Education 2.0 & 3.0
148.6K views | +0 today
Follow
Education 2.0 & 3.0
All about learning and technology
Curated by Yashy Tohsaku
Your new post is loading...
Your new post is loading...
Rescooped by Yashy Tohsaku from Digital Learning - beyond eLearning and Blended Learning
Scoop.it!

Cybersecurity Incident Management and Response Guide

Cybersecurity Incident Management and Response Guide | Education 2.0 & 3.0 | Scoop.it
Ensuring that your entire team understands what actions to take can make an important difference in how—and how quickly—your institution emerges from

Via Peter Mellow
No comment yet.
Rescooped by Yashy Tohsaku from Creative teaching and learning
Scoop.it!

University TikTok bans cause concern and confusion

University TikTok bans cause concern and confusion | Education 2.0 & 3.0 | Scoop.it

"With cellular data and VPNs, it’s easy for students to circumvent the TikTok bans sweeping the nation’s universities. That makes experts wonder: What do these bans hope to achieve? ..."


Via Leona Ungerer
No comment yet.
Rescooped by Yashy Tohsaku from Creative teaching and learning
Scoop.it!

Expert says increase in technology could lead to more swatting calls

Expert says increase in technology could lead to more swatting calls | Education 2.0 & 3.0 | Scoop.it

"Eight Ohio schools were swatted Friday, including Princeton High School. One cybersecurity expert said the calls were likely coming from overseas ..."


Via Leona Ungerer
No comment yet.
Rescooped by Yashy Tohsaku from iGeneration - 21st Century Education (Pedagogy & Digital Innovation)
Scoop.it!

Free Cybersecurity education program for high schools launches in partnership between Cisco and STEM Fellowship - Apply for free resources (12 million in-kind investments available to schools)

Free Cybersecurity education program for high schools launches in partnership between Cisco and STEM Fellowship - Apply for free resources (12 million in-kind investments available to schools) | Education 2.0 & 3.0 | Scoop.it
$12 million in-kind investment from Cisco will help 40,000 students gain practical digital skills and safety knowledge through the Cybersecurity Classroom Training ProgramCisco Canada and STEM Fel. . .

Via Tom D'Amico (@TDOttawa)
No comment yet.
Rescooped by Yashy Tohsaku from Information and digital literacy in education via the digital path
Scoop.it!

5 cybersecurity life skills to teach all year

5 cybersecurity life skills to teach all year | Education 2.0 & 3.0 | Scoop.it

As the digital world evolves, cybersecurity life skills are more essential than ever—here are some major lessons to impart upon students

If a student from your school had someone knock on their front door, ask for personal information and offer to give them a treat in exchange for that information, what would happen? It depends on the child, but what you know for certain is that your district or school has been teaching stranger danger since that child was in kindergarten, so the odds are good that the interaction would raise a red flag for the student.

Via Elizabeth E Charles
No comment yet.
Rescooped by Yashy Tohsaku from iGeneration - 21st Century Education (Pedagogy & Digital Innovation)
Scoop.it!

Better Safe than Sorry: How to Teach the Basic Rules of Cybersecurity by Ashley Wilson

Better Safe than Sorry: How to Teach the Basic Rules of Cybersecurity by Ashley Wilson | Education 2.0 & 3.0 | Scoop.it

Via Tom D'Amico (@TDOttawa)
Karol Michalski's curator insight, January 30, 2021 6:07 PM
Żeby bezpiecznie surfować po internecie trzeba znać kilka zasad na temat bezpieczeństwa. Najlepiej tą naukę zacząć od najmłodszych lat jeżeli jest taka możliwość. Kilka zasad bezpiecznego korzystania z sieci
Rescooped by Yashy Tohsaku from iGeneration - 21st Century Education (Pedagogy & Digital Innovation)
Scoop.it!

Girls Go CyberStart Cybersecurity Competition for Students via @classtechtips 

Girls Go CyberStart Cybersecurity Competition for Students via @classtechtips  | Education 2.0 & 3.0 | Scoop.it
Your students can join a new cybersecurity competiton from Girls Go CyberStart to learn about an industry that uses computer science and coding every day!

Via Tom D'Amico (@TDOttawa)
pooja craft's comment March 28, 2019 6:39 PM
https://daxin.vn/danh-muc/den-pha-led/
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity 

The dark web: What it is and how it works | #ICT #CyberCrime #CyberSecurity  | Education 2.0 & 3.0 | Scoop.it
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 


Via Gust MEES
Gust MEES's curator insight, October 24, 2017 11:13 AM
Off the paths it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look. This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.

Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it. It is not surprising, then, that the dark web is often used for illegal activity and that it is hard to police.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=Darknet

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=darknet

 

Rescooped by Yashy Tohsaku from ICT Security-Sécurité PC et Internet
Scoop.it!

The CCleaner Attack Was Worse Than We Knew | #CyberSecurity

The CCleaner Attack Was Worse Than We Knew | #CyberSecurity | Education 2.0 & 3.0 | Scoop.it
When Avast announced that 2.27 million people had downloaded a malware-riddled copy of its performance optimization software CCleaner, it was initially believed that a second payload—that can control a system—was never delivered to victims. It’s now clear that wasn’t the case, and it appears the attackers may have been targeting tech firms for the purposes of industrial espionage.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Ccleaner

 


Via Gust MEES
Gust MEES's curator insight, September 21, 2017 3:05 PM
When Avast announced that 2.27 million people had downloaded a malware-riddled copy of its performance optimization software CCleaner, it was initially believed that a second payload—that can control a system—was never delivered to victims. It’s now clear that wasn’t the case, and it appears the attackers may have been targeting tech firms for the purposes of industrial espionage.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=Ccleaner

 

Rescooped by Yashy Tohsaku from MiniTool Software Solution
Scoop.it!

MiniTool Mobile Recovery for iOS

MiniTool Mobile Recovery for iOS | Education 2.0 & 3.0 | Scoop.it

MiniTool Mobile Recovery for iOS Free is an easy-to-use iPhone data recovery tool. It can recover lost contacts, messages, photos, notes, videos, etc. from all iOS devices


http://www.minitool.com/ios-recovery/free-iphone-recovery.html

 

Via MiniTool Software
No comment yet.
Rescooped by Yashy Tohsaku from ICT Security-Sécurité PC et Internet
Scoop.it!

How to remove ransomware: Use this battle plan to fight back | #CyberSecurity #Awareness

How to remove ransomware: Use this battle plan to fight back | #CyberSecurity #Awareness | Education 2.0 & 3.0 | Scoop.it
Ransomware has exploded onto the PC. We'll show you what to do to avoid it, remove it, and—if necessary—even negotiate with its authors.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

 


Via Gust MEES
Gust MEES's curator insight, March 14, 2017 12:57 PM
Ransomware has exploded onto the PC. We'll show you what to do to avoid it, remove it, and—if necessary—even negotiate with its authors.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=RANSOMWARE

 

Rescooped by Yashy Tohsaku from ICT Security-Sécurité PC et Internet
Scoop.it!

A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked

A USB dongle can hijack all your Web accounts and router in 30 seconds, even if your computer is locked | Education 2.0 & 3.0 | Scoop.it
A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can have any previously active Web logins hijacked merely by plugging in a tiny Unix device via USB or Thunderbolt, even if the computer is locked and password protected, and possibly even when it seems to be asleep. It can also hijack many router brands on the same network.

PoisonTap exploits several interlocked network and browser design features, rather than relying on an operating system, hardware, or browser flaw. This will make it harder to root out and resolve. Kamkar said in an interview, “The interesting attacks to me are by design: how do you exploit the protocol rather than a single buffer overflow that gets patched the next day.”

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Samy+KAMKAR

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Raspberry+PI

 


Via Gust MEES
Gust MEES's curator insight, November 21, 2016 6:33 PM
A proof of concept from security researcher and software developer Samy Kamkar shows that macOS, Windows, and Linux computers can have any previously active Web logins hijacked merely by plugging in a tiny Unix device via USB or Thunderbolt, even if the computer is locked and password protected, and possibly even when it seems to be asleep. It can also hijack many router brands on the same network.

PoisonTap exploits several interlocked network and browser design features, rather than relying on an operating system, hardware, or browser flaw. This will make it harder to root out and resolve. Kamkar said in an interview, “The interesting attacks to me are by design: how do you exploit the protocol rather than a single buffer overflow that gets patched the next day.”

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Samy+KAMKAR

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Raspberry+PI

 

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship

Facebook publishes new security settings guide | Privacy | CyberSecurity | Digital CitiZENship | Education 2.0 & 3.0 | Scoop.it
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.

 

To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.

 


Via Gust MEES
Gust MEES's curator insight, April 7, 2015 4:13 PM
Drop-dead simple advice on keeping intruders' hands off your account, spotting phishing attempts and more.


To do that, it's added a new security collection called How to Keep Your Account Secure to the Privacy Basics page.

The topics cover setting a strong password, spotting attempts to steal passwords and other info, details on how Facebook handles government requests for information, and advice on what to do if your account gets hijacked.


Rescooped by Yashy Tohsaku from AI for All
Scoop.it!

Seven guidelines for identifying and mitigating AI-enabled phishing campaigns

Seven guidelines for identifying and mitigating AI-enabled phishing campaigns | Education 2.0 & 3.0 | Scoop.it

"Phishing has always been a thorn in the side of enterprise cybersecurity, and recent AI developments such as ChatGPT are making things even worse. Here are some guidelines for dealing with the increasingly sophisticated phishing threat ..."


Via Leona Ungerer
No comment yet.
Rescooped by Yashy Tohsaku from Creative teaching and learning
Scoop.it!

Fourteen technology predictions for higher education in 2023

Fourteen technology predictions for higher education in 2023 | Education 2.0 & 3.0 | Scoop.it

"How will technologies and practices like artificial intelligence, predictive analytics, digital transformation, and change management impact colleges and universities this year? Here's what the experts told us ..."


Via Leona Ungerer
No comment yet.
Rescooped by Yashy Tohsaku from iPads, MakerEd and More in Education
Scoop.it!

Hello World - Issue 18 - CYBERSECURITY

Hello World - Issue 18 - CYBERSECURITY | Education 2.0 & 3.0 | Scoop.it

"Cybersecurity threats are increasing and changing all the time; teaching students how to protect themselves is vital. This issue spans the ethics and legalities of hacking, advice about teaching cybersecurity to primary-school children, and an introduction to quantum cryptography.

We also share some fantastic ideas for making this topic as hands-on as possible, including through using network robots, using tools and techniques used by real-life penetration testers, and by taking part in a ‘capture the flag’ competition.

Also in this issue:

- Using computational methods to analyse literature
- Developing computational thinking skills through Japanese logic puzzles
- Top tips for representing computing at school open days"

 

Download Free PDF


Via John Evans
No comment yet.
Rescooped by Yashy Tohsaku from Creative teaching and learning
Scoop.it!

Educause Top 10 IT issues: Digital transformation accelerated

Educause Top 10 IT issues: Digital transformation accelerated | Education 2.0 & 3.0 | Scoop.it

"The top IT issues for 2022 reflect two years of upheaval and uncertainty brought on by the pandemic, but also the positive aspects of digital transformation ..."


Via Leona Ungerer
No comment yet.
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

SID2020: Safer Internet Day 2020-Participation – EDU: Digital CitiZENship, CyberSecurity, eSkills, Modern EDU by Gust MEES

SID2020: Safer Internet Day 2020-Participation – EDU: Digital CitiZENship, CyberSecurity, eSkills, Modern EDU by Gust MEES | Education 2.0 & 3.0 | Scoop.it

Safer Internet Day 2020 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2020 will be celebrated on Tuesday 11 February 2020…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

 https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

 


Via Gust MEES
Gust MEES's curator insight, January 6, 2020 12:10 PM

Safer Internet Day 2020 – Save the date!. Safer Internet Day (SID) is organised by Insafe in February of each year to promote safer and more responsible use of online technology and mobile phones, especially among children and young people across the world. Safer Internet Day 2020 will be celebrated on Tuesday 11 February 2020…

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

 https://www.scoop.it/topic/securite-pc-et-internet

 

https://www.scoop.it/topic/apple-mac-ios4-ipad-iphone-and-in-security

 

https://gustmees.wordpress.com/2017/10/26/critical-thinking-and-proactive-thinking-a-must-in-modern-edu/

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Good cyber hygiene habits to help stay safe online | Norton | #CyberSecurity #DigitalResponsibility #DigitalCitiZENship

Good cyber hygiene habits to help stay safe online | Norton | #CyberSecurity #DigitalResponsibility #DigitalCitiZENship | Education 2.0 & 3.0 | Scoop.it

Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your smart devices.

Good hygiene is something you’re taught as a child and something that generally sticks with you for the rest of your life. It involves three basic principles: using products and tools that fit your hygiene needs, performing these hygienic tasks correctly, and establishing a routine.

But what is cyber hygiene and what does it have to do with your computer and connected devices?

Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.

Here are a few tips to get you and your family thinking about good cyber hygiene practices.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 


Via Gust MEES
Gust MEES's curator insight, July 11, 2019 6:42 PM

Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your smart devices.

Good hygiene is something you’re taught as a child and something that generally sticks with you for the rest of your life. It involves three basic principles: using products and tools that fit your hygiene needs, performing these hygienic tasks correctly, and establishing a routine.

But what is cyber hygiene and what does it have to do with your computer and connected devices?

Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.

Here are a few tips to get you and your family thinking about good cyber hygiene practices.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://gustmees.wordpress.com/?s=cyberhygiene

 

https://www.scoop.it/topic/securite-pc-et-internet/?&tag=Cyber-Hygiene

 

holly ledvina's curator insight, July 15, 2019 11:01 AM
Be safe online
Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

Commission Européenne | New measures to boost key competences and digital skills, as well as the European dimension of education | #ModernEDU #Digital4EDUcation #ICT #EU #Digitaltransformation #STE...

Commission Européenne | New measures to boost key competences and digital skills, as well as the European dimension of education | #ModernEDU #Digital4EDUcation #ICT #EU #Digitaltransformation #STE... | Education 2.0 & 3.0 | Scoop.it
New measures to boost key competences and digital skills, as well as the European dimension of education
Brussels, 17 January 2018

To follow up on the Gothenburg Summit, the European Commission has today adopted new initiatives to improve key competences and digital skills of European citizens, to promote common values and pupils' awareness of the functioning of the European Union.

The new proposals come only two months after European Heads of State and Government discussed education, training and culture at the Gothenburg Summit in November 2017. They are intended to reduce socio-economic inequalities, whilst sustaining competitiveness in order to build a more united, stronger and more democratic Europe.

 

1. A Council Recommendation on Key Competences for Lifelong Learning: Building on the Recommendation on Key Competences adopted in 2006, this proposal brings forward important updates reflecting the rapid evolution of teaching and learning since then. It aims to improve the development of key competences of people of all ages throughout their lives and to provide guidance to Member States on how to achieve this objective. A particular focus is placed on promoting entrepreneurial drive and innovation-oriented mindsets in order to unlock personal potential, creativity and self-initiative. Moreover, the Commission is recommending steps to foster competences in science, technology, engineering and mathematics (STEM) and motivate more young people to embark on a career in these fields. The proposals made today should also be seen as part of the answer to urgently improve European education systems to face the many challenges highlighted in the latest PISA survey. More generally, the measures will support Member States in better preparing learners for changing labour markets and for active citizenship in more diverse, mobile, digital and global societies.

 

2. A Digital Education Action Plan that outlines how the EU can help people, educational institutions and education systems better adapt to life and work in an age of rapid digital change by:

making better use of digital technology for teaching and learning;

developing the digital competences and skills needed for living and working in an age of digital transformation; and

improving education through better data analysis and foresight.

 

Initiatives include supporting schools with high-speed broadband connections, scaling up a new self-assessment tool for schools on the use of technology for teaching and learning (SELFIE) and a public awareness campaign on online safety, media literacy and cyber hygiene.

 

3. A Council Recommendation on common values, inclusive education and the European dimension of teaching: This initiative proposes ways in which education can help young people understand the importance of and adhere to common values set out in Article 2 of the Treaty of the European Union. It aims at strengthening social cohesion and contributing to fight the rise of populism, xenophobia, divisive nationalism and the spreading of fake news. The proposal also strengthens inclusive education to promote quality education for all pupils as well as the European dimension of teaching, so children also learn about Europe's common heritage and diversity and get a good understanding of the functioning of the EU. To support these aims, the Commission will take steps to increase virtual exchanges among schools, notably through the successful e-Twinning network, and boost school mobility through the Erasmus+ programme.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=EU

 


Via Gust MEES
Gust MEES's curator insight, January 31, 2018 10:07 AM
New measures to boost key competences and digital skills, as well as the European dimension of education
Brussels, 17 January 2018

To follow up on the Gothenburg Summit, the European Commission has today adopted new initiatives to improve key competences and digital skills of European citizens, to promote common values and pupils' awareness of the functioning of the European Union.

The new proposals come only two months after European Heads of State and Government discussed education, training and culture at the Gothenburg Summit in November 2017. They are intended to reduce socio-economic inequalities, whilst sustaining competitiveness in order to build a more united, stronger and more democratic Europe.

 

1. A Council Recommendation on Key Competences for Lifelong Learning: Building on the Recommendation on Key Competences adopted in 2006, this proposal brings forward important updates reflecting the rapid evolution of teaching and learning since then. It aims to improve the development of key competences of people of all ages throughout their lives and to provide guidance to Member States on how to achieve this objective. A particular focus is placed on promoting entrepreneurial drive and innovation-oriented mindsets in order to unlock personal potential, creativity and self-initiative. Moreover, the Commission is recommending steps to foster competences in science, technology, engineering and mathematics (STEM) and motivate more young people to embark on a career in these fields. The proposals made today should also be seen as part of the answer to urgently improve European education systems to face the many challenges highlighted in the latest PISA survey. More generally, the measures will support Member States in better preparing learners for changing labour markets and for active citizenship in more diverse, mobile, digital and global societies.

 

2. A Digital Education Action Plan that outlines how the EU can help people, educational institutions and education systems better adapt to life and work in an age of rapid digital change by:

  • making better use of digital technology for teaching and learning;

  • developing the digital competences and skills needed for living and working in an age of digital transformation; and

  • improving education through better data analysis and foresight.

 

Initiatives include supporting schools with high-speed broadband connections, scaling up a new self-assessment tool for schools on the use of technology for teaching and learning (SELFIE) and a public awareness campaign on online safety, media literacy and cyber hygiene.

 

3. A Council Recommendation on common values, inclusive education and the European dimension of teaching: This initiative proposes ways in which education can help young people understand the importance of and adhere to common values set out in Article 2 of the Treaty of the European Union. It aims at strengthening social cohesion and contributing to fight the rise of populism, xenophobia, divisive nationalism and the spreading of fake news. The proposal also strengthens inclusive education to promote quality education for all pupils as well as the European dimension of teaching, so children also learn about Europe's common heritage and diversity and get a good understanding of the functioning of the EU. To support these aims, the Commission will take steps to increase virtual exchanges among schools, notably through the successful e-Twinning network, and boost school mobility through the Erasmus+ programme.

 

Learn more / En savoir plus / Mehr erfahren:

 

https://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=EU

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

IoT: Don't Forget Privacy And Security While Racing To The Price Bottom

IoT: Don't Forget Privacy And Security While Racing To The Price Bottom | Education 2.0 & 3.0 | Scoop.it
There is no doubt that companies of all shapes and sizes are increasing their spend in internet-of-things (IoT) technology. In fact, IDC projects this to be a $1.4 trillion market by 2021. With the increased spend and demand by consumers for low-price and high-value IoT devices, makers of these connected technologies have put a premium on affordability. The race to the bottom on price has inadvertently created major risks for organizations and consumers, according to PwC’s “Uncovering the Potential of the Internet of Things” report.

The pressure is on, and we see many makers of connected devices that produce IoT products as inexpensively as possible skipping important steps such as the design of security and privacy protections. This is generating significant new risks that are not widely understood during a time when consumers are more concerned about price than privacy and security. Risks include physical, software, encryption and network attacks, all of which could have wide-ranging effects on our daily lives, from taking over a connected car to obtaining sensitive data from a connected home to accessing a private network via a wearable device.

 

Also, there are societal concerns, including getting access to valuable intellectual property, sabotage to companies or governments and espionage. Consumer-focused companies need to ensure they are meeting their customers’ concerns. Simply put, the proper cybersecurity and privacy measures can aid businesses in seeing the full potential of IoT.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 


Via Gust MEES
Gust MEES's curator insight, October 9, 2017 1:22 PM
There is no doubt that companies of all shapes and sizes are increasing their spend in internet-of-things (IoT) technology. In fact, IDC projects this to be a $1.4 trillion market by 2021. With the increased spend and demand by consumers for low-price and high-value IoT devices, makers of these connected technologies have put a premium on affordability. The race to the bottom on price has inadvertently created major risks for organizations and consumers, according to PwC’s “Uncovering the Potential of the Internet of Things” report.

The pressure is on, and we see many makers of connected devices that produce IoT products as inexpensively as possible skipping important steps such as the design of security and privacy protections. This is generating significant new risks that are not widely understood during a time when consumers are more concerned about price than privacy and security. Risks include physical, software, encryption and network attacks, all of which could have wide-ranging effects on our daily lives, from taking over a connected car to obtaining sensitive data from a connected home to accessing a private network via a wearable device.

 

Also, there are societal concerns, including getting access to valuable intellectual property, sabotage to companies or governments and espionage. Consumer-focused companies need to ensure they are meeting their customers’ concerns. Simply put, the proper cybersecurity and privacy measures can aid businesses in seeing the full potential of IoT.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?&tag=IoT

 

http://www.scoop.it/t/securite-pc-et-internet/?&tag=iot

 

Rescooped by Yashy Tohsaku from Westminster International College Assignment Help
Scoop.it!

Smart Cities Infographic | #Privacy #IoT #IoE #InternetOfThings #ICT 

Smart Cities Infographic | #Privacy #IoT #IoE #InternetOfThings #ICT  | Education 2.0 & 3.0 | Scoop.it

Via Gust MEES, ava smith
Rescooped by Yashy Tohsaku from The 21st Century
Scoop.it!

Why You Really Need to Stop Using Public Wi-Fi

Why You Really Need to Stop Using Public Wi-Fi | Education 2.0 & 3.0 | Scoop.it
Especially when you’re traveling for business.

Via Dr. Susan Bainbridge
Rescooped by Yashy Tohsaku from ICT Security-Sécurité PC et Internet
Scoop.it!

Lone hacker Rasputin breaches 60 universities, federal agencies | #CyberSecurity

Lone hacker Rasputin breaches 60 universities, federal agencies | #CyberSecurity | Education 2.0 & 3.0 | Scoop.it
Rasputin has danced around the defenses of organizations from NYU and Oxford to the Oklahoma state government.

 

Rasputin, believed to be a Russian hacker, is most well-known for the December 2016 attack against the US Electoral Assistance Commission through an unpatched SQL injection (SQLi) vulnerability.

 

At the time, the hacker offered to sell access to the system to a Middle Eastern broker, and according to researchers, the hacker is also attempting to sell access to systems he has compromised in his latest round of attacks.

Rasputin's latest victims, revealed by cybersecurity firm Recorded Future, span across both the United Kingdom and the United States.

 

Universities are a top target, with Cornell University, the New York University (NYU), Purdue University, Michigan State University, the Rochester Institute of Technology and the University of Washington among those affected in the US.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 


Via Gust MEES
Gust MEES's curator insight, February 16, 2017 11:26 AM
Rasputin has danced around the defenses of organizations from NYU and Oxford to the Oklahoma state government.

 

Rasputin, believed to be a Russian hacker, is most well-known for the December 2016 attack against the US Electoral Assistance Commission through an unpatched SQL injection (SQLi) vulnerability.

 

At the time, the hacker offered to sell access to the system to a Middle Eastern broker, and according to researchers, the hacker is also attempting to sell access to systems he has compromised in his latest round of attacks.

Rasputin's latest victims, revealed by cybersecurity firm Recorded Future, span across both the United Kingdom and the United States.

 

Universities are a top target, with Cornell University, the New York University (NYU), Purdue University, Michigan State University, the Rochester Institute of Technology and the University of Washington among those affected in the US.

 

Learn more / En savoir plus / Mehr erfahren:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=Universities

 

Rescooped by Yashy Tohsaku from 21st Century Learning and Teaching
Scoop.it!

The 9 Elements of Digital Citizenship | Infographic | eSkills | ICT | EDUcation

The 9 Elements of Digital Citizenship | Infographic | eSkills | ICT | EDUcation | Education 2.0 & 3.0 | Scoop.it

With the wide variety of resources available for teachers, there’s no reason we shouldn’t be promoting the importance of behaving safely and responsibly in the digital world. Speaking of resources, check out the nifty infographic shown, one that can be used to address various aspects of digital citizenship.


Learn more:


https://gustmees.wordpress.com


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2014/10/11/learning-to-become-a-good-digital-citizen-digital-citizenship/



Via Gust MEES
hamidreza's curator insight, May 11, 2015 9:37 AM
http://www.persianplastco.com/Default.aspx?lang=fa&page=203&paggenumber=203
Barbara mayo's curator insight, May 11, 2015 11:44 AM

Strength: the design is very creative

Weakness: I don't understand why they represent Spider-Man in this. Also the words are very jammed packed, causing this to look clustered. 

Francine White's curator insight, May 12, 2015 11:26 AM

Positive: cool topic

negative: a little jumbled & not well organized