RSS

Tag Archives: Web Of Trust

SID2016: Safer Internet Day 2016-Participation

SID2016: Safer Internet Day 2016-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2016 – Save the date!

.

SID16-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2016 will be celebrated on Tuesday 09 February 2016, with the strapline of ===> “Play your part for a better internet” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2016 starts to take shape.

.

SID2016-Poster

.

 

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2016

programmerman-animatedWHAT is special this year with my participation on SID2016

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2016 in Luxembourg/Europe.

.

BEESECURE-SID-Gust MEES-18-01-2016

.Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2016 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2016 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
Leave a comment

Posted by on January 18, 2016 in "Dirty Dozen Countries" with SPAM, 21st Century Skills, 21st-Century-Teaching-and-Learning, Adaptive Learning, Adult Learning, Advisory Board, Analyzing, Andragogy, Annotum-Theme, Apple Malware, Apps, Articles with co-authors, Autodidact, Awareness, Backdoors, BEE CREATIVE, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Collaboration, Competency, Concept, Connected Educators, Creating Mind, Creativity, Critical Thinking, Critical Thinking-a need!, Criticism, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-Security Twitter Experts, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, data breaches, Data-Breaches, Data-Breaches in Education, DDoS, Design Learning, Device Theft, Digital CitizenShip, Digital Footprint, Education, Education 4.0, eLeadership, eLearning, Encryption, Engagement, eSkills, Ethical Mind, Europe, European Cyber Security Month, Facebook, FAQ, Feedback, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, How To stay organized, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, Interviews, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Key Instructors, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning By Doing, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Motivation, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, PBL, PC Cleaning, PC Maintenance, Personal Learning Network (PLN), Personal profit, Phishing, PKM, PLN, Potentially Unwanted Programs, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Project Based Learning, PUPs, Quality Courses, Reality, Reflecting, Respectful Mind, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Self-directed Learning, Seniors, SID2016, Skills, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Synthesizing Mind, Team-Teaching, Technology Integration, Third Party Applications, Tracing, TU-DRESDEN, Twitter, Twitter Chat, Understanding the internet, Updates, Virtual Savant Child, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, WiFi, WordPress

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2015: Safer Internet Day 2015-Participation

SID2015: Safer Internet Day 2015-Participation

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html

.


Safer Internet Day 2015 – Save the date!

.

 

.SID15_Banner_anim

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world.

Safer Internet Day 2015 will be celebrated on Tuesday 10 February 2015, with the strapline, once again, of ===> “Let’s create a better internet together” <=== following the success of last year’s campaign.

This website showcases some of the exciting activities and events that took place to celebrate the day in 2014. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You‘ section to explore news from the many countries and institutions involved. Visit the ‘SID Gallery‘ to find great resources from across the Insafe network and beyond to help you teach eSafety all year through.

For further information, read the summary or the full public report on Safer Internet Day 2014 activities and successes.

Keep checking back for the latest news as the SID 2015 starts to take shape.

.

SID2015-Poster

 Click the above image to access the article, please.

.

Check the video below, please, who explains about it.

.

.

.


 

 

Learning IT-Security

.

My participation for the SID2015

programmerman-animatedWHAT is special this year with my participation on SID2015

I created a ===> #GlobalCollaboration #blog <=== from  (my pseudo on twitter) & @ICTPHMS  for  about . The authors are from Luxembourg/Europe (me), one female teacher from the USA and a male teacher from the USA WHO are using my blog post to learn together and sharing THEIR practice with YOU dear readers.

Well, there is a lot of different views about ===> Digital CitizenShip <=== WE will explore WHAT could be THE BEST way to teach and to learn about Digital CitizenShip (hashtag on Twitter is #digcit).

Here below the links of OUR blog post:

How does it come that I post Global-Collaboration blog posts? Well, once the #ProfessionalDevelopment is Upto-Date, one does understand THAT learning in a team brings out a win-win situation and that a generation exchange is benefit for all of the participants as anyone learns from each other. BTW: here below other Global-Collaboration blogs with teaching persons from Australia, USA, France, Luxembourg (me):

.

My publications in the local press (Luxembourg/Europe) and interviews:

.

This year I participate ALSO with blogs in three languages, in English, German and French.

.

I participate on #SID2015 in Luxembourg/Europe.

.

SID2015-BEESECURE

 

Click the image above, please, to access the article.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2015 with my FREE courses here:

My English contributions:

.

My German contributions:

.

My French contributions:

.

and also with my curation here:

.


Motivation To Work Together, Give It A Try

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2015 on their blogs and/or websites :)

Where can I get the banners?

 

People who are on Twitter may use the hashtag #SID2015 AND #Up2Us to promote that Event, thanks for Helping to make the Internet a more secure place!

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Dan KIRSCH

.

The author Dan KIRSCH teaches courses in Information/Communications & Technology (ICT) and Career/Technical Education (CTE) for students in grades 6-8 at Patrick Henry Middle School in South Dakota, USA.  Students in his classes focus on Social Media, Educational Technology, and most importantly Digital Citizenship.

.

You can find me also on:

.
.
Stay tuned for next blog post(s) 😉

.

 
4 Comments

Posted by on January 6, 2015 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Apps Hacked, Awareness, Backdoors, Better Learning, Better Learning about ICT, Better Teaching, Blogs, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Collaboration, Competency, Connected Educators, Critical Thinking, Critical Thinking-a need!, Culture, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Encryption, Engagement, Europe, Facebook, Free courses, FREE-courses, FREE-Online-Scan-for-Security, Future Work Skills, Geo-Tagging, Get smart with 5 minutes tutorials, Global, Global Collaboration, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Internet Of Things, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learn with videos, Learning about Social Medias, Learning about Twitter, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, Not ONLY rights but also responsibilities, Parents, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, SID2015, Skills, Smart TV's, Social Engineering, Social Media, Spam, Students 21st Century Survival Guide, Technology Integration, Tracing, Tutorials, Twitter, Understanding the internet, Visual IT-Security, Vulnerabilities, Weakest Link in the Security-Chain, Wearables, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How To Teach Kids Up From The Early Age About Cyber Security And Digital CitizenShip

How To Teach Kids Up From The Early Age About Cyber Security And Digital CitizenShip

.

We are ALL responsible for the internet

Image credit: http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html


.

SID15_Banner_anim

.

First Steps When Kids Go Online

programmerman-animatedThe first steps before the kids go online are to protect the computer and Smartphone(s) at its BEST as possible to make sure that a BAD click will NOT become a catastrophe! Second step is to talk to the kids about the dangers of the internet and related with the use of the computer and the tablets, Smartphones and about the dangers of Social Media.

.

French (Français): Danger connu est danger vaincu ! Mieux vaut prévoir que valoir ! Un enfant averti en vaut deux. English: Forewarned is Forearmed! Deutsch (German): Gefahr erkannt is Gefahr gebannt! Vorsicht heisst die Mutter der Porzellankiste!  

« Good habits formed at youth make all the difference. » Aristotle

.


How To Protect The Home Network AND The Computers In This Network!?

YES, YOU have read it correctly, I mentioned “Network”. WHY!? Because just letting everybody owning ONLY his (her) own device at home wouldn’t make sense, BETTER is to connect ALL the devices (Smartphones, tablets…) together in a Network where YOU could share even together your files, photos, videos… AND this through a secured Network. Everybody will get his OWN “User Account” where one “User Account” will be the “Administrator Account“, the parents account, who will have 100% access on the main computer. ALL the others will have an “User Account” with restricted access. Check out below on the How-To create “User Accounts”.

.Windows User Accounts

 Click the above image to view the video on the How-To, please.

 

Learn more:

.

Windows sharing over network

 Click the above image to access the articles, please.

.

YOU may ALSO change the Wi-Fi Password 2-3 times a week on YOUR router so that YOUR kids get ONLY access after THEY made certain tasks which YOU told THEM to achieve 😉 Thus meaning, YOU handle over the NEW Password ONLY when those tasks were achieved!

Change your Router’s Pass Word!

help-books-aj.svgajash01-1

Cybercriminals may also use your Router (without that you know it…) when you haven’t changed the original settings! Text from Internet / Network Security

.

===> The first step in securing your wireless network is the same as the first step for just about everything else in computers and computer networking — always change the defaults. Any attacker can find out what the default username and password is for a given program or device in just a few minutes. <===

 

SO, NOW YOU got a protected Network and the family members are in a technical secured home environment, what else to do!?

For whatever device (computer, tablet, Smartphone…) and/or OS (Operating System/Mac, Linux, Windows) YOUR family members own, YOU MUST install an antivirus on them. I recommend to use an “Internet Security Suite” which combines antivirus, firewall, antispyware and… Read more below what else to do…

Check the test results below, please:

.


Learn in one week how to get Best protection-The Practice

.

programmerman-animatedI will divide the tasks through a whole week, so it will be very easy for you to find the necessary time to achieve them, those who have the necessary time can, of course, achieve more tasks…

.

.

Day of the Week Web Address of Blog  Task  Necessary time
Monday Installing WOT + McAfee SiteAdvisor for knowing which websites are trustful and which ones are malicious!
“WOT” ALONE isn’t enough! My experience over years 😉
Windows + Mac5 minutes per program ONLY!
Tuesday Check if your browsers and its plugins are updated! Why should I?

Windows + Mac

5 minutes per browser ONLY!

Wednesday

 

Use BitDefender QuickScan and scan your computer! Find out if your computer is clean. It only takes a few seconds.Install Secunia Personal Software Inspector, which is checking and automating updates of Third Party Programs.

Windows

Few minutes ONLY for both programs!

Thursday Install Security Score which helps you to know if you made ALL the necessary updates…

Windows

5 minutes ONLY!

Friday Check any Friday if you got the latest updates! 10-15 minutes ONLY!
Saturday It’s Disk Encryption time: you need to install this software only once, so it’s ONLY a one time action!

Install an Encryption Software, I suggest the OpenSource Tool

 

Windows + Mac + LinuxSeveral hours…

.


.Sunday: Use the Sunday for a relax check if everything is OK! It takes ONLY 5 minutes. Use the “Security Score” Software to check if everything is OK! 5 minutes ONLY!

.

As you can see in the table “Necessary Time”, most actions need ONLY 5-10 minutes! Eaaaaaaaasy to follow and to use, what are you waiting for!? 😉

.

For those who have the necessary time: I suggest to you to install first the FREE program “Security Score” (for WINDOWS ONLY) and start to check after your Tuesday-Task and after any days task to see the evolution of your security score! This will probably make you more confident and you certainly will try to reach a better “Security Score”, this for your motivation… Try it out:

.

Encryption-SecurityScore-before-after

.


Let Us ALSO Protect OUR Privacy

Are YOU aware of the dangers of WiFi on public places? YOU should!

.
wifi-hotspotProtect yourself on public WiFi: ALL your data could get seen when not taken the right precautions on a public WiFi Access (HotSpot)…
.
First of all, check out to know more about how easy it is to get information about your online communications (passwords and private information…) as also on how easy it is to hijack your accounts while using a public WiFi!!!
.
Follow this BBC investigation and be surprised:
.

.

.

And NOT TO FORGET the Apps: Do YOU know WHICH permissions YOU gave YOUR ? Do YOU know HOW MUCH YOU share without knowing? Check below, please and WONDER:

By knowing NOW about the dangers and PRIVACY I suggest that YOU install a “VPN” (Virtual Private Network) application on each browser (Mozilla Firefox, Google Chrome, Safari, Opera, IE…) that YOU use, here below my selection (non-exhaustive list).

 

Internet of things!!!! Smart TVs…

Guidelines for securing your homeClick the above image to access the article, please.

.

Learn more about the “Internet of Things“:

.


WHAT’s The Appropriate Age For Kids To Start With It AND How-To?

.

« Good habits formed at youth make all the difference. » Aristotle

.

programmerman-animatedWHAT’S THE appropriate age for kids to start learning about InternetSafety and CyberSecurity? A question I get asked very often. Well, let us say it this way: when kids understand what is BAD and GOOD, that will be the perfect timing to start to teach them about the dangers of the internet and how to get the right reflexes. YES, reflexes they can learn them easily, NO Technic of course as they wouldn’t understand it! Experts say that the right age would be 5 years old, check the link below, please:

Personally I started to teach my wife’s niece 12 years ago when she was 4 1/2 year old and that worked perfectly. I will tell YOU how I did and YOU can try it out as well, success guaranteed.

First of all ask the kid if it knows about the BAD and the GOOD in our real world and tell it that on the internet (virtual world) it is the same. Tell them that the BAD guys will infect the computer, explain them that it is similar to an infection in real world (flu, as example…). For that reason they need a protection on the computer which will get updated, that’s the vaccine. When they know about vaccine in real world, they will understand that it is a MUST!

Parents should have taught them this about vaccines! WE will remember them each day (or at any time they go online) when getting online with the computer to check if the antivirus is switched on, they will get ===> THE reflex <=== later to check about THAT action. It is actually very easy, I will explain below.

.

antivirus in taskbar

As YOU can see on left-hand side the antivirus, in our case “Norton Internet Security Suite” is visible (see red circle). WE see as well that there is a green checkmark. This checkmark shows us that the antivirus is switched on and updated. Tell the kids up from early age to check this every time they use the computer, they will remember it.

Install ALSO WOT and McAfee SiteAdvisor on any devices as both show what websites to trust by indicating it with three different colours (green, orange, red). The kids will recognize the colours and understand.

.

McAfee SiteAdvisor

.

With the above mentioned advice your kids will learn the necessary basic reflexes to stay safe on the internet. BUT DON’T FORGET: a security by 100% doesn’t exist and the weakest link in the security chain is the human!

Learn more (my articles in the press):

.


Parents Cybersecurity And InternetSafety Knowledge And Skills, A MUST!

I created a special blog post about it, please check below:

 


Are There Already Existing Examples?

.

 

Online Safety Redefined

 

To access the article, please click the above image.

Europe, UK…

.


My Favourite Web Sites For Kids

Please find below my selection of websites (non-exhaustive list) for kids from 0-12 years old:

 


Learning Responsibility: Family Pledge And Passwords

.

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01Use a psychological trick to remember your family members about the MUST to take care about their weekly CyberHygiene, the reflex to learn, and play the songThe Reflex-Duran Duran”. They will get used to it, and every time they hear the song they would know that there is something special to do, such as NEW “Updates“! Easy to use, isn’t it 😉

.

.

Organize a Family Weekly-Security-Day

Community

My suggestion: to make sure that anybody’s computer is secure at home I suggest that you introduce a “Family Weekly-Security-Day“, where any week one member of your family will get chosen as the  “responsible” for the week and that “responsible” will remind you to respect the weekly task and controls also that the task was achieved! I will provide you with a sheet from Google Docs which you can use for it…

===> Play as a team in the family to make sure that everybody respects the weeklySecurity-Day! Any week someone else is responsible to remember the whole team (family) for the Weekly-Security-Day-Task! <===

Worksheets on Google Docs: 

You can even imagine some penalties such as e.g. making the dish-wash for 2 days, or similar, LOL 😉

.

===> Motivation: don’t let us forget the positive side and motivate members of family to do that unusual task by giving them some special bonus points when well done that task! Those bonus points could result in: <===

.

  • Penalties could get reset for a certain time (up to you to make the rules…)
  • Bonus points will get collected and by reaching a certain score will result by paying out some money (up to you to say how much…)
  • Your own ideas for motivating the team to do the tasks…
.

Create a family pledge where the members have to agree to to respect the family community responsibility. You may ALSO make one member of the family the responsible person for one week who takes care of the others and who will supervise that each member of the family respects the weekly security tasks. A spreadsheet may help, here below an example.

.

Family weekly responsibility spreadsheetClick the above image to access the document.

.

This blog post was featured on “Cyberwise” in March 06, 2015.

Cyberwise-Gust MEES-How To Teach Kids-06-03-2015

Click the above image, please, to access the article

.


 

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Necessary keywords for me to create this blog post: Family pledge: learning responsibility. password ONLY when done some tasks… Password CHANGE ALL 3 months, reflexes, showing the way, remembering the said when growing, asking questions when not comfortable, comfort zone together with parents, workstation NOT in separate room, published articles in the press, responsibility, community feeling, empathy, examples from traffic, the THREE colours (red, green, orange), WOT, McAfee Site Advisor, secure surfing, Antivirus reflex, Wi-Fi password change every day or once a week when tasks are done kids get it 😉 Router configuration for family… Passwords, sending messages over the network (#FSCD), planifying #FSCD over DOODLE, Family Safety, computer in a place who everybody is seeing; NOT in bedroom!, Install VPN on any devices as browser add-on.===> creating different accounts, ONE Administrator the others with restricted…, creating a Home-Network for sharing documents, photos, etc., tutorial from Microsoft about different accounts, links, Privacy settings, WOT, Any Friday #FSCD, family pledge, creating a sense of responsibility, Updates, 3dParty, CyberBullying Avira !!!!!!!!!!!!!!!!!!!!!!!!!! garage appointment for cars, CyberHygiene, creating sense of responsibility,

.

Stay tuned for next blog posts 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How Can Education Help To Lower Cybercrime?

How Can Education Help To Lower Cybercrime?

.
Evolution of Education: Wordle Logo
.


.

SID15_Banner_anim

.

How Can Education Help To Lower Cybercrime?

programmerman-animatedA GOODDigital Citizen” knows about the tricks that cyber crooks are using and so when leaving the school THEY will be on ===> Awareness <=== when meeting the working force. Thus meaning, THEY will be prepared NOT to fall into the traps from the cybercriminals on their office, reducing so the attack surface for their employer. Thus meaning: Teaching about ===> Digital CitizenShip <=== is a MUST, where Internet Safety, basic knowledge of Cyber Security and Privacy MUST be included!

.

« Good habits formed at youth make all the difference. » Aristotle

.

.

.

We are ALL responsible for the internet

 Image credit ===> http://www.ogilviedesign.co.uk/www.ogilviedesign.co.uk/Welcome.html <===

Here below the main links about WHAT to learn about:

TEACH the kids, students and learners ALSO about ===> Responsibility, Laws, Prison & Jail for NO respect of the laws!

The above mentioned knowledge AND skills are necessary (a MUST) to have; to give a minimum of attack surface to the cybercriminals! Less infected computers and devices = less cybercrime possibilities!

 

Keywords: eSkills, Education, Digital CitizenShip, cybercrime, Cyber Security, sharing, community, Social Media, Apps, laws, prison, jail, Awareness, Privacy, dangers, ICT, Naivety, Anonymity, TOR, BYOD, smartphones, Mobile Security, CyberHygiene, Critical Thinking, Proactive Thinking, Updates, Updates of Third Party Applications, Antivirus, Firewall, 

Read below please, for more detailed instructions and information, thanks.

.


THE Facts

.

cybercrime-$400 billion-2013

.

.

.

.

Good to know, check the image left-hand sided. Check also the articles below for more deeper information, please:

.

.

.

.

.


Awareness And Naivety, WHAT!?

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01First of ALL ===> WE MUST ACCEPT (its a fact) <=== that ===> Nobody Is Perfect!!! <=== Any OS (Operating System) is vulnerable as well as any device (Smartphones, USB, tablets…). NOR is there a completely ===> anonymity and privacy <=== possible! Check below please:

.

.

.

There is “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

.

======> A MUST CHECK for Education is the number of Data-breaches from Schools, Colleges and Universities as well: <======

.

Cyberattacks the greatest threat to nations

A MUST READ:

.

OK, I hear YOU already saying: WHAT do WE have to do with THAT!? Actually a lot! A lot of cybercrime is done by using so called ===> Zombies <===, infected computers and smartphones who are connected together in a so called ===> Botnet <===. But read more below in the proposed articles, please:

What is a botnet?

Click the image above to access the video, please.

.

WHO Are The Countries Who Host The Most Botnets!?

It is IMPORTANT to know who are the countries who host the MOST botnets (Botnet Control Servers), WHY!? Well, it is those countries who have to make BIG efforts to get rid of them and those countries SHOULD make MORE efforts in Education to teach people about Cyber Security.

.

Botnet Control Servers In The World

Click the above image, please, to access the article who explains in detail.

.


How A Botnet Is Created

programmerman-animated[Start TEXT from F-Secure] Bot programs can be planted on a machine or device in many ways. Machines or devices that have been infected by a bot are sometimes called ‘bots‘ themselves, or ‘zombies‘.

One common method for a bot program to get on a machine is when a harmful website the user is visiting silently looks for and exploits a vulnerability in the user’s system to install the bot on it. Other popular ways include sending the bot as a file attached to spam emails sent to the user, or as a program dropped from the payload of another malware.

Once the bot program is installed on the device, it will try to contact the website or server where it can retrieve instructions from the botherder. This site or server is known as the command-and-control (C&C) server.

An attacker with access to the C&C servers uses a client program to silently send instructions over the Internet (or another network) to the bot to perform various tasks, such as collecting data, monitoring the user’s actions and so on.

Commands can be issued to a single bot, or to all the bots in botnet. The attacker controlling the botnet is sometimes referred to as the ‘botherder‘, ‘operator’ or ‘controller’. [End TEXT from F-Secure]

.

Learn more:


How To Protect To NOT Become A Zombie!?

programmerman-animatedAs already mentioned above, “Zombies” are infected devices (any OS). Computers, smartphones and any device running an “Operating System (OS)” can have vulnerabilities and MUST get updated regularly! The same for any installed software programs, they MUST get updated regularly also! Any device and any OS MUST get protected by an Antivirus program. Please follow the advice below:

.

.


TOR And Anonymity!???

.

 

TOR-2014-cybercrime

 

.

Learn more:

It is IMPORTANT, actually imperative to teach the kids about responsibility, about the existing laws, about WHAT is right and what is forbidden AND illegal!!! Laws were (and STILL are) created to protect the society… Anarchy isn’t reality in the real world and neither on the internet! 

.


Digital CitizenShip And Cyber Security (Internet Safety And Privacy Included)

programmerman-animatedThe month of October is by tradition since years already the “Cyber Security Month” (#CyberSecMonth) in Europe and ALSO the “National Cyber Security Awareness Month” (#NCSAM) in the USA. WE will use this blog post to participate on it by OUR contributions. Check below, please, the message from the EU and ALSO from the US. YOU will realize the importance of GOOD knowledge about Cyber Security then…

.

FBI-US-Cybersecurity is National Priority

Click the above image to access the article, please.

.

CyberSecurity-Shared-Responsibility-2012-EU

Click the above image to access the article, please.

.

I am getting often asked WHAT are the best ways about learning ===> Internet Safety and Cyber Security <===, well, here below my recommendations and advice. I will start FIRST to introduce YOU to a game before WE are starting to talk about the THEORY 😉 Click the image below to access the FREE game.

.

VOVALABS CyberSecurity Game

Click the image above to access the FREE game.

.

Learn more:

 


WHAT Actions Could Get Taken WHO Are Student Centered?

sharing-iconWHAT could be better than put the students in the drivers seat and let them learn responsibility, let them create a community of responsibility such as:

.


 

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next blog posts 😉

.

.

 

 
7 Comments

Posted by on November 4, 2014 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Annotum-Theme, Apple Malware, Apps, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Botnet, Bring Your Own Device, Bring Your Own Device (BYOD), browser, Browser Vulnerabilities, Browsers, BYOD, Coaching, Code Pénal-Articles 509-Luxembourg, Collaboration, Competency, Connected Educators, Creativity, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security Blogs, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Data-Breaches, Data-Breaches in Education, DDoS, Digital Citicenship, Education, eLearning, Europe, European Cyber Security Month, Free courses, FREE-courses, Future Work Skills, Global, HotSpot, HowTo, ICT Awareness, Ideas for a more secure Internet, Identity Theft, IT-Security Scouts, IT-Security/Part1-browsers, IT-Security/Part2-check your computer, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Jail, Learning basics of Cyber-Security-Practice, Learning to Learn, Luxembourg, Mac Botnet, Mobile Botnet, Mobile Security, Naivety, National Cyber Security Awareness Month, Not ONLY rights but also responsibilities, Often Asked Questions, Passwords, Personal Learning Network (PLN), Phishing, PKM, PLN, PracTICE, Prison, Privacy, Proactive Thinking, Professional Development, Reality, Reflexes, Responsibility, Right use of Technology, Rise Of The Professional Educator, Secure Surfing, Security in Schools, Skills, Student Centred, Students 21st Century Survival Guide, Technology Integration, Third Party Applications, Updates, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Habits You SHOULD Apply For The New Year

Habits You SHOULD Apply For The New Year

.

Learning basics of IT-Security and Cyber-Security.


Introduction

Chat iconA New Year is approaching and WE SHOULD think about WHAT WE learned during this year to make the next coming year even BETTER! When revising my curation about Cyber-Security YOU MUST agree that Cyber-Criminals are getting more and more professional and that WE as users MUST learn to stay secure while surfing and to be prepared to avoid the pitfalls of cyber-criminals.

.

.

Check also a new report from KASPERSKY here: Dangers of not securing your Internet Device

Check it out in the different proposed languages, please:

The above Curation gives YOU an overview what happened during the year with:


OK, NOW WE Know The Dangers, BUT How To Protect Against Them!?

.

programmerman-animatedThat’s a good question, isn’t it? WHERE to start? Actually it isn’t THAT difficult at all, ALL YOU need (mostly) is to get the right reflexes! YOU need to get used on a daily base to be aware of the dangers YOU are used to this in Real-Life, so do it ALSO in Virtual-Life [internet]). BUT HOW!? I will present to YOU a couple of automated software programs who will make it very easy for YOU, the rest is just routine and reflexes 😉

Remember that in real life WE do Hygiene: brushing OUR teeth is ALREADY (OR SHOULD be) a daily task, reflex, which WE are using; right? WE SHOULD get such daily reflexes in the Virtual-World as well, WE need to get educated to it so that it becomes a daily reflex! SO… Here WE go NOW…

MOST of the below mentioned TIPS are for Windows users, BUT as “Nobody Is Perfect“, so lots of the advice’s are ALSO a MUST for Mac users!

First of ALL, WE SHOULD try to find a way THAT WHEN WE make a mistake (Nobody Is Perfect…) that WE don’t get infected OUR computers and devices (smartphones, tablets…)! So WE MUST first look for a protection software, I advice YOU to install a commercial “Internet Security Suite“, NOT ONLY an Anti-Virus, BUT an “Internet Security Suite“. Let’s say this ALSO, any installed Anti-Virus protection (FREEWARE) is BETTER than NO Protection, BUT commercial software has STILL BETTER results in protection, check the following links, please:

1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01So, WE have NOW a protection installed, are WE safe NOW!? NO not at all! As already mentioned, “Nobody Is Perfect” and so it is also for the Anti-Virus programs. WE MUST be aware ALSO of OUR behavior (WE are nearly new born kids in the Virtual-World) and OUR Naivety (YES, some are STILL…):

The above mentioned links might be seen as lot of information, BUT it isn’t as ALL of them are very easy to understand and to apply! Take YOUR time and follow the instructions on How To apply them, please. BEST would be to read my FREE courses here:

.

Guidelines for securing your home

 

Click the above image to access the article, please.

.


Stay Informed About New Threats

.

SOPHOS Security Threat Report 2014

Click image to download the report.

.

[START Text from SOPHOS]

It includes a range of security tips, and a section on proactive protection, entitled Staying Ahead of Today’s Most Sophisticated Attacks.

The report isn’t just about Windows and Windows malware, either.

You’ll find a wealth of information about how the cybercrooks are broadening their attack horizons to the Mac, Linux and Android platforms, too.

This is important material because it necessitates that we broaden our defensive horizons in reply.

The report also looks the technology and the underground economy behind crimeware tools such as exploit kits, botnets, click fraud, ransomware, and more.

As well as being a fascinating read, the Security Threat Report 2014 will help you to understand and to protect yourself against an enemy that is becoming ever smarter, shadier and stealthier.

[END Text from SOPHOS]

.


Get THE Weekly Reflex!

thumbs upAs already mentioned it are the reflexes who are very important! SO, let’s create them by checking every Friday OUR computer(s), as a reminder: I created the ===> Hashtag #FSCD <=== on Twitter! #FSCD means ===> “Friday Security Check Day”! <=== Follow it to make sure that YOU don’t forget about it 😉

.

Learn more:

.

.


GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.
.
.

Stay tuned for next blog posts 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

SID2014: Safer Internet Day 2014-Participation

SID2014: Safer Internet Day 2014-Participation

.

Evolution of Education: Wordle Logo

.


Safer Internet Day 2014 – Save the date!

.

sid2014-anim-banner

.

.

Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially amongst children and young people across the world.

Safer Internet Day 2014 will be celebrated on 11 February 2014. The strapline for the campaign is “Let’s create a better internet together”. 

This website showcases some of the exciting activities and events that took place across the globe to celebrate the day in 2013, and will be updated for 2014 as the campaign gathers pace. Click on the map below to get started, using the zoom control to locate the contacts and events in your country or visit the ‘SID Near You’ section to explore news from the many countries and institutions which were involved.

Alternatively, read the summary or the full public report on Safer Internet Day 2013 activities and successes.

Keep checking back for the latest news as the SID 2014 starts to take shape.

.SID2014-logo-BS-small

.


.

Learning IT-Security

.

My participation for the SID2014

.

Why should ===> anyone <=== participate?

.

Cyber-security – a shared responsibility

========> Cyber-security – a shared responsibility <=======

.

Cyber-Security is a shared responsibilityWE are ALL responsible for a more secure Internet and it is ===> OUR responsibility to build up the future for OUR kids, learners and students! <=== 

WE can do it by learning and teaching the basics of Cyber-Security and ALSO by helping international organizations such as “Safer Internet Day” to become a catalyst for such a difficult task!!!

.

======> WE are living in a world of connected technology, Cyber-Security is a MUST!!! <======

.

.

That is why I am participating on SID2014 with my FREE courses here:

and also with my curation here:

.


Final word

thumbs upMOTIVATION: Knowing NOW how important it is to take part of such a great Event, I encourage YOU ALL to take part of it by any possible action, even as a private person! I encourage especially private persons to display the banner from SID2014 on their blogs and/or websites :)

Where can I get the banners?

People who are on Twitter may use the hashtag #SID2014 to promote that Event, thanks for Helping to make the Internet a more secure place!

.

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

 
1 Comment

Posted by on July 10, 2013 in 21st Century Skills, 21st-Century-Teaching-and-Learning, Awareness, Better Learning, Better Learning about ICT, Better Teaching, Blog creation, Blogs, Bring Your Own Device, Bring Your Own Device (BYOD), browser, BYOD, Competency, Critical Thinking, Critical Thinking-a need!, Curation, Cyber-Crime, Cyber-Hygiene, Cyber-Security in Schools, Cyber-Security is NOW Priority in the US, Cyber-War, Cyber-weapon, cybersecurity, Dangers of storage devices, Data-Breaches in Education, Education, eLearning, Encryption, FBI, For a Better World, Free courses, FREE-courses, FREE-Online-Scan-for-Security, HotSpot, HowTo, Ideas for a more secure Internet, Internet Monitor, IT-Security Scouts, IT-Security Worksheets, IT-Security/Part1-browsers, IT-Security/Part3-Update your third party applications, IT-Security/Part4-Surf more secure-which web sites to trust, IT-Security/Part5-Not Only Internet-Safety/ALSO IT-Security, itsecurity, Learning basics of Cyber-Security-Practice, Learning to Learn, Mobile Security, Naivety, Not ONLY rights but also responsibilities, PBL, Personal Learning Network (PLN), Phishing, Pinterest dangers, PLN, PracTICE, Proactive Thinking, Project Based Learning, Quality Control, Reality, Responsibility, Right use of Technology, Safer Internet Day 2014, Secure Surfing, Security in Schools, SID2014, Smart TV's, Social Engineering, Social Media, Students 21st Century Survival Guide, Sustainability, Technology Integration, Tutorials, Twitter Chat, Visual IT-Security, Weakest Link in the Security-Chain, WiFi

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Ideas For Valuable HomeWork-PracTICE

Ideas For Valuable HomeWork-PracTICE

.

Evolution of Education: Wordle Logo

.


Ideas For Valuable HomeWork-PracTICE

.

community-jpegLots of discussions around about the value of Home-Work, should there still be some and/or should Home-Work get cancelled at ALL!? I have a different approach to it and I think that one should still give Home-Work to the learners, students, BUT on a different way! 

.

WHY NOT using the Home-Work to let the learners, students, learn NEW stuff by themselves!? Sounds strange to YOU? Let me explain, please:

Imagine that in a week time (or two…) YOU would like to discuss a special Topic with YOUR learners, OK? As Home-Work give THEM the possibility to make THEIR own “Curation” about it while using the different present tools of curation to be able to do that specific task, find below my selection:

.

With ALL the other possibilities while THEY need to make a deep searching on the internet, show THEM ALSO my blog about BETTER searching here:

.

students-workforce

Don’t explain anything, just give THEM a challenge and tell them that those who have read that blog would have BETTER chances to find the appropriate content, play the psychological card 😉 THEY would learn and THEY would be engaged to get out the BEST content for THEIR OWN

Let THEM make the choice of THEIR OWN tools and THEIR OWN acquired knowledge through my blog and my curations! Let THEM own THEIR LEARNING, or THEY do it alone and/or THEY do it in a team, UP TO THEM!

.

.I THINK that this is easy to do, isn’t it!? BUT, didn’t WE forget something? When WE are surfing around on the Internet WE could face some surprises, getting redirected to malicious websites, websites who could infect OUR computers and any other devices connecting to the Internet!

SO… WHAT about to tell YOUR learners, students a bit about How-To know which websites are considered being trustful and which ones are malicious!? Don’t fear, it is very easy, please follow my FREE advice here:

.

With such an approach YOU certainly will engage YOUR learners, students, for a BETTER Learning, critical thinkers and organized people! Curation has a lot of positive aspects, use it 😉

.

Stay tuned for next blog posts and FREE courses 😉

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Best Addresses To Stay Informed About IT-Security and Cyber-Security

Best Addresses To Stay Informed About IT-Security and Cyber-Security

Learning basics of IT-Security and Cyber-Security

.


Introduction

programmerman2

In previous articles WE discussed already about the responsibility that ===> everyone is responsible for a safer and more secure Internet <===that the weakest link in the security chain is the human and I provided you also with some great FREE tools to get protected, as well that I gave you advice such as learning to become “Proactive -Thinking“, “Critical-Thinking” and I provided you also a plan on how to learn to get a maximum protection in a week time by applying protection on a step by step guide, as different other important articles… Just check the navigation menu on right hand side to find out, please…

BUT, I agree with people who are telling me that they can’t see the dangers nor can they touch it! Hard to believe what I teach you here about Cyber-Security, isn’t it!? That is probably ALSO what the IT-Security professionals thought and they developed real time online maps where people can follow each day in real time the attacks worldwide. So I will present to you those important and very interesting animated, interactive maps and you will realize (I am sure about…) how important it is to have a good protection on any device connecting to the Internet, so let’s go and check these links, please:


BUT, don’t let us forget what OUR main mission is as teaching persons and let us take a look again on the Wordle-Logo, which provides us Word-Clouds below, please. Such simple images have a great impact on OUR brain and are very good to memorize…

.

Evolution of Education: Wordle Logo

.

By analyzing the word “ICT“, WE see ALSO that the letter “I” is present which means “Information“. To get BEST Information WE need to be “Critical-Thinking” first, And there WE start again, from where do WE get BEST Information?

.

SO… as a BIG fan of “Curation“, I first will mention my own multilingual curation which is in English, French and German and where I selected the BEST articles about IT-Security, Cyber-Security, Privacy, Cyber-Crime, Cyber-War and my own FREE courses:

Why am I a so BIG fan of Curation and why do I publish about Cyber-Security?

book-question-markCheck out here to find out:

.

Check out ALSO my multilingual blog (in French) where YOU will find BEST addresses in French, English and German:

.

Check out ALSO the blogs from the IT-Security manufacturers:

.


Who to follow on Twitter for Cyber-Security? 

Here is my selection of BEST publications by awarded contributors:

.
Chat icon

.

 

.

L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure). 


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.

Stay tuned for next post and FREE courses 😉

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Education and Security: I got interviewed – feeling honored and sharing it with you

Education and Security: I got interviewed – feeling honored and sharing it with you

.

Evolution of Education: Wordle Logo

.


The Interview – Partial Transcript

Chat icon

.

On March 12, 2013 I had the chance to get interviewed by Doug PETERSON. Here is (partial) what Doug said:

Gust MEES and I have followed each other for some time now.  I’m not sure how we “met” but I’ll let him recall it shortly.  He’s an intriguing individual – lives in Luxembourg (Europe) http://www.scoop.it/t/luxembourg-europe, a country with ONLY 502,000 inhabitants and is a regular on Twitter.  You can find him very active there as @knolinfos.

.

.

.

Below Doug’s BIO:

My formal education includes a Bachelor of Mathematics degree from the University of Waterloo and a Bachelor of Education degree from the University of Toronto. Ontario Ministry of Education and Training qualifications are in Data Processing, Computer Science, Accounting, and Mathematics. My personal website is at: http://www.dougpeterson.ca Follow me on Twitter: http://www.twitter.com/dougpete I‘m bookmarking things at: http://www.delicious.com/dougpete.

.

higher-education-tech-blogs-2013

Doug PETERSON is ALSO featured At EdTech: we strive to create the most valuable resources for higher education technology professionals. One of the ways we do that is by highlighting the smartest and most innovative education tech bloggers on the web.

.

Check the link below:

.

You can find the complete interview here:

.


1ibdy1vf6wghd-n05dgl-attenzionearchitettofr01I will ONLY publish in this blog the part which seems to me the most important for my readers, the WHY of the MUST of Cyber-Security Teaching in Education, so let’s go:

.

Doug: So much of your focus appears to be on Education and Security.  You have a huge curation of materials.  Why the interest in these topics?

Gust:  You are right, I have a lot of interests (I am curious for Learning more). Well, I should divide it also in the two topics, let’s start with IT-Security, the beginning. I am online since 1998 and I read also a lot, books and magazines. I got my first knowledge of IT-Security in 1999 by reading PC-Magazines and I applied it also on my PC and of course, as I am not selfish and having the will to share it with others, I published it also on my website(s).

A certain moment come, my websites had a big success. In private life people told me that I am crazy to talk about security, virus and more of those strange beasts problems at that time. So now my website has more than 2 million visits, see pic below, please.

.

2013-04-22-InternetMonitor-Stats

BTW: here is the URL ===> Internet Monitor

.

.

sharing-iconI started so to learn more about and also to share my knowledge with others and even that my Security courses got accepted by the Ministry of Education in Luxembourg (Europe), my country. Check here, please (in French):

Once started, one must continue when there is a demand for it ;) Looks like people love my way of explaining and teaching. I became also a member (Advisory Board) of:

And that’s why I started also to make the curation about IT-Security, Cyber-Security.

Sharing my acquired knowledge with others is priority and a pleasure also!

A pleasure!? Am I kidding? NO, it’s something who makes me happy, check here:

When I do something for other people, I feel good, “says Peterson“. When you do something voluntarily for others, not only for its own interests, it is rewarded. In some mysterious way, serve as an “altruistic” (the opposite of selfishness) gives his own life more important. It seems that nature have put it in our genes, or that people are happy when they have the spirit of sharing, community spirit.

So, dear readers, make yourself feeling good and share ;)

Concerning now Education, that’s a bit a different story. I was a manager with Electronics background  and worked for different companies when later I got unemployed with 45 years old (2000). I was looking for a new job and I saw that the Government was looking for ICT instructors, proposing to give people pedagogical courses to be able to do this job. I applied and I passed the tests, later I was studying for 4 months pedagogy, tailored for ICT. Very hard to study pedagogy at that age, but I got IT. One is never too old to learn new stuff, when the will is there.

I became months later an ICT course instructor on an eight (8) hour base work and on 5 days per week work, very hard… I gave courses to adults, seniors (even 70+…), primary classrooms and primary school teachers… I was getting nearly obsessed by learning, I found my destination, I found my vocation, I love it to teach…

My knowledge (professional development) was updated by following different other courses and by reading a lot of books, where here below my selection:

Doug: Do you find educators more or less concerned about security than the average online citizen?

Gust:  YES, I do, sorry! Educators are less motivated to learn about the basics of Cyber-Security, IT-Security and have ALSO less knowledge about it, my point of view resulting by practice. Meaning that Educators I know (friends) and also by analyzing the stream of tweets on Twitter shows me that!

programmerman2Doug: Why do you think this is that way?

Gust:  That’s a real million dollar, euro question ;) Well, as most of Educators are using NOT a PC but most a Mac and some a computer with Linux OS, they feel too secure! But thinking that these OS (Operating Systems) are secure, that’s NOT the reality, sorry. NOBODY is perfect, NO OS is perfect, reality shows us that when one is analyzing the attacks and vulnerabilities worldwide!

.

Doug: Do you find that Macintosh or Linux users have this over confidence that their platform is immune to problems?

Gust:  YES, I do! You are right with the word “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

.

Mac-Insecurity-Threats-Symantec-2012

.

Don’t forget also about mobile phones, Android is also based on Linux as OS! Check here:

Doug: What can be done to turn this around?

teacherGust:  Seriously and convinced, I think that there is a MUST to teach the basics of Cyber-Security by Education in any schools around in the world, and this up from early age! The kids will understand it very quickly, they are more intelligent as most adults think as their computers and smartphones are the (nearly) most important to them! I have worked together with teens (11 years old and +) and showed them How To protect their computers and how to stay informed about new threats, that was a piece of cake for them, I even didn’t think that it could be that easy, I was surprised! Convincing adults is (???) more (very) hard!

So, how could that be in practice? That was the question I asked myself (oh yes, I thought a lot…) and here are my propositions and advice:

Apart from teaching the basics of Cyber-Security in schools by traditional learning, one should try ALSO to involve and engage youth in that process of learning, learning by doing and learning to have responsibility! IT’s ALL about responsibility anyway when working and using ICT (BYOD included)! This could be realized with a piece of theater (it took me a year of development) where they could be involved as actors (players) and also by giving them the feeling of being an IT-Hero by becoming Security-Scouts. Sounds strange? Check the links below to learn more:

.

Update on April 24, 2013: THIS is a personal ADD NOT PUBLISHED on the interview, BUT A MUST to show YOU!!!

Malware encounter rate Education April 2013

Check here for more info: ===> SC-MAGAZINE

 

Check also

.

FBI-US-Cybersecurity is National Priority

Check here for more info: ===> http://www.scoop.it/t/securite-pc-et-internet/?tag=US-Cybercrime+a+national+security+threat

.

Doug: You call yourself an ICT Course Instructor.  What courses have you instructed or are currently instructing?

Gust:  Lots of my courses are present (in French) on the server of the Ministry of Education in Luxembourg (Europe):

They are for domestic security, the basic knowledge which anybody should have in the 21st Century… Created with the less possible technical expressions…

Actually I am preparing blogs where I want to share my 10 years lived practice on How To I used the knowledge where most are only starting now to learn it and/or using it. Coming soon and hoping that it will help others and giving them some new ideas (perhaps) also… It’s all about sharing experience and knowledge

.

Please check out also:

.

and stay informed ALSO about the newest threats, dangers and risks by following my curation here:

.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Stay tuned for next free courses and tutorials ;)

.

.

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Best Internet Search Practices

Best Internet Search Practices

.

Evolution of Education: Wordle Logo

.


Searching on the Internet

globe-pc

Actually everybody knows what it means when WE say searching something on the Internet, and most people think of Google as a search engine! BUT searching is not equal searching, different people will get different search results and that is NORMAL!

Why?

Let me explain, please:

                        • The quality of the answer is ONLY as good as the question is!
                        • As more precise the question, as BETTER quality the answer would be!
                        • Also meaning that: as BETTER informed one is (more knowledge) as certainly one asks better questions (mostly…)
                        • The search engine will NOT replace the brain 😉

.

.


Demonstration of Searching in the PracTICE

sharing-iconLet’s make a demonstration of this in the PracTICE, in the classroom together with the learners. The learners will play a role-play where they will be the different search engines…

How could this be realized?

It’s actually a very easy Scenario:

Step 1

  • First ask your learners which search-engines they know and they should think and write it down.
  • They could also already search on the internet to find more.
  • Ask some of them to come to the chalk board and write the found results on it.
  • If you have a whiteboard technology, so let them do it while using the learner interface.

Step 2

  • Compare it with your own list.
  • Explain that there are normal search engines and meta search-engines.
  • You got now the number of search-engines and the names of them.
  • Assign a search-engine to the learners, one per learner only.
  • Design a search-word, example “chair” and write it on a sheet of paper about the size of DIN A4.
  • Below that word to search, fill in also the names of the search-engines by leaving a bit place for the search-result below the name.
    • The paper sheet could already be prepared.
  • Take the sheet of paper and shape it into a paper-ball.

Step 3

  • Tell your learners now that you will throw the “paper-ball” to someone who needs to fill in his search-result.
  • Once done so, this person should shape it again into a paper-ball and throw it to another person.
  • That person does exactly the same, and so on…
  • When ALL the persons did their job, THEY will throw the paper-ball back to the teacher.

.

Step 4

  • The teacher opens the paper-ball, scans it and shows it with the beamer, and/or won the white-board to the learners and explains the different search results! They will be different…
  • NOW, the teacher goes to next step and explains how IMPORTANT it is to give the search engines the exact query…
    • In OUR example we used “chair”, this is NOT enough! WE should use “metal chair”, or “wooden chair”, or “plastic chair”, or “modern chair”, or “LifeStyle chairs”… and so on… As more precise WE ask, as BETTER results WE will get!

.

See the screenshots below who will show YOU the difference:

.

The word ===> chair <=== results by 624,000,000 answers

Search result: chair

.

.

The word ===> plastic chair <=== results by 60,000,000 answers

Search results: plastic chair"

.

.

The word ===> “plastic chair” <=== results by 3, 450,000 answers

Search results: "plastic chair"

.

.

The word ===> “red plastic chair” <=== results by 339,000 answers

Search results: "red plastic chair"

.

SO, as YOU have remarked NOW, as more precise YOU answer the search engines (e.g. Google), as more precise OUR results will be and ALSO less results are shown! This makes it much more easy to find the adequate stuff 😉

.

Learn more:

.

.


Google Search Operators

programmerman2.

[Start Text from Google] If you’re not finding what you’re searching for after using our basic search tips, try a search operator. Add one of these symbols to your search terms in the Google search box to gain more control over the results that you see. Don’t worry about memorizing the operators – you can use the Advanced Search page to generate many of these searches. [End Text from Google]

.

Learn more:

.


Searching copyright free images

.

sharing-iconOften people need license FREE images, especially for educational projects. But when searching on Google the results show ONLY ALL images! But there is a little trick to find the right stuff, which I will show you here…

First of all you need to bookmark this page from Google https://www.google.com/advanced_image_search?

Follow NOW my blog about How To:

.


Show the Students the New Resource from Google about Search

.

Google Search

Click the following link to access the interactive resource ===> Google Search Inside

.


Tips and Tricks

Using Search Operators such as quotes to Search for an exact word or phrase.

In below example (screenshot) YOU will see the search results by ONLY typing ==> creating animated gifs with photoscape tutorial <=== and there are about 4.270.000 results. WE will try to make a fine search NOW by using the quotes, see next screenshot.

.

Google Search 1

.

Make a fine search NOW by using the quotes, see next screenshot below. The search results returned ONLY 72.300 results, a lot BETTER and more easy to make OUR choice.

.

Google Search 2

.


Search ONLY the secure websites!!!

programmerman2One can’t trust any web site and any content published on Internet, don’t be naive! It’s the same as on real world, there are bad guys and good guys, but how to find out? My favorite FREE Software to make me my Online Life easier and more secure as they show me which web sites are trustworthy and which websites I shouldn’t visit at all because they are malicious and could infect my computer is McAfee SiteAdvisor!!! But don’t forget also, there is and never will be a 100% security!

.

Tip: you may use different similar software and add-ons together, there is no problem to do so. I use McAfee SiteAdvisorWOT and as I have installed Symantec Internet Security (security suite) I get also their results shown… Other Security-Suites from different security manufacturers are also proposing similar solutions…

.

Check my free course about it here:

.


Curation the next search

book-question-markCuration is going to significantly affect how we search and find information about topics we know little of or that we want to learn more about. [Robin Good]

[Gust MEES] Through curation one has the possibility to FREE online learning and through sharing it to create a community with the same interests. Curation could also save people of same interests a lot of time and provides them with valuable content which could get used to link back to them in written articles, blogs, web sites and social media sites. Also one learns from each other in the curation community as one has the possibility to follow interesting curation.

As an ICT course instructor most of my curation is related to educational content and so I provide the curate content to an educational audience and to people who are willing to learn. Therefore I see curation also as help for a collective global learning and a contribution to a collective intelligence.

Curation will probably become the next generation of search! Why? Because the curated content is done by humans who give ALSO their insight(s), SO… the results in search are more valuable then ONLY the offered results by a machine who is depending on its algorithm…

.

Learn more about curation:

.

.

In the hope that these examples will inspire you to develop ALSO some activity and creativity

.

.

Stay tuned for next blogs and free courses 😉

.

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,