Searching for "security"
Girl Scouts to Earn Badges in Cybersecurity
The education program is being developed in a partnership between the Girl Scouts and Palo Alto Networks. Jun 23, 2017
https://securitytoday.com/articles/2017/06/23/girl-scouts-to-earn-badges-in-cybersecurity.aspx
The education program, which aims to reach as many as 1.8 million Girl Scouts in kindergarten through sixth grade, is being developed in a partnership between the Girl Scouts and Palo Alto Networks, a security company, the organization said in a press release.
++++++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity
You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era
By Jacob Batchelor 06/01/17
https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx
Here’s an easy way to explain IoT hacks to students:
- A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
- The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
- The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
- Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
- Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
- Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
- Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.
a few tips that students can use to protect their privacy while using smartphones:
- Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
- Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
- Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
- Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.
++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker
Grant program would support state, local cybersecurity
By Mark Rockwell Mar 02, 2017
https://fcw.com/articles/2017/03/02/state-cyber-bill-rockwell.aspx
The proposed legislation, said the lawmakers, would set up a cybersecurity grant program that would provide resources for states to develop and implement effective cyber resiliency plans, including efforts to identify, detect, protect, respond, and recover from cyber threats. It also would encourage development of a stronger cybersecurity workforce.
++++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity
Berkeley Launches Online Master of Information and Cybersecurity
By Joshua Bolkan 11/16/16
https://campustechnology.com/articles/2016/11/16/berkeley-launches-online-master-of-information-and-cybersecurity.aspx
The University of California, Berkeley’s School of Information (I School) has tapped a private partner to help launch a new online program, Master of Information and Cybersecurity (MICS).
Dubbed cybersecurity@berkeley, the new program was developed in collaboration with the university’s Center for Long-Term Cybersecurity and College of Engineering.
The 27-unit course will use 2U’s online learning platform for live, weekly meetings. Between sessions, students will have access to interactive content designed by MICS faculty. Students will also have the opportunity to visit campus to meet faculty and classmates and attend lectures and workshops curated specifically for students in the program.
++++++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity
IP‐Please, design and development of an educational game on IT‐security
Peter Mozelius, Charlotte Lesley and Ola Olsson
Department of Computer and Systems Sciences, Stockholm University, Sweden
https://www.researchgate.net/publication/308947931_IP-Please_design_and_development_of_an_educational_game_on_IT-security
Abstract:
Game‐based learning is a research field with rich discussions on the use of games in educational contexts. Many of the educational games that exist today focus on subjects such
as Language learning, Mathematics and History, and fewer on subjects in Computer Science
and IT‐security. Dissemination of information about IT‐security is important in today’s digital
society not at least in the industry. As an example many firewalls today are misconfigured
leading to decreased security at the same time as it is hard to motivate students or employees to read long detailed and tedious PDF‐files with security information. Might
things like firewall configuration instead be learnt by an educational game and how to design
a learning game that could be used in university courses on IT‐security?
++++++++++++++++++
more on gaming and gamification in this blog:
https://blog.stcloudstate.edu/ims?s=gaming
https://blog.stcloudstate.edu/ims?s=gamification
Survey: Growing Interest in Cyber Security Careers Among Millennials
By Leila Meyer 10/12/16
https://campustechnology.com/articles/2016/10/12/survey-growing-interest-in-cyber-security-careers-among-millennials.aspx
new report from Raytheon and the National Cyber Security Alliance
The report, “Securing Our Future: Closing the Cybersecurity Talent Gap,” surveyed 3,779 adults aged 18 to 26, from 12 countries around the world, including the United States, Australia, the United Kingdom, and countries in Europe, Asia and the Middle East.
a high-paying career as a cyber security professional requires skills millennials value, such as problem solving, analytical thinking and communication — and employment opportunities are available across a wide variety of sectors, including start-ups, government and hospitals.
Key findings from the report:
- 64 percent of young adults in the U.S. heard about cyberattacks in the news last year, up from 36 percent the previous year, and compared to 48 percent of young adults worldwide;
- 70 percent of millennials in the U.S. said cyber security programs or activities are available to them, up from 46 percent the previous year, and compared to 68 percent worldwide;
- 21 percent of young men expressed interest in cyber competitions, compared to 15 percent of women;
- 48 percent or respondents said more information about the specifics of cyber security jobs would help increase interest;
- 59 percent of young men and 51 percent of young women received formal cyber safety lessons in school, up from 43 percent and 40 percent respectively last year; and
- 40 percent of respondents said parents are the most influential people helping them with career advice, and 19 percent said no one was influential in helping them with career advice.
++++++++++++++++++++++++
more on cybersecurity in this blog
https://blog.stcloudstate.edu/ims?s=cybersecurity
Senate stalls on cybersecurity bill
http://fcw.com/articles/2015/08/05/cisa-senate.aspx?s=fcwdaily_060815
http://fcw.com/articles/2014/09/23/online-privacy-new-security-paradigm.aspx
Verizon’s 2014 Data Breach Investigations Report,
Fragmentation of online identity means that we as online users are forced to struggle with proliferating accounts and passwords. And we are regularly required to reveal sensitive information about ourselves and repeatedly enter the same information to create accounts that establish new, disparate online identities.
Establishing a system for trust management requires a common infrastructure for specifying policies that can protect yet enable access to data and systems, representing identities and credentials, and evaluating and enforcing an organization’s policies — all while maintaining privacy.
https://www.cnet.com/news/privacy/india-orders-vpn-companies-to-collect-and-hand-over-user-data/
A new government order will force virtual private networks to store user data for five years or longer.
The directive isn’t limited to VPN providers. Data centers and cloud service providers are both listed under the same provision. The companies will have to keep customer information even after the customer has canceled their subscription or account.
India has a history of applying a heavy hand to online activity.
In April, India banned 22 YouTube channels. In 2021, Facebook, Google Twitter ended a tense stand-off with the Indian government when they largely complied with the government’s expanded control over social media content in the country. In 2020, the country banned over 200 Chinese apps, including TikTok, and ultimately banned 9,849 social media URLs.
14 Predictions for Higher Education in 2022
https://campustechnology.com/articles/2022/01/04/14-predictions-for-higher-education-in-2022.aspx
Forget Hyflex
our faculty will discover that effectively teaching in a hyflex environment without adequate support is extremely difficult and truly exhausting.
Adapt Hyflex — and Be Ready for Anything (security)
Move Beyond Zoom into the Metaverse
Reap the Rewards of 2 Years of Strategic Decision-Making
campus leaders who have intentionally put students at the center of organization and system design will reap a great reward.
Expect More Disruption and More Innovation
look for movement in the augmented and virtual reality space.
Online Ed Becomes the Norm
online education will become the norm rather than the step-sister of “traditional” education
Build Off the Threads that Are Here to Stay
Alternatives Will Continue Gaining Ground
The cultures within institutions may prevent these significant changes from occurring. If that occurs, alternatives will continue to build momentum.
Emphasize Choice and Support
Alumni will be looking for upskilling opportunities via microcredentials, to navigate growth and career change during the “Great Resignation.” Recent high school grads will expect a variety of online, hybrid and in-person courses to choose from, many bringing with them years of experience with virtual learning.
Students Need Faster Routes to Completion
Climate Change Ed Gets Embedded
Hybrid Learning Tech Will Step Up
many lecture theaters might come to look like professional TV studios, to meet growing quality and usability expectations. Also, technologies will likely be expected to make classrooms environments more “peer-learning friendly” and inclusive
Blockchain Will Gain Ed Pickup
The (Arizon State) university announced that in 2022 it would release Pocket, a digital wallet for students as a comprehensive learner record.