RSS

Tag Archives: Basics of Cyber-Security

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

.

programmerman2

.


Let us talk about Hygiene…

Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN’T it?!! Well, there is a reason behind:

WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well…) WE need to take care of them! AND our body? The same: WE need to have the daily reflexes to make for sure that WE don’t expose it to invasions of bacteria, virus, etc. Examples given: brushing teeth, showers, washing the hands after a toilet go, washing the hands before and after a meal, etc. Wearing a Condom when having sex, a necessary protection! Well OUR condom for the technical devices is the Anti-Virus, a MUST for Any-devices!!! Any-Devices, Apple as well?!!! YES!!! Please check the WHY in my Curation below please:

WE are used to these reflexes, aren’t WE?! At least WE should be!! SO, for computers, Laptops, Smartphones, tablets (iPads etc.), IoT devices (Smart-Home), WE should do the same, they costs a LOT of money and expensive stuff should get taken care of!! THE OTHER reason as well is, THAT WE are using the internet with THEM and so WE are meeting OTHER people with OUR technical device (which ever one it is…).

SO, that exactly the same as WHEN WE are meeting (as persons) OTHER people in Real-World: WHEN WE have a flu, WE will infect OTHER persons with it and an epidemic will occur!! WHEN OUR technical devices (which ever one it is…), connected to the internet, are NOT Up-To-date with the latest Updates they are vulnerable to threats (see it as a virus, e.g.) and once infected, WE will infect ALL the OTHERS as well (epidemic…)!!

As WE use these #AnyDevices with #AnyOS on a daily base, WE SHOULD be aware and develop a sense of Responsibility to protect each other! 

ICT RESPONSIBILITYWell, the above written is ONLY an introduction, please read my Blog posts in different languages (EN, FR, DE):

My courses about Cyber-Security were mandatory in Luxembourg (Europe) EDUcation in 2004, learn more here please:

.


.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next blog post(s) 😉

.

.

.

 

 

 
Leave a comment

Posted by on September 10, 2019 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Apple Malware, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Connected Educators, Critical Thinking, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, DDoS, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, European Cyber Security Month, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IoT, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Luxembourg and CyberSecurity, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Often Asked Questions, Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Quality Courses, Reality, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, SID2014, SID2015, SID2016, SID2017, SID2019, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, Tutorials, Twitter, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers and Education Should Start Learning and Teaching Cyber-Security

Why (And How) Teachers Should Start Learning and Teaching Cyber-Security

Evolution of Education: Wordle Logo

.


What should get be taught and learned more in the 21st Century while using ICT?

.

Learning basics of IT-Security and Cyber-Security


.

sid2014-anim-banner

.

Chatting, talkingBeing online since 1998 and giving courses about ICT more than 10 years the practice and my online excursions show me that IT-Security (basics of Cyber-Security) and Internet-Safety are not yet taught enough. Seriously I think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉

In the 21st Century, Education has a BIG responsibility to adapt to the very quick change in the world and to teach the students the knowledge they need and which are required to fulfill the market’s needs!

The market’s needs are ALSO to employ people with the basics of Cyber-Security knowledge as a modern company needs to protect its online reputation and a data loss could be lethal to them, their ruin eventually! SO, the new employees is the students coming out of school, College, High school, Universities; ALL of them need to have the basic knowledge of  Cyber-Security to be competitive in a working market where there is more and more unemployment worldwide…

===> A company would take advantage of a new employee who as already the necessary knowledge of Cyber-Security as the company doesn’t need to train him, which saves it a lot of money! <===


HOW COULD THAT BE IN PRACTICE???

help-books-aj.svgajash01-1
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities from students in 21st Century
  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

When having read the recommended books YOU will understand much better what are the actions to take and certainly there will be also some new ideas from YOU ;) Read also my blog: 21st Century Learning and Teaching: Multilingual Books Recommendations



Nobody Is Perffect! Any OS Is Vulnerable!


 The facts which you should know and who will make you (hopefully) think, even critical think:

First of all, you should know and realize that any “Operating System” (OS) is vulnerable! Follow the links below to learn more:

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

=> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <=

..

Cyberattacks the greatest threat to nations

A MUST READ!!! ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=Cyberattacks+the+greatest+threat+to+nat.

.

And this Infographic YOU should really read!!!

.

hacker-target-victim-statistics-infogrphic-e1367241780834

Image credit: http://www.scoop.it/t/securite-pc-et-internet/?tag=Are+you+a+hacker%27s+target%3F+%5Binfographic%5D

.

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.

.


What can be done to turn this around?

.

teacherSeriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from the early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and Smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!

So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot…) and here are my propositions and advice:

Apart from teaching the basics of Cyber-Security in schools by traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:

.

.

See also below the “Security Incidents By Industry”:

.

Security Incidents by Industry

Image Credit: ComputerWorldUK
.
.

See ALSO Real Time Cyber-Attacks worldwide and THINK!!!

.

Real Time Web Monitor

Check here to go to the website ===> AKAMAI Real Time Web Monitor <===

.

Should I give you more explications? I don’t think so, just go to the website by clicking the above link and try it out! Make some ===> PracTICE  <=== ;)


Malware encounter rate Education April 2013

Check here for more info: ===> SC-MAGAZINE

Check also:

.

FBI-US-Cybersecurity is National Priority

Check here for more info: ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=US-Cybercrime+a+national+security+threat

 .


With Smartphones and tablets WE are ALSO confronted with BYOD!

.

Uneducated employees (Infographic)

Uneducated employees (Infographic)

Click image to go to source and to learn more…

.

I created a detailed blog about “Bring Your Own Device” (BYOD) who explains the Dangers, Risks, Policy, Advantages and ALSO Awareness for Cyber-Security on following address (READ IT!):

Read ALSO my “Curation” about it which will get updated as soon as there are some NEWS:

Hint: Don’t know yet what “Curation” is? Check:

.


Internet-Safety and Cyber-Security, Both a MUST!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01
Internet-Safety ALONE isn’t anymore enough to teach in schools! By having read the above and understood it, YOU should admit that Internet-Safety and basic knowledge of Cyber-Security TOGETHER are a MUST to teach in schools!
.
.

.
PS: Give your brain a kick and start thinking on how yourselves can contribute for a more secure Internet, the solutions are described here in this blog 😉
.
===> We are ALL responsible for a more secure Internet! <===

Some wise words:

With realization of one’s own potential and self-confidence in one’s ability, one can build a better world. Dalai Lama

By developing a sense of concern for others’ well-being, then no matter what others’ attitudes are, you can keep inner peace. Dalai Lama

.

.

.

programmerman-animated===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

 
.

.


 School Network Downtime Due to Malware    

Lots of Schools are using BYOD ===> Cyber-Security is a MUST then!


School Network DownTime Due To Malware 2012

When schools, Colleges and Universities are facing a Downtime due to Malware, so are the courses online NOT available, nor can the learners, students access the necessary educational stuff for their learning, communication and sharing! This is a lost of time ===>
.
Under construction…
.
.

EdTech versus ICT?

.
boxer.
.
.
Tonight on April 29, 2013 there will be a Twitter-Chat about this TOPIC which I will (hopefully) follow as it is at 8 pm, which means at 02:00 am in my country and it’s running 1 hour!
.
It looks like there is a big problem between the IT-department in schools and the Teachers as in some institutions Social Media is forbidden and a lot of restrictions to resources are made, which is certainly NOT a big pleasure for the educators, nor for the learners! AND it doesn’t reflect 21st Century Mentality at ALL!
.
.
.
.
.
.
Check the following link, please:
.
.
Hint: What is a Twitter-Chat?
.

Tips for the IT-Admin

.

Chat iconLots of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

..

.

.

My advice: 

.

I created a very easy to follow plan on how schools could make Cyber-Security (IT-Security) much more easy for the IT-Admin when it would get followed; BUT the IT-Admin SHOULD try to make it a REFLEX on any FRIDAY thus to remind people of the Security-Task! That’s why I created on Twitter the #Hashtag ===> #FSCD <=== which means “Friday Security Check Day“!!!

.

Check it out here ===> https://twitter.com/search?q=%23FSCD&src=typd

And here is How-To:

.

.

.
.
.

Infographics, Videos and Curation as a pedagogical help for Learning

.
Over the years I have collected and curated a lot of Infographics and videos about IT-Security, Cyber-Security, Internet-Safety, Online-safety, eSafety, eCitizen, Digital Citizen, Digital CitizenShip which are a great way for learners, students to learn on a very quick way, you may check the resources here:
.
.
.
.

Sharing the good PracTICE

.

Gust MEES

.

.

Me profiting from when I help other people, it is me who gives something and not the other person???” Such may be your thinking, but…There are new ways in Psychology who are describing this very well such as:

.

.


.
When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.
.
===> SO, don’t forget please, to share this blog with others! WE are ALL responsible for a more secure Internet! <===
.
.

.

 


Final Word


trafficlightgreendan01

If this blog makes you think and your grey cells are getting activated, so that your filter situated between your two ears (your brain) starts to get more activities as usual, than the author is very happy. Thus meaning that my message(s) made move something. Feel free to leave a constructive message…

.

..

.

.

programmerman-animated

.

===> Every day, an estimated 1 million people worldwide are victims of Cybercrime. <===

.

.

As most are using already (and SHOULD) use Social Media Twitter, here are the BEST Hashtags to stay informed about Cyber-Security:

#CyberSecurity #Security #InfoSec #eCitizen #digcit #DigitalCitizen #InternetSafety

.

When #Teaching Digital Literacy don’t forget 2 integrate ALSO #Learning basics of #CyberSecurity ==> BOTH are a MUST in #21stC in #Education

Who to follow on Twitter for Cyber-Security? Here is my selection of BEST publications by awarded contributors:
.
 
21st Century Education: The MOST IMPORTANT is an Education about Critical-Thinking and Proactive-Thinking, check below to learn more:
.
 
.

..

.


FeedBack Poll

.

Coming soon… in preparation…

.


..

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.

.

.

.

 
12 Comments

Posted by on December 30, 2012 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, Environment, European Cyber Security Month, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, HowTo, Ideas for a more secure Internet, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), PLN, PracTICE, Proactive Thinking, Project Based Learning, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Student Centred, Students 21st Century Survival Guide, Sustainability, Tutorials, Twitter Chat, Visual IT-Security

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,