Searching for "security"

industry 4.0 and IOT

The Internet of Things will power the Fourth Industrial Revolution. Here’s how

https://medium.com/world-economic-forum/the-internet-of-things-will-power-the-fourth-industrial-revolution-heres-how-39932f03df1

By 2020 more than 50 billion things, ranging from cranes to coffee machines, will be connected to the internet. That means a lot of data will be created — too much data, in fact, to be manageable or to be kept forever affordably.

One by-product of more devices creating more data is that they are speaking lots of different programming languages. Machines are still using languages from the 1970s and 80s as well as the new languages of today. In short, applications need to have data translated for them — by an IoT babelfish, if you will — before they can make sense of the information.

Then there are analytics and data storage.

security becomes even more important as there is little human interaction in the flow of data from device to datacentre — so called machine-to-machine communication.

 

+++++++++++++++++++
more on IOT in this IMS blog
https://blog.stcloudstate.edu/ims?s=iot

more on industry 4.0 in this IMS blog
https://blog.stcloudstate.edu/ims?s=industrial+revolution

not on your work computer

6 things you should never do on your work computer

Amy Elisa Jackson, Glassdoor Mar. 15, 2017, 10:45 AM

http://www.businessinsider.com/things-you-should-never-do-on-your-work-computer-2017-3

cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.

  1. DON’T: Save personal passwords in your work device keychain.
  2. DON’T: Make off-color jokes on messaging software.
  3. DON’T: Access free public wi-fi while working on sensitive material.
  4. DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
  5. DON’T: Store personal data.
  6. DON’T: Work on your side hustle while at the office.

++++++++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims?s=surveillance

K12 cyber incidents

K–12 Cyber Incidents Have Been Increasing in 2017

The creator of a national K–12 Cyber Incident Map warns that schools should act now, not later, to bolster their security.

By Richard Chang 06/08/17

https://thejournal.com/articles/2017/06/08/k12-cyber-incidents-have-been-increasing-in-2017.aspx

Ed Tech Strategies' K–12 Cyber Incident Map. Courtesy of Doug Levin.

K–12 Cyber Incident Map , Doug Levin, president of Ed Tech Strategies

Levin has been tracking the publicly disclosed K–12 incidents on a color-coded map on his website, edtechstrategies.com. His sources include media reports, DataBreaches.net and the Privacy Rights Clearinghouse.

In a post published this week on the newly revamped Ferpa Sherpa education privacy site, Levin argues that not only have schools been “experiencing an increasing number of cyber incidents,” but “the range of cyber threats affecting schools appears to be diverse and shifting over time.”

K12 cyber incidents 2016 to present

concrete steps schools can take to improve their security, such as:

  • Use special software or hardware to protect data;
  • Create better password and authorization policies;
  • Use secondary authentication methods;
  • Train school staff, particularly about phishing and downloading of unfamiliar files; and
  • Hire more staff with IT security expertise.

++++++++++++++++++++
more on cyber security in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

IoT

Survey: IoT Overtakes Mobile as Security Threat

By Rhea Kelly 06/05/17

https://campustechnology.com/articles/2017/06/05/survey-iot-overtakes-mobile-as-security-threat.aspx

a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.

  • 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
  • 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
  • 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
  • Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
  • 16 percent do not have an incident response plan.
  • 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
  • 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
  • More than half say cyber security professionals “lack an ability to understand the business”;
  • One in four organizations allot less than $1,000 per cyber security team member for training; and
  • About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.

++++++++++++++++++++++++++

IoT to Represent More Than Half of Connected Device Landscape by 2021

By Sri Ravipati 06/09/17

https://campustechnology.com/articles/2017/06/09/iot-to-represent-more-than-half-of-connected-device-landscape-by-2021.aspx

20121 prediction for data in North America

analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.

  • IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
  • Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
  • Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.

To learn more, view the full report.

+++++++++++++++++++++++++++

5 ways to use the Internet of Things in higher ed

By Danielle R. June 14th, 2017
 1. Labeling and Finding
 campus’ buildings were able to transmit interactive map data to a student finding their way around for the first time
2. Booking and Availability
3. Preparation
4. Intervention
As FitBit and other personal wearables become better at tracking various health markers, these markers can be put to use tracking individual patterns in the student body.
 The University of Southern California is currently researching the impact that analyzing IoT-gathered data can have on student performance, but the IoT can be used to prevent more than just academic difficulties.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.

+++++++++++++++++++++
https://blog.stcloudstate.edu/ims?s=internet+of+things
https://blog.stcloudstate.edu/ims?s=iot 

big data in ed

New Report Examines Use of Big Data in Ed

By Dian Schaffhauser  05/17/17

https://campustechnology.com/articles/2017/05/17/new-report-examines-use-of-big-data-in-ed.aspx

new report from the National Academy of Education “Big Data in Education,” summarizes the findings of a recent workshop held by the academy

three federal laws: Family Educational Rights and Privacy Act (FERPA), the Children’s Online Privacy Protection Act (COPPA) and the Protection of Pupil Rights Amendment (PPRA).

over the last four years, 49 states and the District of Columbia have introduced 410 bills related to student data privacy, and 36 states have passed 85 new education data privacy laws. Also, since 2014, 19 states have passed laws that in some way address the work done by researchers.

researchers need to get better at communicating about their projects, especially with non-researchers.

One approach to follow in gaining trust “from parents, advocates and teachers” uses the acronym CUPS:

  • Collection: What data is collected by whom and from whom;
  • Use: How the data will be used and what the purpose of the research is;
  • Protection: What forms of data security protection are in place and how access will be limited; and
  • Sharing: How and with whom the results of the data work will be shared.

Second, researchers must pin down how to share data without making it vulnerable to theft.

Third, researchers should build partnerships of trust and “mutual interest” pertaining to their work with data. Those alliances may involve education technology developers, education agencies both local and state, and data privacy stakeholders.

Along with the summary report, the results of the workshop are being maintained on a page within the Academy’s website here.

+++++++++++++++++
more on big data in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=big+data

phishing

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure

L Date of Publication: 04.18.17.

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure

You know by now to check your browser while visiting a site to be sure it sports the little green padlock indicating TLS encryptionhttps://en.wikipedia.org/wiki/Transport_Layer_Security

 

+++++++++++++
more on phishing in this IMS blog
https://blog.stcloudstate.edu/ims?s=phishing

mobile apps for libraries

Apps for Librarians: Empower Your Users with Mobile App Literacy eCourse
Nicole Hennig
Item Number: 1541-9076  Publisher: ALA Editions Price: $250.00

http://www.alastore.ala.org/detail.aspx?ID=11270&zbrandid=4634&zidType=CH&zid=42706629&zsubscriberId=1026665847&zbdom=http://ala-publishing.informz.net

Estimated Hours of Learning: 28
Certificate of Completion available upon request

Learning outcomes

After participating in this eCourse, you will:

  • Gain experience using some of the best apps available and understand how they enable learning
  • Learn how to evaluate and review mobile apps
  • Learn how tablets complement laptops, and how their capabilities are creating new learning opportunities
  • Learn how apps are being used by people with special needs, and where to find additional resources for learning more
  • Receive guidance for creating your own app guides, offering workshops, and advising colleagues

In this 5-week eCourse, you’ll learn about the most useful apps available on tablet and mobile devices and how they can be applied in your library to create the best learning experiences for your patrons and students.

Mobile apps are empowering for people of all ages and abilities. Contrary to the popular idea that apps are only useful for “consumption,” the best apps are being used effectively as tools to enable learning and knowledge creation. In this eCourse, Nicole Hennig will show you how to incorporate apps as learning tools at your library.

eCourse Outline

Week 1 – E-Reading

The Apps

  • Book reading
  • Magazine reading
  • Apps for Reading PDFs, web pages, and news feeds
  • Individual book apps

Readings & Discussion

  • Readings about e-reading & future of the book
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 2 – Productivity & Writing

The Apps

  • Productivity
    • Cloud storage, passwords, to do lists, notes
    • Handwriting, speech recognition, scanning, barcodes
  • Writing & Presenting
    • Word processing, spreadsheets, slides
    • More presentation apps

Readings & Discussion

  • Readings about security, writing, mobile apps in academia
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 3 – Reference

The Apps

  • Dictionaries, encyclopedias
  • Unit converters, maps, languages
  • Specialized reference apps
  • Subscription databases & citations

Readings & Discussion

  • Readings about jailbreaking, platforms, & mobile web
  • Apple’s iOS Human Interface Guidelines
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 4 – Multimedia

The Apps

  • Art viewing
  • Art creation
  • Photography and photo editing
  • Music listening
  • Music creation
  • Video viewing and editing

Readings & Discussion

  • Readings about technology & children
  • Your thoughts on the readings (discussion forum)
  • Optional app review assignment

Week 5 – Accessibility & More

Accessibility features of mobile devices

Readings & Discussion

  • Readings about assistive technology
  • Your thoughts on the readings (discussion forum)

Idea generation assignment

  • Ideas for using apps in library programs & services
  • Apps that wow

How this eCourse Works

The eCourse begins on June 5, 2017. Your participation will require approximately five to six hours a week, at times that fit your schedule. All activities take place on the website, and you will be expected to:

  • Read, listen to or view online content
  • Post to online discussion boards
  • Complete weekly assignments or activities

Instructor Nicole Hennig will monitor discussion boards regularly during the five-week period, lead group discussions, and will also answer individual questions. All interaction will take place on the eCourse site, which will be available 24 hours a day, 7 days a week. It’s recommended that students log into the site on the first day of class or within a few days for an overview of the content and to begin the first lesson.

+++++++++++++
more on mobile apps in this IMS blog
https://blog.stcloudstate.edu/ims?s=mobile+apps

K12 mobile learning

CoSN Survey: Mobile Learning Top Priority for K–12 IT Leaders

By Richard Chang 04/04/17

https://thejournal.com/articles/2017/04/04/cosn-survey-mobile-learning-top-priority-for-k12-it-leaders.aspx

Mobile learning is the top priority for K–12 IT leaders, according to the fifth annual K–12 IT Leadership Survey published by the Consortium for School Networking (CoSN).

It’s the first time mobile learning ranked as the highest priority in the survey. The No. 2 priority is broadband and network capacity, which ranked first last year, and the No. 3 priority is cybersecurity and privacy, with 62 percent of respondents rating them more important than last year.

  • Understaffing remains a key issue for technology departments in school systems.
  • Single sign-on (SSO) is the most implemented interoperability initiative
  • More than one-third of IT leaders expressed no interest in bring your own device (BYOD) initiatives, up from 20 percent in 2014.
  • Interest in open educational resources (OER) is high
  • Education technology experience is common among IT leaders
  • Strong academic backgrounds are also prevalent among IT leaders.
  • Lack of diversity continues to be an issue for school district technology leaders.

CoSN is a nonprofit association for school system technology leaders. To read or download the full IT leadership survey, visit this CoSN site.

+++++++++++++++++++
more on mobile learning in this IMS blog
https://blog.stcloudstate.edu/ims?s=mobile+learning

7 blogging tools

7 Blogging Tools for Teachers Compared and Ranked – Updated for 2017

http://www.freetech4teachers.com/2017/02/7-blogging-tools-for-teachers-compared.html

here as a Google Doc

1. Blogger – It’s free and easy to set-up. It can be integrated into your Google Apps for Education account which means that you and your students can use the same usernames and passwords that they use in all other Google tools. You can make your blog private (up to 100 members invited by email). The drawback to it is that a lot of school filters flag it as “social media” and block it on those grounds.

1a. Edublogs – Probably the best option for elementary school and middle school use. Blogs and individual blog posts can be made private, password-protected, or public. You can create and manage your students’ accounts. The latest version of Edublogs allows all users to include videos in blog posts. Outstanding customer support.

2. Weebly for Education – It’s free to have up to 40 students in your account. You can manage your students’ accounts. You can have students contribute to a group blog and or let them manage their own individual blogs.

3. SeeSaw.me – SeeSaw was originally launched as a digital portfolio tool. The addition of a blogging component was made in January 2016. The blogging component of SeeSaw allows you to import and display your students’ digital artifacts publicly or privately. There is not much you can do with SeeSaw in terms of customization of layout and color scheme.

4. WordPress.org – If you have the technical accumen or the time to learn it (it’s not that hard), self-hosting a blog that runs on WordPress software will give you the ultimate in control and flexibility. You will be able to create and manage student accounts, have a nearly infinite variety of customizations, and you’ll be able to move your blog from server to server whenever you want to. That said, you will have to pay for hosting (or convince your school to give you server space) and you will be responsible for maintaining security updates and backing-up your blog regularly.

5. Kidblog – Allows you to manage your students’ accounts. Requires you to pay for a subscription in order to get the features that you really want. Those features include embedding videos and other media from third party sites. Powered by WordPress software.

6. WordPress.com – It’s easy to use and is free, but with some serious limitations at the free level. The free version displays advertising on your blog which you cannot control. The free version also doesn’t allow embedding content from many third-party sites.

++++++++++++++
more on blogging in this IMS blog
https://blog.stcloudstate.edu/ims?s=blog

Susan Grajek at Bryan Alexander on IT and education

Susan Grajek at Bryan Alexander on IT and education

Forum takes a deep dive into higher education and technology. On Thursday, March 23rd, from 2-3 pm EST we will be joined by Susan Grajek, the vice president for communities and research at EDUCAUSE

+++++++++++++++++++

Top 10 IT Issues, 2017: Foundations for Student Success

1 13 14 15 16 17 21