

NACKT im NETZ

2010

  • Campagne brosses Ă  dents
  • CrĂ©ation de smile GIE

 

2010: BEESECURE

Le ministre de l’Ă©conomie Jeannot KreckĂ© a prĂ©sentĂ© le 8 novembre 2010 BEE SECURE, un projet commun du MinistĂšre de l’Economie et du Commerce extĂ©rieur, du MinistĂšre de la Famille et de l’IntĂ©gration et du MinistĂšre de l’Education et de la Formation Professionnelle.

5 Jahre sind im Internetzeitalter ganz schön lange und fĂŒr BEE SECURE auf jeden Fall Grund genug, Partner und UnterstĂŒtzer zusammenzurufen und gemeinsam einen Blick in die Vergangenheit zu werfen.

So versammelten sich am 9. Oktober rund 100 geladene GĂ€ste im Forum GeesseknĂ€ppchen, wo allerhand „Requisiten“ der letzten fĂŒnf Jahre ausgestellt waren. Im Fokus standen die Sensibilisierungskampagnen, die seit 2010 BEE SECURE zur wichtigsten Anlaufstelle im Land machen, wenn es um die sichere Benutzung von Computer und Co geht.

Annual Reports BEESECURE – Starting 2010

 

2011

Analyse des risques

2012

Stopline

LISA Stopline started 2008, became member in 2008 and changed to Stopline in 2012

2012

My.cases.lu

 

May 2012: Gust MEES published FREE Cyber Security courses about Cyber Security on WordPress https://gustmees.wordpress.com

 

2013-2014: Cyber-Security on Social Media twitter, Gust MEES introduces the hashtag <===> #FSCD <===> “Friday Security Check Day”, where users get reminded about Security by posting different blog posts and articles.

2013

higher-education-tech-blogs-2013-Doug PETERSON.

Gust MEES got interviewed about Cyber Security through Social Media twitter by Doug PETERSON who is ALSO featured At EdTech: we strive to create the most valuable resources for higher education technology professionals. One of the ways we do that is by highlighting the smartest and most innovative education tech bloggers on the web.

.


More to come here, lots of research necessary… Meanwhile follow the following articles (curation) and links:


2017: 

Cybersecurity week in October:

 

.


2016: WHAT is done in the country!? WHICH actors are helping to boost Cyber-Security!?

There are more and more companies and organisations offering courses about Cyber Security, such as:

 


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure). L’auteur Ă©tait aussi gagnant d’un concours en Ă©lectronique en 1979 ( Pays germaniques ) et voyait son projet publiĂ© dans le magazine Ă©lectronique “ELO”.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author was also a winner of an electronics contest (Germanic countries) in 1979 and got his project published in the “Electronics Magazine ELO”).

.

Stay tuned for next blog post(s) 😉..

.

 

.

Keywords for me to create this blog post: CLUSSIL, Mysecureit, CASES, LUSI, STOPLINE, Kannertelefon, BEESECURE, CIRCL, Security made in Luxembourg, SMILE, hoffilux, Gust MEES, Internet Monitor, LUSI, LISA-Stopline, Interview,

.

 

 

 
Leave a comment

Posted by on November 22, 2017 in 21st Century Skills, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Critical Thinking, Critical Thinking-a need!, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Digital Intelligence, Digital LĂ«tzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, Encryption, EQ, eSkills, Ethical Mind, ethics, Europe, European Cyber Security Month, History, History of the web, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning about Social Medias, Learning basics of Cyber-Security-Practice, Luxembourg, Luxembourg and CyberSecurity, Mobile Botnet, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Phishing, Potentially Unwanted Programs, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, PUPs, Quality Courses, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2014, SID2015, SID2016, SID2017, Skills, Skype insecurity, Smart TV's, Social Engineering, Social Media, Spam, Synthesizing Mind, Teacherpreneurs, Third Party Applications, TOR-Anonymat, TU-DRESDEN

 

Tags: , , , , , , , , , , ,

SID2017: Safer Internet Day 2017-Participation

SID2017: Safer Internet Day 2017-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2017 – Save the date!.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2017 will be celebrated on Tuesday 07 February 2017, with the strapline of ===> „Be the change: unite for a better internet“ <=== following the success of last year’s campaign.

.

sid-gif

Click the animated image please to access the article.

 

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2017

programmerman-animatedWHAT is special this year with my participation on SID2017? 

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS &  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2017 in Luxembourg/Europe.

.

Click the image please to access the article.

 

. 

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibility, WE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2017 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2017 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2017 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
Stay tuned for next blog post(s) 😉

.

.

.

 

 
Leave a comment

Posted by on January 30, 2017 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Analyzing, Apps, Autodidact, Awareness, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Big Data, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Collaborative Learning, Collective Intelligence, Comics, Competency, Connected Educators, Creating Mind, Creativity, Critical Thinking, Criticism, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Device Theft, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital LĂ«tzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Emotional Intelligence, Encryption, Engagement, Entrepreneurship, EQ, eSkills, Ethical Mind, ethics, Europe, FAQ, Feedback, Free courses, Get smart with 5 minutes tutorials, Global, Global Collaboration, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learn with books, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Mobile Botnet, Mobile Security, Modern EDU, Naivety, Not ONLY rights but also responsibilities, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Quality Courses, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Seniors, SID2017, Skills, Smart TV's, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, TOR-Anonymat, Tracing, Tutorials, understanding, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

.

Learning basics of IT-Security and Cyber-Security

.


CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

We are ALL responsible for the internet

.

Internet safety is the responsibility of EVERYONE! It isn’t actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes… Let us call them <===> CyberHygiene <===> as they are about care anyway.

WHAT do WE have to take care about!? Check below please:

.

 

  • Updates about our “Operating System” (OS)
  • Updates about so-called “Third Party Programs”
  • Back-up from our files and/or the whole Hard Disk
  • Installation of protection-software, anti-malware, anti-spyware tools included…
  • Protection of our privacy
  • Encryption
  • Secure Passwords

MOST of the above mentioned are automated tasks, SO NO way to NOT use THEM 😉 GET used to IT! GET the reflexes!

For more in depth knowledge, check below please (more theory):

Check ALSO about the How-To from the EU (Europe):

.

eSkills map_0

Click the above image please to access the article.

.


The PracTICE / How To Get The Right Reflexes To Stay Secure?

programmerman-animated

          • First of ALL, check my blog ===> Cyber-Security Practice: Learn it in one week <=== and follow ALL the steps.
          • Chose a day in the week where YOU control YOUR updates and YOUR computers & mobiles security! I suggest the Friday, as I created on Twitter the “Friday Security Check Day“, hashtag = #FSCD. Get used to it on any Friday, get THE reflex!
  • On any second Tuesday on each month Microsoft and Adobe publish new updates, install THEM! THEY are a MUST! It’s the Patch-Tuesday!
  • Introduce a pledge in YOUR family, where every family member MUST sign and accept it! It will give a Community feeling and RESPONSIBILITY!

.

Learn more:

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

..

Keywords necessary for me to create this blog post: eSkills, eCitizen, #digcit, EU, Europe, 21st Century LEARNing, collaboration, lifelong LEARNing, learning to learn, coaching, accelerated learning, le mieux apprendre, time management, tagboard, curation, PLN, PKM, Social Media, Twitter, catalyst, amplifier, Modern Edu, Twitter Chat’s, Social Media, curation, blogging, Multimedia, LEARNing To LEARN, Life-Long LEARNing, PLN, PKM, Twitter, Updates, third party applications, BYOD, malware, botnets, mobile security, CyberSecurity, community feeling, community responsibility,

Stay tuned for next blog posts 😉

 

.

.

 

 
Leave a comment

Posted by on December 20, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Andragogy, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Autodidact, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, Free courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global, HowTo, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Often Asked Questions, Personal Learning Network (PLN), Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Privacy, Professional Development, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Self-directed Learning, Seniors, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Technology Integration, Third Party Applications, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Andragogy | Adult Teaching: How-To Teach ICT!? | PracTICE

Andragogy | Adult Teaching: How-To Teach ICT!? | PracTICE

.

Collaboration and Coaching

.


Andragogy, Adult Teaching!? WHAT Is Different From Normal Student Teaching!?

students-workforceIt is a question which I get asked very often “Andragogy, Adult Teaching!? WHAT Is Different From Normal Student Teaching!?“. Well, first remember that adults and seniors are OUT of the <===> #SchoolCocoon <===> since long or very long, THEY are NOT used anymore for learning! That is a very important fact to consider first before YOU start teaching adults and seniors. ALSO, adults and seniors are NOW (as out of school) mostly more focused on the benefits THEY could have in their private life and are willing to learn stuff which fits to their needs in private life!

Another very important point to consider is that a lot of adults, seniors have a FEAR against schools and school-teaching, they made bad experiences with teachers AND still thinking on the stress with tests! AND they are used to an OLD outdated EDUcation System which told them that learning is finished once reached the degree (the diploma in the pockets)! BTW: a RETHINKING of EDUcation for <===> Life-Long Learning is a MUST! As well as how the diplomas are getting handled and valued: e.g. A diploma today doesn’t show any professional development made!!! My proposition is to create the diplomas as: first diploma after school is “A, B,C etc…”, then the professional development (followed courses) should get added such as e.g. A1-2015-1: first professional development made in 2015, one course. A1-2015-5 first professional development made in 2015, five courses, and so on…

This would make the diplomas more valuable as the workforce would recognize them much more than normal ones where they don’t see straight on if a person has followed courses after school or not…

THE factor time is ALSO very important, as said already above, adults and seniors need MORE time to learn as NOT used anymore for learning! Prepare YOUR courses by considering longer sessions! 

And as (already) MOST of YOU know me, a music video, related to the TOPIC 😉

.

.

Chose ALSO a room who doesn’t look sterile (white color) as it would remind them school again! And of course DON’T give the courses in a school! Sounds strange!? Think on the psychological background of fear 😉 Make the learners feel comfortable!

And last but not least, DON’T teach adults, seniors with a normal pedagogy, as THEY won’t accept it to get treated as 12 year old persons!!! THEY ARE OUT OF SCHOOL and they want to get treated as adult, <===> mature persons<===>!


SO… How To Teach Adults, Seniors!?

1ibdy1vf6wghd-n05dgl-aigainformation1First of all, I mentioned it already above, DON’T let them feel like being in school and that YOU are a teacher, educator! Tell them that YOU will be THEIR coach who is guiding them and NOT teaching them and that THEY have a certain autonomy in the “Learning Room” (NOT Classroom!) They are allowed to move around in the “Learning Room”, searching help among their peers by respecting the noise level, copying from each other <===> YES, copying is allowed, OH WHAT FUN <===> everything which was forbidden in the <===> #SchoolCocoon <===> is allowed here, hey that makes engaging them and they have fun as well 🙂

As THEIR coach YOU take care of an individual learning, YOU assist the persons in their learning, DON’T FORGET about the learning rhythm, one size doesn’t fit all! Some persons need more time…

YOU may use a beamer (or a digital whiteboard, depending on YOUR budget…) to introduce first about WHAT the learners will attend to learn where YOU show ALSO the <===> Learning Path <===> which YOU have prepared for them, so they will know up from the beginning where the destination goes with ALL the differentstations“, they will feel comfortable as they can visualize it, they will know as well WHAT skills they will acquire, less unknown stuff to think about…

An example below:

.

FlowChart-Final-Version

The learners will learn about any station in the “Learning Path” AND ALSO know about WHAT skills they will acquire! Click the above image, please, to enlarge it.

.

.

Show and Tell-Evidence Based Teaching

Click the above image, please, to access the article.

 

.

Learn more:

Motivation for adults and seniors… NO excuses for NOT willing to learn 😉

.

Keep Calm-60

Click above image, please, to enlarge.

Keep Calm-50

Click above image, please, to enlarge.

Keep Calm-40

Click above image, please, to enlarge.

Course participants may print the above images and keep it with them, so they remember how young their brain is <===> 18 years <===>!

.

programmerman-animatedFacts to consider and advice:

Adults and especially seniors are NOT anymore used to LEARNing! By knowing this YOU need to take care about it: YOU SHOULD explain that to YOUR LEARNers and tell THEM that they shouldn’t fear, that they should tell YOU when being in trouble, YOU should tell them that YOU take ALL the necessary time so that THEY will understand it, YOU should encourage them at any moment so that they will find the pleasure to LEARN 😉 YOU SHOULD use Empathy, observing them and find out WHO are those who are shy; the ones WHO won’t tell you when there is a problem. YOU SHOULD interact with them, looking over their shoulders and finding out WHERE the problem is.

That is the hardest part BUT the MOST IMPORTANT one as when they understood that they could find confidence in YOU, then they will advance in their LEARNing, THEY NEED confidence in YOU and in THEMSELVES!

Thus meaning: make the LEARNing individual! Take care of each person till they have understood it. It is like <===> differentiated instruction <===> EDUcation, BUT more coaching than teaching. In one phrase, differentiated instruction is primarily suiting instructional means to meet individual learning needs.

.

.

Final_DifferentiatedInstruction

.

.

Learn more:

.

Considering the “Learning Room“:

As mentioned already, make sure that the room isn’t sterile, NOT white! Consider the psychology of colors as it works, my 9 years experience with adults and seniors (NOT teaching) coaching. I used a pastel yellow color in the “Learning Room“, why!?

Yellow adds optimism to your home, prompting feelings of happiness in all who enter. Yellow activates memory, stimulates the nervous system, promotes communication and sparks creativity. And THAT is WHAT WE want in learning, isn’t it 😉

Learn more:

Make ALSO sure that there is an extra room available, where the adults, seniors can jump in to drink a beverage and eventually have some chatting with other participants, make them feel relax

.


SO… WHAT To Teach THEM And How!?

Flipchart-man-318584_1280-Public Domain-Andragogy

Click the above image, please, to enlarge it.

As mentioned already, adults and seniors learn differently and slower (consider the time fact); they want stuff which they can use in their private life! SO… WHAT could be those interests!? Did I say interests, YES, it is exactly this WHERE YOU need to focus when giving courses to adults and seniors! Before starting a course I do every time an introduction session where myself and others present themselves, after the introduction I ask everybody to come in front to me and writing with capital letters on a Flipchart their interests, they could use ALSO 4 different colors (red, green, blue, black).

WHY this!? First of all, there is a bit action as they have ALL to move from their places which is different from <===> #SchoolCocoon <===> and the color they chose is ALSO a sign of their character and mood… By the way: I ask them later also WHY they were choosing that color, just to open a discussion and to make them curios about next steps; they will be aware ALSO that I observe what is going around me and that I give THEM attention

WE will have a look all together NOW on the Flipchart and to find out the common interests, thus meaning: there will be a lot of people probably (mostly) who have THE same interests (hobbies) and NOW everybody knows WHO has the same hobby. WE created already an interest community without knowing it as these people will later talk together and probably will make an exchange of experiences 😉 It is up from there WE will build up OUR course(s)!

YOU certainly will encounter these hobbies: cooking, traveling, festivals, photos, gardening, cinema, reading, swimming, different sports, wandering, cards playing, taking videos, music, motorcycles, cars and more… That are the most common ones by my  experience over 9 years.

Some examples of blogs and curation about gardening (flowers), cooking, festivals:

.

NOW WE know much more about OUR course participants and WE have a starting base: as anybody mostly is proud about WHAT they are doing and easily willing to talk about it (mostly…) WE will show THEM on How-To they can do it through using ICT by explaining THEM that more people would see THEIR exploits and knowledge by using curation, blogging and Social Media. WE will explain them ALSO how it will work by examples, so that THEY can see it visually. And WHY NOT, for the creative ones, how to use “ThingLink“. By experience, women are MORE creative than men, just saying…

Learn more about Curation, Blogging, ThingLink, PLN, PKM:

.


SO… How Can I Say That This (The PracTICE) Is Working!?

programmerman-animatedWell, I was a pioneer in my country Luxembourg (Europe) already in 2002 where I gave pedagogical courses about ICT to a wide range of the population as up from 12 years old (even younger when together with a parent) to 79 years old with different nationalities. ALSO there were two days in the week reserved (booked by planing inside the school) for the primary school where they could use OUR “ICT LEARNing room” by my coaching to learn the (at that time) NEW technologies. Schools didn’t have YET computers in the classes at that time and I was working very close together with the teachers and helped also to convince the responsible people from the commune about the necessity of computers in the classrooms, which worked 😉

SO… WHAT was that “ICT LEARNing Room“, called “Internetstuff“!? And WHY was my “Internetstuff” DIFFERENT from ALL the others in Luxembourg!?

A bit History and Story Telling: What is a “Internetstuff”? It was a project by the “European Commission” to bring the “ICT” to ALL the inhabitants in any commune in the European countries. They called it at that time “eEurope” and in Luxembourg it was a special task force, called “eLuxembourg” that was charged about it. SO, they decided to create special places where the population could learn through courses about “ICT”, which they called “Internetstuffen”.

Learn more (in French):

The Government in Luxembourg was looking at the time to find competent people to give those courses about ICT and they were advertising in the newspapers, where I made my application. I was selected and had to follow a 4 months long education through special tailored courses about the How-To to give pedagogical courses with ICT, a bit hard at that time as I was 45 years old already, BUT I did it and I found my vocation!

I offered my services and skills to different communes and it was in ETTELBRUCK (North of the country and 30 km away from where I am living) that I found a new job and a new adventure as a pioneer. Apart from giving courses about and with ICT, NO ONE of the responsible persons had a clue about the How-To, so they told me “Do what You want, You should know what…“, OK, I was perplex and ALONE to do this job!

First I elaborated the opening hours, than I created a “brochure” which was sent to all the houses in that small city (8k inhabitants) to inform them about this new service offered by the commune. I created also a “member card” of a value of 25€ for a whole year who gave the participants the right to visit the place to use only the internet (very few had Internet in 2002) and/or to take part of courses. The place was open on a 5/8, 5 days from Monday to Saturday from 8h30 am to 11h30 am and from 13h30 to 17h30. Monday and Wednesday mornings were reserved for Primary School classes from 08h am to 11h30 am. Saturday and Sunday was closed.

There were also evening courses organized and I collected about 1k6 (1,600) hours of overtime work during 1 1/2 year (non payed hours)! I couldn’t do that job anymore alone, BUT I din’t get a co-worker allowed neither. NO budget for it! I decided NOT anymore giving evening courses and giving the courses on a different way: people (learners) could visit the place whenever they wanted during the opening hours (only in the day) and I would give them courses individually and on different disciplines (security, Office, Photo Editing, website building, email, Skype…).

The learners had more autonomy, I let them work by PracTICE after first having them explained about the How-To shown with a beamer and then also on their own PC (there were 10 PCs in the Learning Room). They could come WHEN they wanted and for how long they wanted. They were completely FREE, no MUST, NO STRESS… I explained them, showed them, observed them (studied their behavior…) and interacted only when needed, when I felt that they must get a bit help to continue. I encouraged them to try by error till they would have learned it and when learned I showed them some tricks by giving advice on How-To do BETTER. It was ME who adjusted and adapted to them, a win-win situation. They learned slowly but surely and once the basics understood (the most important) they learned the other stuff to learn much more quick as they felt more confident about ICT. I encouraged them to practice at home which they all did. I asked them where they still have problems when practicing at home and WE repeated it on another way when possible, otherwise same procedure…

I was also constantly updating my “Professional Development” by reading lots of books (insatiable…):

Autonomy, TEAM, self-directed, autodidact, coaching, guide, analyzing learners constantly, adapting constantly, FAQ’s, PLN, PKM, SKYPE, VOIP Telephony, image editing, eMail, collaboration,

.


Testimonials, Feedback From My LEARNers

This, below, is NOT bragging BUT my pride about the feedback (which is a MUST) from my “LEARNers” who visited my courses.

.

 

Internetstuff-Andragogy-Angela-2003

Click the above image, please, to enlarge

Internetstuff-Andragogy-Alcina-2007

Click the above image, please, to enlarge

Internetstuff-Andragogy-Angela-2003-2

Click the above image, please, to enlarge

Internetstuff-Andragogy-Berthilde-2007

Click the above image, please, to enlarge

Internetstuff-Andragogy-Cathy-2004

Click the above image, please, to enlarge

Internetstuff-Andragogy-équipe senior féminine-2006

Click the above image, please, to enlarge

Internetstuff-Andragogy-Franchina-2007

Click the above image, please, to enlarge

Internetstuff-Andragogy-Ines-2003-Youth

Click the above image, please, to enlarge

Internetstuff-Andragogy-Nadia-2003

Click the above image, please, to enlarge

Internetstuff-Andragogy-Rolande-2003

Click the above image, please, to enlarge

Internetstuff-Andragogy-Rolande-2004

Click the above image, please, to enlarge

Internetstuff-Andragogy-Rolande-2005

Click the above image, please, to enlarge

Internetstuff-Andragogy-Santina-2007

Click the above image, please, to enlarge

Internetstuff-Andragogy-Suzette-2007

Click the above image, please, to enlarge

Reference 2003-GM

Click the above image, please, to enlarge

.

The above texts are in French, Luxembourgish, Italian, Portuguese, German: if YOU are NOT used to those languages please check this App with whom YOU can translate, actually very useful when visiting other countries then yours 😉

Translation Apps:

.

Reference 2003-GM

Click the image, please, to enlarge.

 

The above text is in French, if YOU are NOT used to the language of Moliùre please check this App with whom YOU can translate, actually very useful when visiting other countries then yours 😉

Translation Apps:

.

More about the history behind the above feedback, YES there is a special story behind, please check:

 


In 2015 Coaching-Mentoring Is Seen As An Education Difference-Maker

[START Text from On Educational Coaching, Mentoring & High-Impact Learning] Coaching is a difference-maker in education.  Think of the mindset evident in high-performing athletic teams, chess teams, even actors and other entertainers. Content providers are valuable, but that is not what makes learning organizations distinct, especially not those that seek to reach and provide a high-quality education to a full spectrum of learners. The same thing is true as we continue to implement things like competency-based education models. Many celebrate the way CBE can reduce the cost of college degrees, increasing access and opportunity, and addressing critical workforce needs. However, if cost reduction happens at the expense of great coaching and mentoring, I am concerned that we will make little progress in the democratization of education. The “haves and have nots” of education depend largely upon the prerequisite skills needed to take advantage of newer and emerging learning environments ranging from CBE to MOOCs, self-directed learning to self-organized learning environments. [END Text from On Educational Coaching, Mentoring & High-Impact Learning]

.

Coaching-mentoring

Click the above image, please, to access the article.

 

Learn more about my Global Collaboration and coaching on my following blog posts:

.


Feedback, Reflecting A MUST-Adapting Constantly

As already mentioned above, I asked a lot about WHERE some could have problems to understand and encouraged the learners to tell me, even I asked them to write down on the Flipchart questions they would have eventually. WE collected them all and when they were fit enough on the keyboard I let them create themselves (with my little help) a FAQ’s list (Frequently Asked Questions) and a glossary, see example below please.

.

Internet Monitor Glossary

Click the above image, please, to access the glossary online.

 

Please find below my blog posts about FAQ’s:

Keywords: win-win situation… honesty, straight talking, dealing with mature people, provoking could be (I do…) welcome with a bit irony and humor, dealing with humans, different characters needs to get analyzed before action, a bit courage to go out of normal,

.


Necessary Material For The Courses

Apart from the computers with internet connection here below a list of necessary material:

  • Flipchart
  • Printer All In One (with scanning function)
  • Camera for Photo Editing courses
  • USB Sticks
  • Head phones with micro for Skype use
  • Some webcams for Skype use

.


Is My Proposed Way Of Coaching With ICT ONLY For Adult Learning!?

sharing iconThere is a lot of common from the above mentioned with youth coaching and could be applied as well for them! WHEN YOU make youth feeling being accepted as adults, they will give YOU more respect and it will be a GOOD atmosphere for BETTER learning also! I had teens visiting my “Learning Room [Internetstuff]” for the ONLY purpose to listen and to observe when I gave courses with coaching to the participants. They came in their FREE time when there wasn’t school and made their homework while observing also my “style of teaching, as they said”. I got told by some of them that they learned MORE in 2 hours about ICT than they learned in a month in school. And THAT is THE difference between theory and <===> PracTICE! <===>.

.


Useful Links

Please find below useful links about:

 

Preparation, keywords necessary for me to create this blog post: EPAL, Andragogy, Heutagogy, Flowchart, cooking, nature, flowers, gardening, traveling, interests, PracTICE, profit for private life, NO THEORY!, engagement, Social Media, sharing, communication, NO FEAR, which websites to trust, which FREE services to use, which FREEWARE to use, Kursus schmackhaft machen, spice in LEARNing, quote Gust, LEARNing2LEARN, Life-Long LEARNing, blogs creating, NO STRESS, NO TIME LIMITATION, NOT FORCING, LEARNing-By-Doing, selfish, pride of something (sports, traveling…), bragging through Social Media (negative transformed to positive)…, staying in touch with (abroad) family, Skype, Facebook, Picasa, PhotoScape, Photo Editing, ThingLink, Creativity, positive Psychology, TEAM or WHO is BETTER, individualists, Streber, Alpha person and/or TEAMLEADER, community THINKing OR selfish, Empathy, NO RELIGION and NO politics allowed in courses to respect each OTHER, tolerance, Win-Win thinking amplified for course participants, win-win situation between coach and learners,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog post(s) 😉

.

.

 
12 Comments

Posted by on May 13, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Andragogy, Annotum-Theme, Autodidact, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Books, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Copyright, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Culture, Curation, cybersecurity, Dangers of storage devices, Differentiated Instruction, Digital CitizenShip, Digital Footprint, Education, eLeadership, eLearning, Engagement, Environment, eSkills, Ethical Mind, Europe, Facebook, Feedback, Free courses, FREE Photos, FREE-courses, Future Work Skills, Geo-Tagging, Home-Work, HotSpot, How To stay organized, HowTo, ICT Awareness, Images, Internet Of Things, itsecurity, Learn with books, Learning about Social Medias, Learning about Twitter, Learning By Doing, Learning to Learn, Luxembourg, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Passwords, PC Maintenance, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Psychology of color, Quality Courses, Reality, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Searching, Secure Surfing, Seniors, Skills, Smart TV's, Social Engineering, Social Media, Spam, Student Centred, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Technology Integration, Third Party Applications, Tracing, Twitter, Uncategorized, Understanding the internet, Updates, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2015: Safer Internet Day 2015-Participation

SID2015: Safer Internet Day 2015-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2015 – Save the date!

.

 

.SID15_Banner_anim

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2015 will be celebrated on Tuesday 10 February 2015, with the strapline, once again, of ===> “Let’s create a better internet together” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2015 starts to take shape.

.

SID2015-Poster

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2015

programmerman-animatedWHAT is special this year with my participation on SID2015? 

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS &  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2015 in Luxembourg/Europe.

.

SID2015-BEESECURE

 

Click the image above, please, to access the article.

. 

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibility, WE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2015 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2015 AND #Up2Us to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
4 Comments

Posted by on January 6, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Collaboration, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Engagement, Europe, Facebook, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Smart TV's, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Tracing, Tutorials, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

.

We are ALL responsible for the internet

 

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html


.

SID15_Banner_anim

.

WHY CyberSecurity STARTS At Home AND Is Concerning ALL Of Us

sharing-iconWE can’t say any more that CyberSecurity is ONLY for IT-Experts as the internet is a shared ecosphere where every body has responsibility! Actions of some people can easily affect everyone else, thus meaning: WHEN NOT having installed protection software (updated antivirus) YOUR computer and/or smartphone(s) could get infected by malware and YOU will infect ALSO OTHERS who are in contact with YOU; it will become epidemic!

.

WHY CyberSecurity Starts At Home

 Click the above image to access the article, please.

.

Guidelines for securing your home

 Click the above image to access the article, please.

.

Learn more about the “Internet of Things“:

 

 


How To Take OUR Responsibility!? Let’s make CyberHygiene!

Well, that’s actually NOT that difficult, it’s ONLY the first steps who could be unusual and WE need to get used to it. BUT that’s the same with any other first time, isn’t it 😉

========> WE call it CyberHygiene. <=========

.

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

.

SO, let’s go for it, check below please:

.

Top 5 Questions	Parents	Have	About	Cybersecurity

Click the above image to access the article, please.


Global Impact Of CyberSecurity

Let us have a look ALSO about WHAT the EU and the US are saying about CyberSecurity, so that YOU know about the IMPORTANCE, check below, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.


THE HowTo For BEST Protection

programmerman-animatedPlease find below the BEST possible protection as well as tips for individuals (for companies there would be much more…) explained step by step with a minimum use of technical language so that YOU might be able to understand it and to use it comfortable:

.

.

 1.What are the biggest security threats to kids?

1.What are the biggest security threats to kids?

Learn more about: 1.What are the biggest security threats to kids?


2. How do I talk with my child about security?

2. How do I talk with my child about security?

Learn more: 2. How do I talk with my child about security?

  • to be updated… Will get discussed in detail in my new blog post…

3. How do we protect our family’s computers?

3. How do we protect our family's computers?

Learn more: 3. How do we protect our family’s computers?


4. How do we protect our mobile devices?

4. How do we protect our mobile devices?

Learn more: 4. How do we protect our mobile devices?


 5. Why do we always hear “Never share your passwords”?

5. Why do we always hear "Never share your passwords"?

Learn more: 5. Why do we always hear “Never share your passwords”?


AND Don’t Forget About Privacy!

You’d be surprised how many things an app can learn about you and what you do. Without you ever knowing it.

Clueful is the only way to really understand iOS apps, how they use your private data and treat your privacy. This one-of-a-kind product identifies intrusive applications and shows you what they do behind your back.

.

Bitdefender Clueful

.

Learn more in my blog post: ===> Digital CitizenShip: Social Media AND Privacy <===

 

.

book-question-markLearn more:

.

.

Keywords necessary for me to create this blog post: #FSCD promoted by EDU as Homework, ideas, Social Media, twitter, Facebook, CyberHygiene, reflexes, digital citizenship, digcit, eSkills,

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

 
8 Comments

Posted by on November 18, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Europe, Facebook, FAQ, FBI, For a Better World, Free courses, FREE-courses, Future Work Skills, Global, Home-Work, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Proactive Thinking, Professional Development, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Security in Schools, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

Learning To Become a GOOD Digital Citizen | Digital CitizenShip

.

screenhunter_03-aug-05-15-24 (1)

.


.

SID15_Banner_anim

.

Learning To Become a GOOD Digital Citizen | Digital CitizenShip | How To?

.

« Good habits formed at youth make all the difference. » Aristotle

.

WE are participating ALSO on “Safer Internet Day 2015“, called #SID2015.

.

SID2015-BEESECURE

Click the above image, please, to access the organization to know more about it (in English).

.

This blog post is a ===> #GlobalCollaboration #blog <=== from & &  for  about .

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit) AND THEREFORE WE will use an infographic from Nancy WHITE ===> You can follow her on Twitter  <===. Here WE go, check the infographic below, please.

.

Digital-Citizenship-infographic-620x965

[GM] Please check my blog posts below, who explain in detail:

When YOU read the above mentioned blog posts, YOU will realize that I mostly use the possibility to include the students, learners in the process of learning (student centered); THEY will go for “Learning by Doing” by working in a team and so taking THEIR OWN responsibility. THEY will be guided by a coach who helps THEM for “Learning To Learn” by asking them questions when (s)he is seeing that the token direction is going the wrong way with its ===> Proactive Thinking <===. As the internet doesn’t forget anything, a ===> Proactive Thinking <=== is a MUST! THE word ===> FAILURE <=== is on the wrong place here, sorry! YOU also will NOT see me using the word ===> FAILURE <=== as it is NOT a positive word, BETTER is ===> Learning by Doing <===, check below, please, the reason for WHY:

.

NOT FAILURE-positive words

 Click the above image, please, to access the article.

.

[GM] Possible questions could be: “Are YOU sure that it is the right way?“, “Think twice, please, isn’t there something missing?“… Well, I let YOU do some work ALSO, think on it what else could get used as questions and post them below please, with YOUR initials, thanks.

[MK] Mindy KIM (USA)

[MK] What changes could be made to improve the overall message?

[MK] You made a strong point here, where else could you apply the same idea?

[MK] Who is your audience?

[MK] Could you say the same thing using less words? Would your message be understood?

[DK] Great archived twitter chat on Digital Citizenship (07/05/2015) via @mrkempnz & @BevLadd curated on storify. 

[DK] The Challenges of raising a Digital Native ==> via Devorah Heitner 

[DK] Teaching Digital Citizenship 

.

[ICTPHMS] Patrick Henry Middle School ICT (USA)

Greetings from Patrick Henry Middle School in Sioux Falls, SD. We are 6-8 middle school ICT class! We blog about Digital Citizenship & Internet Safety. Very excited to participate in the collaborative blog! Please look forward to new posts coming soon. You can find us on twitter @ICTPHMS as well.  

The following link  http://mrkirsch.edublogs.org/2013/02/27/internet-safety-post-1-pd-2 is an archived student contributions to our ICT blog. Topic was Internet Safety (8th graders). We are currently finished up our Digital Citizenship Unit.. more to come. Check the screenshot below, please.

.

ICTPHMS Digital CiticenShip Blogs

.

Student Centered Activity via @ICTPHMS. Creating #infographics on Internet Safety. Our class is going to be resubmitting their infographics during our Digital Citizenship Unit. They will have resources provided. The post will come Friday!


Post: 04/28/2015 

The following is a link to my 7th grade student’s Video projects. The objective for the students was for them to create a video describing how “Technology Has Impacted their Lives” in either a positive or negative manner. The students were put in groups in order for them to film and describe their content. I really wanted the students to focus on how technology has become an integral part of everyday life; however can this become bad?? In essence, I wanted students to focus on the content people put on the internet and/or share information they should ==> Privacy. These videos were created by 7th grade students. The following videos depicting students do have permission from parents/guardians to be shown on the blog.


Post: 20/03/15

The following video is one of my students who was interviewed by one of our local TV stations who came I did a story within our my classroom. The story focused on Social Media, but with an emphasis on Digital Citizenship and Internet Safety. I share this; not as I method of “bragging” but demonstrating that teaching students to be aware of what they share online “digital footprint” could and will have a lasting affect on their future. My goal is that I never have to hear about one of my former students being “trapped” because of something they said, posted, and/or shared on social media or the internet.


Post: 04/03/15

Teaching Digital Citizenship through Authentic Practice ==> through the creation of infographics! The following (see link below) are my student(s) created infographics. They created their infographics on a specific topic of Digital Citizenship and Internet Safety and posted it on their edublog “social media platform.” Students are in 8th grade (12-13 year old).

The objective of the unit was ==> Students will create an infographic presenting student researched information on a specific Internet Safety Topic.


Post: 02/06/2015 (Updated) 

Learning about Digital Citizenship through comic strip creations. See an example below, please.

.Pixton-CyberBullying-Example

.

Objective:
The objective of the post is for students to learn about Digital Citizenship through stories.

Main Idea:
The following link is to my 8th grade students edublogs. The focus of this blog post come from Gust MEES. My students are creating comic strips utilizing the online website Pixton. The objective of the post is for students to learn about Digital Citizenship through stories. They are required to have a Digital Citizenship “dilemma” and at the end of their story they must have a positive outcome and/or resolution to the situation. There scenarios can be anything related to Digital Citizenship/Internet Safety. Please check the link below to see a gallery of my students finished Digital Citizenship comics.

The link below is a storify showcasing my students reflections on Digital Citizenship. This was a “lead-up” activity to the comic strips (above).


Post: 16/01/2015

Sample of my 8th grade Blog Prompt for next week. Check Below.. 

Who owns information?

Objective:

After discussion, students will understand basic concepts of intellectual property such as copyright and plagiarism.  Students will understand the purpose of Creative Commons as well as how to find a Creative Commons license for an image on the Internet.

Rationale:

In order to be ethical users of online information, students must understand that they have responsibilities to owners of information and creative works online.  They must understand the basics of those rights and strategies to find out how to properly and ethically use what they find online.

Focus question:

When you buy a song, is it really yours to use how you want?  Are all images online available to use however you want?

Should creators of information, images, songs etc. be paid for their work?

Something to think about was you blog about your reflections of information security and digital citizenship:

Should everything online be available to use for free?  What responsibilities do we have to the creators of information?

Addition from [GM]: some resources about copyright and Creative Commons


Post: 13/01/2015: Teaching Digital Citizenship using Digital Storytelling (comics). 

This semester I wanted to teach Digital Citizenship in a different way with my middle schools students besides just “discussing” the positives & negatives via our blogs. Essentially, I wanted to incorporate our blogs as well as some educational technology platform. After collaboration with Gust M. via twitter I have decided to have my students (8th graders) blog about Digital Citizenship while creating comics (digital storytelling). The platform (many out there) I have decided to use is chogger.com. The following instructions are what I will be giving my students (thought I would share). Thank Gust for the collaboration. 🙂 

  • Students will learn digital literacy and citizenship through combining comics and digital storytelling. In the first 1-2 weeks of the unit, students will research news stories about technology, internet safety, social media, and explore characteristics of comics, while learning about digital storytelling.
  • In weeks 3-4 students will design their digital stories via chogger, determine their characters. Who is the protagonist and antagonist of their story and what their main idea (origin of story) will be. The students will be instructed that their main idea has to incorporate an aspect of Digital Citizenship; such as social media safety, cyberbullying, identity theft, and scams etc.
  • Once each student as finished their digital story they will post this on the blogs where the class as access to them and we can learn about Digital Citizenship in a fun and collaborative atmosphere.  Once the project is completed examples will be provided.

Post: 16/12/2014: Final Digital Citizenship Mr. Kirsch’s Blog Post (student reflections) Prompt below:

“Taking into account all of the articles & scenarios we have discussed within class this semester in ICT III what factor of Digital Citizenship are you going to take with you (think about social media, and future jobs)?

How can you be sure that you will not fall into the “trap” of posting information on the Internet/Social Media that may or may not hurt you in the future??”


Post: 10/12/2014: Teaching Digital Citizenship through Scenarios (Blog Posts). 

Once I decided I was going to teach Digital Citizenship to my 6-8 middle school students it’s was brought to my attention of producing student reflections & insights through creating blog posts on teacher given scenarios. This is a great methodology that allows teachers to see students reflections, insights, as well as allowing students to collaborate with one another. 


Post: 1/12/2014:  How to Use Storify

What is Storify?

Storify is a visual way to tell social media stories using your Tweets, Facebook updates, pics, and other social media information.  Storify is overwhelmingly a neat way to show how a story develops over social media — without you having to take screenshots and insert your own links.

How to Use Storify:

Luckily, it’s easy.

storify by @ICTPHMS.

  1. First, create an account at Storify (you can log in with Twitter or Facebook).
  2. Click the blue “Create a Story” button in the top right hand corner.
  3. Look at the right side of the new screen where the icons of your favorite social media websites reside.
  4. Click on any social media icon (like Twitter), then put in a username for that network you want to search. You’ll see all the recent Tweets from that person/hashtag/search query.
  5. Now, start dragging content from the right hand panel from the social media networks you are searching into the left hand panel where you are telling your story. Add words or titles. You are finished!! A story told in text and pictures via social media updates.

Want an Example?

Here’s one of my classes using storify. It’s a recap of our Digital Citizenship Chats we did on our class blog.


Post: 25/11/2014

Student reflections (8th graders) in Mr. Kirsch’s ICT class on their Social Media Profiles verse their “hard copy” resume. Our class discussed how employers are looking at individuals Social Media profiles (first) before their actual resume. Teaching students to be aware of their online presence aka “Digital Footprints.”  The link is provided below: 


Post: 18/11/2014

Our 8th grade (12-13 years old) ICT students just finished posting their reflections via #blogging on our topic: Social Media: Good or Bad? The objective is teaching students to be aware of what they share on Social Media, but at the same time realizing the benefits of Social Media as well. Check the link below, please:


Post: 12/11/2014

The following link is directly from my class blog: http://mrkirsch.edublogs.org/2014/04/17/ksfy-story-on-cybersecurity . The story conduct by the news-station come from one of my 8th grade ICT classes. Our focus was teaching students CyberSecurity. Please check it out! I do have the rights to the video if anyone would like a copy. 


[GM] Gust MEES (Luxembourg/Europe)

Added on 07/01/2015:

Lots of stuff I learned

Ideas:  using scenarios where the learners (students) play different roles to explain about GOOD and BAD behaviour on Social Media and let THEM blog about it. After the blogging THEY might ALSO create comics in a dialogue style where THEIR thoughts are included, such as I did in my blog post here ===> https://gustmeesen.wordpress.com/2012/02/13/why-ict-security-why-the-need-to-secure-a-computer/ <===.

I created these comics with dialogues with the following online program:

If you have the time, you might later create ALSO a magazine where the learners (students) bring in THEIR comics. Find some propositions of magazines below, please:

.

The above mentioned will engage YOUR learners (students), THEY will have FUN to learn and to create THEIR OWN stuff, it will boost creativity ALSO! When THEY are getting older THEY will remind WHAT THEY created as it was a pleasant learning moment in THEIR life and certainly THEY will be motivated for ===> Life-Long-Learning <=== 😉

Added on 03/12/2014: 

Added on 27/11/2014: Privacy is ALSO IMPORTANT, please check below:


 In The 21st Century, The Word TEACHing Gets Replaced By LEARNING TO LEARN, How To

.

Maslow-Use-Of-Technology-2015

Click the above image, please, to access the article.

.


 Global Digital Citizenship Education (GCE)

UNESCO-Global-Digital-Citizenship-Education-2013

Click the above image, please, to access the article.

.

UNESCO-Global-Digital-Citizenship-Education-2013-2

Click the above image, please, to access the article.

.

Are there differences between Europe and the USA and the rest of the world?

sharing-icon.

Here below WHAT the EU is doing:

.

.

eSkills-EU-EPALE

Click the above image to access the article, please.

.

Here below a good approach from the USA:

. 

Find below, please, WHAT skills the learners will need in the future. Thus as a reminder for getting NEW ideas 😉

.

5 Minds For The Future

.

By analyzing WHAT WE are doing through the “Coaching” and “Collaboration“, YOU will realize that WE could cover ALL the abilities and skills needed from the above mentioned. BTW: the above screenshot is from the book of “Howard GARDNER” ===> Five Minds For The Future <===, a book any teacher should read to understand what is needed for the future. It should be considered as required reading! YOU will understand then ALSO WHY interdisciplinary teaching and learning is a MUST to be on a modern way and to catch up as quick as possible with the growing NEW pedagogy and technical possibilities.

Learn more:

.


How Did This Blog Post Start?

Well, present authors are following each other since long through Social Media Twitter and through a tweet (Twitter Post) it happend, see screenshot below, please.

.

digcit-twitter-collaboration-1

digcit-twitter-collaboration-1

.

Through curation and by using Social Media Twitter the authors met virtually (NEVER met in real world) because THEY are in a common “PLN” (Personal [Professional] Learning Network) and appreciated each other through THEIR posts on Twitter, blogs, skills and competency. THEY found a common point ===> Digital Citizen Ship <=== and want to share THEIR competency with YOU dear readers, students and learners.

Learn more:


THE Authors, The Team

globe-pc[GM]

The authors [GM], [MK], [ICTPHMS]  will comment here THEIR experiences through the adventure of global collaboration which THEY experienced.

[GM] My advice (as I am used to it since ages ===> (2002-2003) <===:

Before starting such a BIG project, YES it is a BIG one as YOU are dealing withdifferent mentalities and cultures, is to set up rules up from the beginning to avoid BIG mistakes and not necessary stress for ALL.

This is called ===> Proactive THINKing <=== BETTER to use it as as YOU could come into situations without an issue when NOT doing it and WHO wants that!?

Concerning ===> Proactive THINKing <===: most people don’t know about WHAT it is, I will explain very shortly: deep thinking on what could happen in case of to avoid it up from the beginning. YOU could ALSO say: thinking of the “Worst case” who could happen and preparing to that it would NOT happen. OR, if YOU are smart, using Psychology for that it will happen (ONLY positive things
)! TIP: read ONLY the bold text to understand it quickly 😉

Check ALSO these links, please, who explain about “International Collaboration”:

The authors are from Europe (Luxembourg) and the USA, please check below:

.

The authors: actually on October 11th, 2014: Gust MEES (Administrator), Mindy KIM (Editor), ICTPHMS (Editor) will be represented by THEIR initials such as:

.

Here below is a little reminder on the How-To WE are using this blog post, please respect it, thank You.

.

Please click this link first before STARTING ===> Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media ===>Collaboration-Working As A Team (Especially On Global) And Connected Through Social Media<=== where YOU will find the necessary information on ===> How To <=== work on OUR global collaboration blog, thanks to respect this.

.


Student Centered Initiatives

programmerman-animated[GM] Well, that’s WHY I was inviting  as THEY know the How-To by using curation and blogging with THEIR students. THEY will explain it to YOU here below 😉 My 8th grade ICT class blog about Internet Safety and Digital Citizenship with one another via edublogs. The goal is to teach the students how to communicate and share information on the Internet and/or Social Media! I post a blog topic for the week and my students have the rest of the week to respond with their thoughts as well as commenting on another’s blog posts as well. Trying to keep them from falling into the trap we see so much – people posting and sharing information they should NOT on the internet. 

[MK] My classroom is a unique blend of students. We focus mainly on helping students develop communication and the belief in their abilities. To do this we have a classroom blog where we showcase our accomplishments, what we are working on, and students come up with conversation topics for our class and parents. Students review the blog and give their opinions. I am there to help them navigate.

Learn more:

.

.Digital CitizenShip

.

Since then my class has taken time to build our writing skills, comprehension skills, and our ability to synthesize information. We are learning about shapes and where they are in nature and around them in everyday life. We will be reviewing these key ideas.

We begin lessons by learning important vocabulary and learning basic knowledge:

.

shapes-discussion-2.

.

.

This is what was added to the anchor chart after learning vocabulary, discussing characteristics of shapes, and looking for objects within the classroom that we use daily to connect to the 2D and 3D shapes. We talked about sides, corners, solid shapes, flat shapes, and started coming up with questions we wanted to answer throughout our shape study. Questions we have:

1). Why do circles have no sides?

2). How many squares make up a box?

.

.

.

.


WHAT Is Already Realized From The Authors For A GOOD Digital CitizenShip Learning?

[ICTPHMS]

TagxedoOnline is a great place to compete for scholarships and it is also a great place to be disqualified from them. Find out how you can unknowingly lose scholarships.

Two Sides of the Coin

The Internet is a great source for finding generous scholarships. Fastweb.com is a popular scholarship vault holding 1.3 million scholarships for students that qualify. It is free. Students register and complete an online interview and scholarship applications will begin arriving soon after that.

Colleges are known for giving the largest scholarships and frequently for all four years of college. And, local organizations give scholarships to students for college—usually for the freshman year only.

These scholarships can be easily lost if students post inappropriate profiles on various sites like

  • Twitter
  • Facebook
  • MySpace

Colleges’ admission counselors are beginning to investigate students considered for scholarships beyond the usual letter of recommendations. They are beginning to Google in student names and see what they have posted on the Internet.

Google Search to Screen Students

In increasing numbers, colleges are using a Google search to screen students. Some check students randomly, some check only if students have been brought to their attention, and others are actively researching students online.

Air-Tight Online Profile

How can students make sure they are squeaky clean online?

  • Do not post anything to your site that would be morally or ethically questionable.
  • Never post personal information such as your address, daily schedule, or phone number.
  • Make your profiles private so only a selected group can view your information.
  • Don’t add “friends” you don’t personally know.
  • Ask friends to remove any photos of you that could be seen as unflattering.
  • Make sure they never use your name when they add you to their site.

.

Our projects and curation: 


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

[GM] I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

.


WHY is Privacy so important?

[GM] Just think on George ORWELL… Phishing and Spear-Phishing To be updated by [GM]…

.

The Future Of Advertising (Cartoon)

Image credit ===>  http://tomfishburne.com/2014/01/internet-of-things.html <===

.

I don’t talk too much about it, BUT check the video below and YOU SHOULD understand


.

.

Related links:

.


Do WE Still Have Privacy Rights In The Digital World!?

1ibdy1vf6wghd-n05dgl-aigainformation1.

According to latest press releases: Based on internal NSA documents, “Der Spiegel” reveals that the spy agency planted backdoors to access computers, hard drives, routers, and other devices from companies such as Cisco, Dell, Western Digital, Seagate, Maxtor and Samsung. 

Check:

Learn more:

[MK] Online perceptions, everyone can “learn” about who you are.

[MK] Future jobs, interactions, and networks are informed about you from your online “profile”.

[MK] Beware what you share, share what you would not mind the whole world knowing.

.

.

.

.

.


How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOOD “Digital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer.

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:

To be updated by [GM]… 

.

Cyber Security Month, NCSAM and Cybercrime, screenshot lost money, visual cybersecurity screenshot + link,

.

.

.

.


A NEVER Ending Story Which WE MUST Be Prepared For, But How!?

sharing-iconTechnology is evolving mostly much more quick as MOST persons can follow and learn about it, so… We will create a “FAQ’s” list, a “Frequently Asked Questions” list together, which I will ask YOU to elaborate below please, thanks in advance.

Team, YOUR collaboration is required, please propose YOUR questions:

.

  • [MK] Mindy KIM (Editor)
    • Q: How will this help my child in school?
      • A: Students gain many academic and social skills from using many methods of demonstrating what they know. In the blog students will be able to capture their ideas, comments, and pictures of what they learned. They will have the ability to reflect on their work and their peers. These are advanced skills they will use beyond the classroom.
    • Q: Can my child do this?
      • A: Yes. Your child will learn step by step. They will utilize help from me and their peers to understand how they can communicate their ideas, ask questions, and comment on what they are learning about. They will learn internet safety, how the internet can be used to learn, and how it applies to them.
    • Q: How can I access the blog?
      • A: I have the password and username set for each student. You log in using the four steps and your child will be able to show you as well. If you have any questions ask your child first and then bring the questions to me for further information.
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…
  • [ICTPHMS]  (Editor)
    • Q:…
      • A:…
    • Q:…
      • A:…
    • Q:…
      • A:…

.

[GM] Together with [MK] I created such a FAQ’s list which YOU can check below, please, to get an idea:

.


How Will WE Handle This Blog Post To Stay Up-To-Date?

sharing-icon[GM] Well, that isn’t THAT difficult as most would think 😉 As the present authors here are ALL using ===> #Curation <===, they update already THEIR curation platform. SO… WHAT more easy then ONLY present below the links to THEIR curation which is permanently updated. Same for the blogs which the authors are maintaining… Check below, please:

.

.

Curation, authors blog posts, explaining curation, blogs


Author’s Portfolio, Curation And Blogs

sharing-icon

.

[GM] Please check below to find out about WHAT the authors realized already:

.

.

[GM] Please check below, please:

.

[MK] Please check below, please:

.

[ICTPHMS] Please check below, please:

.

.

..


.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship. Currently, I have the priviledge of being a member of my school district’s ICT curriculum committee. We are rewriting & updating our ICT curriculum for students 6-8 for the 2015-2016 School Year.

.

You can find me also on:

.

Stay tuned for next blog post(s) 😉

.

 
22 Comments

Posted by on October 11, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, Browsers, BYOD, Coaching, Code PĂ©nal-Articles 509-Luxembourg, Collaboration, Comics, Competency, Connected Educators, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, Digital Citicenship, Digital CitizenShip, Education, Engagement, Europe, European Cyber Security Month, FAQ, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Parents, Passwords, PBL, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Social Engineering, Social Media, Spam, Storify, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Twitter, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Twitter Chat | The Economic Impact Of Cybercrime

Twitter Chat | The Economic Impact Of Cybercrime

.

 

Learning basics of IT-Security and Cyber-Security

.


Twitter Chat | The Economic Impact Of Cybercrime

.

SecChat McAfee

 

On Thursday, September 4th there will be #SecChat who will explore the  The Economic Impact Of Cybercrime and is an hour-long Twitter chat. I got invited through Twitter by 

.

#SecChat

.

After long reflection I decided to create a blog about my advice as I think that it would be very difficult to answer these questions by Tweets. There are TOO MANY links and information, as well as advice to share that in the mass of shared Tweets they would get lost 😉 This allows me then in the Tweet on the Chat to post ONLY one link, the link to this blog, where ALL the necessary information are included and I could concentrate on the other Tweets much more easy!

AND I could ALSO use this blog post for my FREE courses about CyberSecurity!

As a reminder (ALSO for me), here below the blog posts about WHAT would get discussed:

I suggest to read my blog post from a previous Twitter Chat WHERE already a lot was discussed, please:

 

Here, below, is about the #SecChat:

.

#SecChat about

.

So here we go, my questions:

  • Q1: What security risks do SMBs need to consider when starting a business and why?
  • Q2: CyberSecurity is OUR ALL Responsibility! SHOULDN’T the basics of CyberSecurity getting taught in schools up from the early age?
  • Q3: WHY aren’t CyberSecurity professionals, especially CyberSecurity companies present at schools!?
  • Q4: WHAT could get done to lowering Cybercrime?

 


Q1: What security risks do SMBs need to consider when starting a business and why?

programmerman-animatedWell, first of all SMBs don’t have to forget that they deal with employees and that THE weakest link in the security chain is the human!

.

Please check my following blog posts who explain in detail:

.

As nearly everyone is using a smartphone today so there is ALSO a MUST to consider a “BYOD-Policy” (Bring Your Own Device) as the use of smartphones could be a BIG security risk to the SMB’s as MOST employees don’t have any knowledge about the basics of Cyber-Security, even that there smartphones and/or tablets, laptops could be infected with virus, trojans, keylogger

Please read my blog post about BYOD below:

.


Q2: CyberSecurity is OUR ALL Responsibility! SHOULDN’T the basics of CyberSecurity getting taught in schools up from the early age?

My personal answer is a clear YES! My prepared FREE courses below:

 AND Today on September 1st 2014 I found this on the internet which I highly WELCOME! Coding in the curriculum for Five-Year-Old with introduction to CyberSecurity, GREAT!

.

Five-Year-Old learn Coding

 

Click the image to access the article, please.

.

 


Q3: WHY aren’t CyberSecurity professionals, especially CyberSecurity companies present at schools!?

.

.

.

 

.

.

.


Q4: WHAT could get done to lowering Cybercrime?

Well, there are a lot of possibilities, who are MOSTLY related to ===> EDUCATION <=== and while using Social Media. Personally I use very often Twitter to send my advice to my readers. I started ages ago the ===> Friday Security Check Day <===, hashtag is ===> #FSCD <=== as a reminder and to wake up people to get THE reflexes, check below, please.

.

#FSCD

.

I would feel happy if anybody else would join in to the ===> #FSCD <=== to remind people and to give them good advice, and/or to retweet it, thanks.

.

Concerning the ===> Internet Of Things <=== here below my advice. Would be good if discussed…

.

#SecChat #IoT

.

 

More about the Internet Of Things:

 

And for me the MOST IMPORTANT is to teach ===> Cyber Hygiene <=== in schools and in companies! THE user (us ALL) must have basics knowledge of Cyber Security as it is a national security issue and also a priority for the economy!

.

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”

.

Check also what CIO.GOV An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

.

My curation about Cyber-Hygiene

I advocate ===> CyberHygiene <=== and ===> Proactive THINKing <=== since ages and the below action makes me feel happy!

.

CyberHygiene

 

.

.

I started ALSO days ago to amplify the word ===> #CyberHygiene <=== by posting each day about it on Twitter, see below! WELCOME to join in 😉

.

Twitter CyberHygiene-1

Twitter CyberHygiene-2

Twitter CyberHygiene-3

Twitter CyberHygiene-4

.

I am convinced about that such actions SHOULD get used to make the users (us ALL) ===> #WakeUP <=== for a more secure internet!

 

My curation about:

.

EUROPOL 2014

 Click the image to access the website, please.

.

economic-impact-of-cybercrime-report-2014

.

Below some examples of Tweets:

 

Did YOU take care about YOUR today? Are YOUR ? Check ===> https://gustmees.wordpress.com/2012/05/02/get-smart-with-5-minutes-tutorialsit-securitypart-1-browsers/ <===  

.

DYK: can GET used on 2 ways? 1 way to avoid the worst, another way 2 make things happen by knowing habits, behavior 😉

.


How To Use Curation For Learning and Even Teaching

I will give you some visual examples below who show you, so you can have a direct impression of it. No need to talk too much (what most of the teachers and educators do, sorry
), we go straight to the point


.

Curation insight-1

As you can see in the above screenshot, there is some text and also some links linking to similar content
 The above screenshot is taken from ===> http://www.scoop.it/t/securite-pc-et-internet?q=Why+%28And+How%29+Teachers <===

.


The Transcript From The Chat

Coming soon,as soon as available…

.

.

.

..

.


Final word

chat iconA security by 100% doesn’t exist and probably NEVER will exist (I am sure about THAT!) , remind the human behavior
, and ALSO  the bugs in programming code of software!

There is one word which any SMB MUST remember ===> Proactive THINKing <===, anything is changing that quick that nobody could act mostly in time!

Related articles:

Stay informed about what is happening on a daily base about Cyber-Security to get prepared for the UNKNOWN! It’s the letter “I” in “ICT“, which means “Information“! Once NEW information gathered which isn’t known YET by the employees, then comes the letter “C“, which means “Communication“! Inform YOUR employees and ICT-Staff as soon as possible, remember that in the “Security Chain” anyone MUST be strong!

===> THE MOST IMPORTANT when making training is to NOT use TOO MUCH technology words so that the employees might be able to UNDERSTAND! <===

Read my curation:

.


Ideas For A More Secure Internet

Since already 1999 I was publishing online about the risks and Cyber Security and by seeing the unwillingness of people to learn about it I was going for ===> #DeepTHINKing <=== about WHAT could get done, here below my ideas:

.

Some of the above ideas could get made into practice in ===> #MakerSpaces <=== and/or in ===> #Coding places <===, check below, please:

.

I encourage my readers and followers from Twitter to be ===> lurkers <=== on the #SecChat to learn about it, thanks.

.

 

#SecChat

.

Keywords necessary for me to create this blog post: economy, CyberSecurity, CyberCrime, InternetSafety, NAIVETY, Ignorance, data loss, data breaches, reputation, confidence, trust, intellectual property, CyberHygiene, RESPONSIBILITY, Proactive Thinking,

.

 

GUST-AVRIL2014-800px-2.

L’auteur Gust MEES est Formateur andragogique / pĂ©dagogique TIC, membre du “ComitĂ© Conseil” de “Luxembourg Safer Internet” (LuSI), appelĂ© maintenant BEESECURE, partenaire officiel (consultant) du MinistĂšre de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du MinistĂšre du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

 

.

Stay tuned for next blog post(s) 😉

.

.

 
4 Comments

Posted by on August 29, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Connected Educators, Copyright, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Education, eLearning, Encryption, Europe, European Cyber Security Month, FAQ, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Get smart with 5 minutes tutorials, Global, Global Collaboration, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Monitor, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Project Based Learning, Quality Courses, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Tracing, Tutorials, Twitter, Twitter Chat, Updates, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,