RSS

Tag Archives: Luxembourg Laws

How Can Education Help To Lower Cybercrime?

How Can Education Help To Lower Cybercrime?

.
Evolution of Education: Wordle Logo
.


.

SID15_Banner_anim

.

How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOODDigital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!

.

« Good habits formed at youth make all the difference. » Aristotle

.

.

.

We are ALL responsible for the internet

 Image credit ===> http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html <===

Here below the main links about WHAT to learn about:

TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!

The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!

 

Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall, 

Read below please, for more detailed instructions and information, thanks.

.


THE Facts

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.


Awareness And Naivety, WHAT!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:

.

.

.

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

======> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <======

.

Cyberattacks the greatest threat to nations

A MUST READ:

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:


How To Protect To NOT Become A Zombie!?

programmerman-animatedAs already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:

.

.


TOR And Anonymity!???

.

 

TOR-2014-cybercrime

 

.

Learn more:

It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet! 

.


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

 


WHAT Actions Could Get Taken WHO Are Student Centered?

sharing-iconWHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:

.


 

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

.

 

 
7 Comments

Posted by on November 4, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Competency, Connected Educators, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Europe, European Cyber Security Month, Free courses, FREE-courses, Future Work Skills, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Jail, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Updates, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Not ONLY rights but also responsibility!?

Not ONLY rights but also responsibility!?


Learning IT-Security

.

Possible instructions for educators on how they can work together with the learners. Knowing the tools for 21st Century Learning is primordial to give quality courses. One very important knowledge who needs to get taught is “Critical Thinking“; it brings out also new ideas and the courage to become an engager and helps to try to build a better world in both worlds: “Real World” and “Virtual World” (Internet)!

.

Teaching “Critical Thinking” to your students and learners is a MUST for a world who is changing very fast (sometimes too fast…) so that a lot of people can’t follow anymore… But by knowing “Critical Thinking” people would be catching up more quick, so very important!!!

.

===> Critical Thinking is a catalyst when well used together with Social Medias! <===

.

.
When talking about Critical-Thinking then automatically we should talk also about responsibilities! Find out more below…
.

.

sid2014-anim-banner

.

What should get be taught and learned more in 21st Century while using ICT?

.

Chatting, talkingBeing online since 1998 and giving courses about ICT more than 10 years the practice and my online excursions show me that IT-Security and Internet-Safety are not yet taught enough. Seriously I think there is a need to talk and teach about existing laws in different countries and show the learners that they have not ONLY rights but also responsibilities; teachers the same for YOU 😉

.

HOW COULD THAT BE IN PRACTICE???

help-books-aj.svgajash01-1
First of all I recommend you to read some books to understand, I recommend books from Howard GARDNER and Daniel GOLEMAN.
.
.
  • 5 Minds For The Future (Howard GARDNER)  to understand what the world needs for abilities fom students in 21st Century
  • The Disciplinary Mind: the mastery of major schools of thought, including science, mathematics, and history, and of at least one professional craft.
  • The Synthesizing Mind: the ability to integrate ideas from different disciplines or spheres into a coherent whole and to communicate that integration to others.
  • The Creating Mind: the capacity to uncover and clarify new problems, questions and phenomena.
  • The Respectful Mind: awareness of and appreciation for differences among human beings and human groups.
  • The Ethical Mind: fulfillment of one’s responsibilities as a worker and as a citizen.
.

When having read the recommended books YOU will understand much better what are the actions to take and certainly there will be also some new ideas from YOU 😉

.


So, what does this show us!?

Attention Logo

        1. There isn’t enough information from Education (or too theoretical) around about how to get protected
          • Why? Perhaps teachers and educators are Mac users and not prepared for such a serious task!? Lack of REAL knowledge about IT-Security!
          • Lack of IT-Security knowledge in general, so how can one be able then to bring over the right knowledge!?
          • Learners don’t feel it necessary, why? Bad teaching, sorry! Not ONLY a society problem as some say! A teacher doesn’t give up till he finds the right way that it will get understood even that he must learn himself some new stuff to make it more interesting for the learners!
        2. There isn’t enough information from Government to adults and seniors around about how to get protected (or too theoretical)
        3. When courses are giving from Education and Government they are too theoretical and don’t give the necessary practice to learners for protecting their computers
        4. IT-Security can ONLY have best results when done with practical workshops!
          • ===> Confucius, Tell me, and I will forget. Show me, and I may remember. Involve me, and I will understand. – Confucius, 450 B.C.
        • Education and Government are publishing with 21st Century Technology but still doing it with 20th Century knowledge! They have to improve and to employ people with the necessary practice knowledge and skills!
        • There is a need to prepare learners more to the dangers of Internet! Especially against Scam!
        • Learners and adults need to know the laws in Internet!
        • There is a need to create so called “IT Security Help Points (Places)” where people with practice knowledge and skills are available to give advice on the place and wherevisitors can bring their computers to check for vulnerabilities and infections, as I did as a volunteer, but these people should get payed for it!
      1. Ideas for a more secure Internet (in English)
      2. IT-Security Scouts (in English)

Critical Thinking Questions and memes

Questions to make everybody awake for Critical-Thinking and responsibilities as also laws and hopefully to see one day practical courses and workshops:

.

question mark logo

        • What do YOU think about people who are walking door by door and trying if a door is open and enter into the house!? And worth, who are looking for other holes were they can enter into the house!?
          • Port Scanning and scanning web sites where YOU are not the owner of it are not allowed and punished by laws!
        • Imagine YOU would have an exhibition of your talented pictures, drawings, books, texts, sculptures and… in a big exhibition place (Internet); someone is visiting this exhibition and takes your talented work away with him!? Of course without paying YOU for this nor to tell YOU that he did so and that later on this person would make his own exhibition somewhere else pretending that it is his own work and even earn money with it!? What would be YOUR reaction!?  Do YOU know that this is what is called “Copyright“!?
        • Do YOU educate YOUR children and learners at home about bad and good? Do YOU educate them not to steal and not to break in other houses? Do YOU explain YOUR children and learners the laws and also the terms “prison” + “jail”? In virtual life (Internet) there are also laws and rules, explain them also to YOUR children and learners!
        • Do YOU educate YOUR children and learners to become good citizen? Do the same in #virtuallife (Internet) so that they will become good eCitizen, called also Digital Citizen!
        • Someone who doesn’t have the knowledge to use his computer (the vehicle in virtual life/Internet) is a potential danger for the COMMUNITY!!!
        • Protect YOUR children and learners by telling them the laws in Internet to avoid that they will become Cyber-criminals! Show them some practical examples about arrested people who thought that they would be invisible on Internet such as:
        • Do YOU know who is profiting from such a lack of knowledge and naivety!? Cyber-crime is, they use YOUR computer to earn money, funny isn’t it!??? Wake up!!!
.

Learning and teaching how-to stay secure and get protected

.
I suggest to YOU to follow my FREE courses here:
.
programmer man (color)
.
.
.
.
.
Educate parents and kids to become good e-Citizens, Digital Citizens; here some help:
.

Laws in different countries, mostly in Europe

.

balance

.

The French version http://gustmeesfr.wordpress.com/ (en français) includes already a big collection of francophone country laws, such as from:

.

luxembourg flag Luxembourg

.

Liens connexes :


French Flag icon France

.

.

Liens connexes :

Vos contributions sont les bienvenues
.

Canada flag icon Canada

.

.

Belgium


Ceci étant les lois que je connais, si vous en connaissiez d’autres lois de pays francophones , veuillez utiliser les commentaires pour me les communiquer et je les intègrerais afin de faire de ce blog un document collaboratif francophone, merci d’avance.

.

Germany flag icon Germany

.
.

Copyright Laws in certain countries

.
.

Your Rights Online in Europe

.

eYouGuide European Commission

Click image to access the web site!


THE OBJECT of Teaching…

.

.

The object of teaching a child is to enable him to get along without a teacher.

Elbert Hubbard (1856-1915) American author, editor and printer.


Keywords: 


globe-pc

.

21st century learning and teaching, narration and interaction, real and imaginary level, learning on an vivid and understandable way, learning with videos on a visual way, passion, cross-subject education, cross-border thinking, interconnectedness of our global world, different media and disciplines, emotional and motivating effects, motivation, inspiration, solving the problems of the future by critical thinking…

.

.

The main keywords concerning this course:

eCitizen, digital Citizen, respect, laws, community, responsibilities, rights, real world, virtual world, real life, virtual life, awareness, education, eLearning, mLearning, BYOD, IT-Security, Internet-Safety, Online-Safety, digital reputation, prison, jail, society, 

.
.

.

blueman20401Recommendations from the BIG Players on #itsecurity #cybersecurity #Internetsafety #privacy #Onlinesafety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
.
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.

Stay tuned for next courses and tutorials 😉

.


.
GUST-AVRIL2014-800px-2Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness andSecurityEnhancementStructure)…

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).


 

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,