RSS

Tag Archives: cyber-weapon

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

CyberSecurity: I DON’T accept WHY people DON’T understand to apply Updates on THEIR computers & Smartphones as it is about Responsibility AND Cyber-Hygiene

.

programmerman2

.


Let us talk about Hygiene…

Strange, I make an introduction about Hygiene in an Cyber-Security Blog, ISN’T it?!! Well, there is a reason behind:

WHEN WE use a computer, Smartphone and/or any OTHER technical device (such as cars as well…) WE need to take care of them! AND our body? The same: WE need to have the daily reflexes to make for sure that WE don’t expose it to invasions of bacteria, virus, etc. Examples given: brushing teeth, showers, washing the hands after a toilet go, washing the hands before and after a meal, etc. Wearing a Condom when having sex, a necessary protection! Well OUR condom for the technical devices is the Anti-Virus, a MUST for Any-devices!!! Any-Devices, Apple as well?!!! YES!!! Please check the WHY in my Curation below please:

WE are used to these reflexes, aren’t WE?! At least WE should be!! SO, for computers, Laptops, Smartphones, tablets (iPads etc.), IoT devices (Smart-Home), WE should do the same, they costs a LOT of money and expensive stuff should get taken care of!! THE OTHER reason as well is, THAT WE are using the internet with THEM and so WE are meeting OTHER people with OUR technical device (which ever one it is…).

SO, that exactly the same as WHEN WE are meeting (as persons) OTHER people in Real-World: WHEN WE have a flu, WE will infect OTHER persons with it and an epidemic will occur!! WHEN OUR technical devices (which ever one it is…), connected to the internet, are NOT Up-To-date with the latest Updates they are vulnerable to threats (see it as a virus, e.g.) and once infected, WE will infect ALL the OTHERS as well (epidemic…)!!

As WE use these #AnyDevices with #AnyOS on a daily base, WE SHOULD be aware and develop a sense of Responsibility to protect each other! 

ICT RESPONSIBILITYWell, the above written is ONLY an introduction, please read my Blog posts in different languages (EN, FR, DE):

My courses about Cyber-Security were mandatory in Luxembourg (Europe) EDUcation in 2004, learn more here please:

.


.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next blog post(s) 😉

.

.

.

 

 

 
Leave a comment

Posted by on September 10, 2019 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Apple Malware, Better Learning, Better Learning about ICT, Better Teaching, Bring Your Own Device, Bring Your Own Device (BYOD), Browser Vulnerabilities, BYOD, Competency, Connected Educators, Critical Thinking, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, DDoS, Digital CitizenShip, Digital Footprint, Digital Intelligence, Digital Lëtzebuerg, Digital Luxembourg, Digital4EDUcation, DQ, Education, Education 4.0, eLeadership, eLearning, Encryption, eSkills, Ethical Mind, Europe, European Cyber Security Month, For a Better World, Free courses, Future Work Skills, Get smart with 5 minutes tutorials, Holistic view of EDUcation in the future, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Internet Of Things, IoT, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Leadership, Learning basics of Cyber-Security-Practice, Learning By Doing, Luxembourg, Luxembourg and CyberSecurity, Mobile Security, Modern EDU, Naivety, National Cyber Security Awareness Month, Often Asked Questions, Phishing, PKM, PLN, PracTICE, Privacy, Proactive Thinking, Professional Development, Professional EDUcators TEACHers, Quality Courses, Reality, Reflecting, Reflexes, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, SID2014, SID2015, SID2016, SID2017, SID2019, Skills, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Synthesizing Mind, Teacherpreneurs, Technology Integration, Third Party Applications, Tutorials, Twitter, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

Visual IT-Security:Your Computer As A Possible Cyber-Weapon!?

..

Learning IT-Security

Learning IT-Security,e-Learning,m-Learning,Bring Your Own Device, BYOD,Cyberwar,Cyber-Warfare,Cyber-Weapon,Cyber-Crime


MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUET...

MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET

.

For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. Why a computer could become a possible Cyber-Weapon who is attacking web sites and perhaps also your Government’s web-sites!

.

.

.

.

Check the map below to see in real time DDoS attacks, attacks made with infected computers!

.

denial-of-service attacks in real time

Click image map to see in real time the DDoS attacks!

.

Check ALSO my blog below, who shows you more interactive maps:

.

 

..

.

In this ctraffic light greenourse you will learn:

          • Why there is a need to protect your computer.
          • Why a computer is in danger to get a virus, trojan, and other malware infections.
          • Why a computer could become a possible Cyber‐Weapon who is attacking web‐sites and perhaps also your Government’s web‐sites!

Note: by reading ONLY the bold text you will get the most important information, in case that you would like to read it on a fast way because of lack of time…

.

===> This blog contains a lot of information, so I advice you to bookmark and read it carefully as on your convenience, take your time please. <===

Keywords for learners and especially for teachers and educators who want to use this free course to build their own course

community, responsibility, IT-Security, more secure Internet, habits, sharing, characters, good habits, bad habits, less stress, be organized, organization, more confidence in Internet, no loss of money, no loss of privacy, no loss of digital identity, digital foot print, good reputation, e-Citizen, Digital Citizen…

.

 

 

.

English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! French (Français): Danger connu est danger vaincu !

.


Introduction to Visual IT-Security

But let us start first with some funny videos who will explain to you also about IT-Security in a visual way…

Video 1: “Weird Al” Yankovic – Virus Alert

.

.


Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.

.

===> Nobody is perfect! <===

Video MALWARE: What is Botnet?.

Check the video below who explains very well about all the malware, you will understand then WHY the need to secure your computer.

.

.

Knowing NOW what is possible and how computers could get misused for Cyberattacks, YOU should realize that it is NOT anymore fiction, but reality!!!

Read ALSO what Eugene KASPERSKY says as on 01 May 2014: “In cyberspace there is almost no distance from espionage to cyberweapons because it is very easy to upgrade one to the other at the push of a button,” warned Kaspersky.” Read the full article below, please:

 

.


Video Beyond Today: Mikko Hypponen – Zeitgeist 2012

.


Critical Thinking

Some questions to wake you up to critical-thinking, if you permit 😉

Explaining the dangers of infected computers and the dangers to your Government also:

chat icon, speeching people

        • Would you allow a person  entry with contagious disease into your home or institution? An epidemic would be the result!
          • An infected computer is same ===> epidemic danger!
        • You know that when driving your car that you could hit a person by accident!? Do you realize that this could happen also virtually (in Internet) with your computer!? This person’s computer would get also infected and this person would need to repair its computer which would cost money as most people don’t know how to get rid of an infection! Are you aware that YOU are responsible for that!?
  • Are you a good patriot? Would you help to defend your country and Government against attacks? So do so also on Internet! Learn the basics of IT-Security!
  • Do you know that Cyber-Criminals earn more money than others with Drugs?
  • Do YOU know that Cyber-Criminals are better organized as Police and FBI and…?
.

Some important data who should wake you up!

.

Image source

.

[Start] Text from AllThingsDigital (JULY 4, 2012 AT 7:24 AM PT)

If you needed any further evidence about the possibility of an unexpected blowback from the creation of the Stuxnet worm and other cyber-weapons like it, the U.S. Department of Homeland Security has something for your night table, bound to keep you awake.

Earlier this week, it released a 17-page report, embedded below, detailing the activities of the Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT for short. [End]

.

Video: U.S. is under “Cyber Attack”

.

.
Related links:
.
.

Flame Proves Cyber Warfare is ACTIVE

A MUST READ:
.
Flame proves cyberwarfare is active
.

Video E: VOLUTION

Computer crime is getting worse?

  • What three indicators mentioned in the video indicate to you that computer crime is getting worse?
  • What does it mean when someone says “a virus has evolved”??

Check the video to find out…

.
.

Video A Quick Guide To Scary Stuff on the Internet (Part 3)

After watching this video you will be able to answer the following five questions:



.

Ever thought about that your smartphone is also a computer with phone capabilities?

.
.
.
See screenshot below who shows you the Quarter Report 2012 from McAfee and download the PDF document with full report by clicking the image…
.
McAfee Threats Report - First Quarter 2012
.
.

SUMMARY

So, now by having seen the videos above and by having read my questions, did you get more critical-thinking now and do you realize the dangers? You should be aware now a bit. Let us continue now with a bit more explications:

.

community logo

Once your computer is infected because you don’t use an antivirus and a firewall, because you didn’t make the updates of your Operating System, called also “OS” (Windows, Mac, Linux and…), because you didn’t update yourThird Party Applications” and… you will also infect other person’s computer and this NOT ONLY over Internet; see Dangers of Storage Devices.

It could be also possible that your infected computer (even a Mac!) would become part of a so called “Botnet“, a ring of infected computers who will get used to make attacks on other companies and also on Government web sites, even getting used for a Cyber-War, thus meaning:

  • The infrastructure & energy supply of a country (electricity, gaz …) can be interrupted or disrupted through targeted DDoS attacks, as well the communication channels (Radio, TV, Internet and phone connexions …)

.

Additional Questions on Cyber Weapons & Government Attacks

help books logo

          • This sounds strange to me, never heard about Government attacks!?
          • How can it happen that my computer helps attacking Government web sites?
          • I am ONLY connected to Internet, I don’t see how this is possible that my computer is a so called “Cyber-Weapon“, this sounds weird to me!?
          • I have a Mac computer, I don’t worry, I am not concerned! BIG LOL for that, check here http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security and wake up please!

.

As I have multicultural and international readers, so I will present to you videos in different languages, make your choice. You will see also some commercial videos and you will understand ALSO how difficult it is for an IT-Administrator to manage those risks and ALSO the costs of such protections and hopefully you will understand now the IMPORTANCE of IT-Security!


Video DDoS Angriff (Theorie) – German

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


Video Fight Cybercrime with a Fully Integrated Attack Mitigation Plan – English

What is a DDoS attack & how can it be mitigated? Check video to find out…

.


.Video INTERNET: La cyber-criminalité –  French

Video in French.

cyber-crime,cyber-criminalité,Anonymous,l’essentiel,cyber-criminalité expliquée en vidéo,

Check video by clicking the link here or click image: L’Essentiel (LU)

..


IT SECURITY Expert Reports

.

Curation about IT-Security, Cyberwar, Cyber-Warfare,Internet-Safety,Online-Safety,Cyber-Security

itsecurity,cybersecurity,cyberwar,cyberwarfare,curation,internetsafety,onlinesafety,infosec,

.

.
The Costs Of Cybercrime

 

The Costs Of Cyber-Crime: click image
.

Definition of IT Security in simple words

.

computer logoIT-Security means proactive thinking, acting before it happens! Knowing the dangers of Internet and being prepared for them!

.

.

IT-Security is:

  1. Critical-Thinking
  2. Think everytime on worst-case who could happen
  3. Forewarned is Forearmed, stay informed!
.

Additional Readings

.

Attention logoCyber-Attacks on Governments

Read also the news about already known Cyber-Attacks on Government web sites (will get updated as soon as there are new attacks):

.

Cyber-Crime


IT Security, Twitter, & the Use of Hashtags (#)

Twitter logo

As you might have remarked already I use some strange characters in this tutorial such as “#“, that’s a so called “Hashtag” and used on Social Medias such as Twitter and also on Google+.

What are Hashtags?

.
.

Follow me

Gust MEES on Twitter and best Hashtags on Twitter for following news about IT-Security.


share with different persons

.

Other IT‐Security People to Follow on Twitter, my suggestions are:

Special mention to @kevin_corbett https://twitter.com/#!/kevin_corbett who gave me valuable and professional advice about making this blog better for Accessibility and Search Engine Optimization (SEO), as well on Style, thanks a lot Kevin, much appreciated. That’s what I call “Social Media”, one learns from each other 😉 Check out also Kevin’s web site http://kevincorbett.com/, interesting…


Freeware & Commercial Protection Software

gearing

Check here to find best freeware and commercial protection software:

.
.
.

Final Word

===> Share best practices of IT-Security, Internet-Safety, Online-Safety over Social Medias! Stand up and help to make Internet a more secure place, thanks in advance! <===

Best Hashtag for Social Media is #SoMe.

I hope that this small tutorial (course) will have opened your eyes and also your critical-thinking and made you ready to use NOW protection on your computer. As longer you wait, as longer it will take to learn IT-Security! You will need it anyway one day because of Bring Your Own Device (BYOD), so go for it now!

As some of you readers would not know what “Bring Your Own Device” (BYOD) would mean, it is a new way for schools and also for companies who allows people to bring their own computer, smartphone, tablets, and… to the school and/or working place. This is money saving for schools and work places and also more freedom for the owners of the so called “BYOD” as they can install what they want and work (and learn) with their own programs, but… Watch the video please…

.

..

Image showing community

BTW: Did YOU remark that I highlighted the word you? Why? We are living in a society where the word COMMUNITY doesn’t have anymore that IMPORTANCE as it should have! We use the words SOCIAL, SOCIAL MEDIAS… Critical-thinking, sorry… Think on it please, thanks in advance to do so, would be much appreciated and would help to build up a more secure Internet!

PS: Don’t see the above as condescending please, as it isn’t. It’s a reminder to help make the Internet Community stronger, thanks!

.

.

.

blue man pointing to an important textRecommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security


as on Wednesday 06, 2012 @WebrootRescue We’re very happy to be recommended and used by @knolinfos, an #ITsecurity expert & instructor! Our story: http://bit.ly/GRkX6l

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


.

Stay tuned for next courses and tutorials 😉

.

 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,