Searching for "security"

REP in digital citizenship

Digital citizenship is more important than ever

By Mike Ribble 9/15/2015

R is for respect yourself and others. 

Etiquette. Students need to understand how their technology use affects others. Remind them that there is a person on the other end of their text, tweet, comment or post.

Access. Not everyone has the same opportunities with technology, whether the issue is  physical, socio-economic or location. Those who have more access to technology need to help those who don’t.

Law. The ease of using online tools has allowed some people to steal, harass and cause problems for others online. Students need to know they can’t take content without permission, or at least give credit to those who created it.

E is for educating yourself and others. 

Literacy. Learning happens everywhere. Regardless of whether we get our information from friends, family or online, we need to be aware that it might not be correct. Students need to understand technology and what it can do and be willing to learn new skills so they can use it properly.

Communication. Knowing when and where to use technology is important. Using email, text or social media may not be the best method for interacting with someone. Students need to think about the message first, then the method, and decide if the manner and audience is appropriate.

Commerce. Technology allows us to buy and sell across the globe. Students should be careful about sharing personal and credit card information. Online commerce comes with risks.

P is for protecting yourself and others.

Rights and responsibilities. Build trust so that if something happens online, students are willing to share their problems or concerns about what has happened. Students should know who they are friends with on social networking sites so that they can remain safe online.

Security. It is everyone’s responsibility to guard their tools and data by having software and applications that protect them from online intruders. When we are all connected, everyone is responsible for security.

Health and wellness. There needs to be a balance between the online world and the real world. Students should establish limits with technology and spend quality face-to-face time with friends and family.

++++++++++++++++++++

More on digital citizenship in this blog:

https://blog.stcloudstate.edu/ims?s=digital+citizenship

ransomware

Adobe issues emergency update to Flash after ransomware attacks

http://www.reuters.com/article/us-adobe-systems-cyber-ransomware-idUSKCN0X502K

Ransomware

https://en.wikipedia.org/wiki/Ransomware

Ransomware is a type of malware that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction. Some forms of ransomware systematically encrypt files on the system’s hard drive, which become difficult or impossible to decrypt without paying the ransom for the encryption key, while some may simply lock the system and display messages intended to coax the user into paying. Ransomware typically propagates as a trojan, whose payload is disguised as a seemingly legitimate file.

Beware the Rise of Ransomware

Kim Boatman

http://us.norton.com/yoursecurityresource/detail.jsp?aid=rise_in_ransomware

your social media account cracked

This is what happens when someone hacks your Spotify account

surveillance and privacy

FBI quietly changes its privacy rules for accessing NSA data on Americans

Classified revisions accepted by secret Fisa court affect NSA data involving Americans’ international emails, texts and phone calls

The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.

Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…

More on privacy in this IMS blog:
https://blog.stcloudstate.edu/ims/page/2/?s=privacy&submit=Search

more on surveillance in this IMS blog:
https://blog.stcloudstate.edu/ims/?s=surveillance&submit=Search

denial of sleep attacks

Security Tops List of Trends That Will Impact the Internet of Things

By David Nage 02/25/16

https://campustechnology.com/articles/2016/02/25/security-tops-list-of-trends-that-will-impact-the-internet-of-things.aspx

Are you ready to deal with “denial of sleep” attacks? Those are attacks using malicious code, propagated through the Internet of Things, aimed at draining the batteries of your devices by keeping them awake.

  1. Security. threats extend well beyond denial of sleep: “The IoT introduces a wide range of new security risks and challenges to the IoT devices themselves, their platforms and operating systems, their communications, and even the systems to which they’re connected.
  2. Analytics. IoT will require a new approach to analytics. “New analytic tools and algorithms are needed now, but as data volumes increase through 2021, the needs of the IoT may diverge further from traditional analytics,” according to Gartner.
  3. Device (Thing) Management. IoT things that are not ephemeral — that will be around for a while — will require management like every other device (firmware updates, software updates, etc.), and that introduces problems of scale.
  4. Low-Power, Short-Range IoT Networks. Short-range networks connecting IT devices will be convoluted. There will not be a single common infrastructure connecting devices.
  5. Low-Power, Wide-Area Networks. Current solutions are proprietary, but standards will come to dominate.
  6. Processors and Architecture. Designing devices with an understanding of those devices’ needs will require “deep technical skills.”
  7. Operating Systems. There’s a wide range of systems out there that have been designed for specific purposes.
  8. Event Stream Processing.  “Some IoT applications will generate extremely high data rates that must be analyzed in real time.
  9. Platforms. “IoT platforms bundle many of the infrastructure components of an IoT system into a single product.
  10. Standards and Ecosystems. as IoT devices proliferate, new ecosystems will emerge, and there will be “commercial and technical battles between these ecosystems” that “will dominate areas such as the smart home, the smart city and healthcare.

digital literacy for EDAD

one-credit courses on digital literacy offered for the School of Education department for Educational Leadership

====================================================

EDAD 697Introduction to Educational Technology

1 credit, summer 2016

Technology forecast for education: https://blog.stcloudstate.edu/ims/2016/01/27/4710/

Course Description

This synchronous online course will introduce school administrators to the multitude and complexity of educational technology issues. Through group discussions and exercises, the course will focus on the development of knowledge, skills and depositions to effective professional practice in educational leadership. The goal of the course is to develop knowledge and understanding of appropriate application of technology in the teaching and learning process and in the management of educational programs.
Information and experience in the course will include review of the latest trends in technology. Familiarity to acquisition of expertise will be sought in understand and use of Web 2.0 and Web 3.0, as well as social media, multimedia and interactivity and how it affects school life as well as the role of the educational leader. Specific attention will be paid to the importance and ability to develop and maintain policies, which reflect the ever-changing world of technology. Auxiliary, but no less important issues such as legal issues, copyright issues, ethics and other forms of digital citizenship will be discussed.

Course Objectives:

Upon successful completion of this course the student will:

Course Objective Knowledge Skill Disposition Impact
1.      Demonstrate knowledge and the use of related technologies appropriate to the management of a school # o o
2.      Demonstrate knowledge and the use of related technologies appropriate to the instructional program of a school # o o
3.      Demonstrate knowledge and the use of various types of related technologies for supporting the instructional program of the school # o o
4.      Demonstrate knowledge of planning and management procedures and policies for the appropriate use of technological resources to serve the mission of the school # o o
5.      Demonstrate knowledge of common computer and related technological applications # o o
6.      Identify gender & diversity issues related to technology in education o o o
7.      Demonstrate knowledge of adaptive technology devices for individuals with special needs o o o o
8.      Demonstrate skill in the use of technology for materials preparation, presentations, record keeping, computation, communication, information / data collection and management, and the effective use of the Internet o o o
9.      Demonstrate an understanding of legal issues, including copyright issues, related to educational technology o o
10.  Demonstrate an understanding of the importance of ethical practice in the use of technology o o
11.  Demonstrate knowledge and understanding of administrative policies and procedures that promote appropriate utilization of technology by school personnel o o o
12.  Demonstrate familiarity with appropriate professional standards related to educational leadership and technology o o o o
13.  Demonstrate an understanding of the digital age learning culture, digital citizenship in particular o o

 

# http://ed.mnsu.edu/edleadership/docs/license_competencies/K-12_Principal_Competencies_revised_8_22_08.pdf

National Educational Technology Standards for Administrators.

http://www.iste.org/standards/ISTE-standards/standards-for-administrators

Demonstrate familiarity with appropriate professional standards related to educational leadership and technology
http://www.ccsso.org/Documents/2015/ProfessionalStandardsforEducationalLeaders2015forNPBEAFINAL.pdf

Resources On Line

IMS Technology blog: https://blog.stcloudstate.edu/ims/

Twitter: #edtech ; #edtechchat ; #edtechUK; @Edtech_K12

Facebook: #edtech ;  #edleadership

Pinterest #edtech; #edleadership ; #edtechleadership

Agency for Instructional Technology             http://www.ait.net

Center for Technology and Teacher Education            http://www.teacherlink.org

Center for Children and Technology            http://www.edc.org/CCT/

T.H.E. Journal (Technology Horizons in Education Online Journal)            http://www.thejournal.com

Cybertimes Navigator (New York Times) http://www.nytimes.com/navigator

International Society for Technology in Education (ISTE)            http://cnets.iste.org/

Technology Standards for School Administrators (TSSA)   http://cnets.iste.org/tssa

ISTE curriculum and Content Area Standards   http://Cnets.iste.org/currstands/

Preparing Tomorrow’s Teachers to use Technology (PT3)              http://www.pt3.org

Assistive Technology information:  http://www.abilityhub.com  http://www.enablemart.com

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

EDAD ??? Technology and Curriculum Design

1 credit, Summer 2016

Course Description

This course seeks hands-on experience in integration of educational technology into the classroom. Students will learn to select opportunities for application [or not] of technology in education. The course will provide a hands-on experience for educational leaders to understand the application of technology in the curriculum process. Topics of consideration include instructional design, media and formats, devices, telecommunications and social interactivity. The course will provide an opportunity to apply technology knowledge and experience in hands-on exercises for curriculum management as well as monitoring student achievement progress. Further discussions and practical approach will include modern, effective and efficient ways of communications among parents, students, faculty and administration. The course offered in synchronous online mode and F2F mode.

Objectives/Outcomes

Upon successful completion of this course the student will:

  1. Understand the impact of technology on the teaching and learning process.
  2. Understand the principles of the Universal Design for Learning (UDL) and National Educational Standards for Students (NETS*S) and their application in the curriculum process.
  3. Research and assess the opportunities for technology to be integrated in the classroom.

Universal Design for Learning (UDL)
http://www.udlcenter.org/aboutudl/whatisudl

The ISTE National Educational Technology Standards (NETS•T) and

Performance Indicators for Teachers

https://www.kent.edu/sites/default/files/file/ISTEstandards.pdf

 

EDAD ??? Technology as an Integral Part of Successful Educational Leadership

1 credit, Summer 2016

Course Description

Course Description

This class will support teacher leaders and school administrators in reviewing and systematizing the fast aspects of modern electronic technologies. Based on a foundational better understanding of how technologies work, future educational leaders will develop skills and practice the application of ideas, tactics and methods for better integration of technologies in the teaching and learning process as well as the creation of better policies and procedures.

The course is designed to bring research and analytical skills and build structure in the process of resolving technology issues, which educational leaders face in modern schools, including hardware and software problems, networks and computers, curriculum and teaching and learning methods.

The course will offer discussions as well as practical solutions such as social media (e.g. Twitter) for professional development, online tools for teacher evaluation, online tools for collaboration and creativity, immediate and future trends, which already impact education and educational leadership.
The course offered in synchronous online mode and F2F mode.

Objectives/Outcomes

  1. Students will be able to identify and update sources for information to keep current their technology knowledge
  2. Students will demonstrate knowledge and understanding of technology leadership standards.
  3. Student will demonstrate an understanding of how to create, promote, and sustain a dynamic, digital – age learning culture that provides a rigorous, relevant, and engaging education for all students.
  4. Students will demonstrate understanding of how to promote an environment of professional learning and innovation that empowers educators to enhance student learning through the infusion of contemporary technologies and digital resources.
  5. Students will demonstrate an understanding of how to provide digital – age leadership and management to continuously improve the organization through the effective use of information and technology resources.
  6. Students will understand and apply knowledge of how to model and facilitate understanding of social, ethical and legal issues and responsibilities related to an evolving digital culture.
  7. Students will demonstrate knowledge of technology as integral part of facilities and resource management
  8. Students will be able to describe and use budget planning and management procedures related to educational computing and technology.
  9. Students will be able to describe and maintain current information involving facilities planning issues related to computers and related technologies.
  10. Students will be able to design and develop policies and procedures concerning staffing, scheduling, and security for managing computers/technology in a variety of instructional and administrative school

forecast technology in education

Survey: Teachers Say Tech Distractions More Concerning than Privacy, Security

By Joshua Bolkan, 01/26/16

https://thejournal.com/articles/2016/01/26/survey-teachers-say-tech-distractions-more-concerning-than-privacy-security.aspx

“According to the study, U.S. educators believe technology’s potential for distraction will wane as digital culture and infrastructure mature in the next five years, giving way to other concerns like privacy and security in 2020,” according to a news release. “However, these present and future apprehensions don’t stop many U.S. educators from allowing personal electronics in their classrooms. U.S. teachers have a higher tolerance for personal devices in the classroom than do British and Australian teachers. In fact, the study shows that 48 percent of U.S. educators say students can bring technology to class for educational purposes, and one in seven U.S. educators allows any electronic device as long as it doesn’t distract other students.”

password management

LITA listsrev has an excellent discussion on password management.
I personally am using LastPass for two years: great free option, paid one can be used on mobiles.

=========================

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Michael J. Paulmeno
Sent: Wednesday, January 06, 2016 1:36 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I second Keepass.  Not only is it free, open source, and multi-OS, but it lives on your computer, not in the cloud (although the database can be put on a shared drive or in DropBox for access across devices).  Personally that makes me feel much safer.  There are clients available for Windows, Mac, Linux, IPhone, Android and even Blackberry.

 

Cheers,

Mike

 

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Ronald Houk
Sent: Wednesday, January 06, 2016 12:38 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management

 

I use lastpass as well.  However, LastPass was just bought by LogMeIn, so lots of people are holding their breath hoping that things stay good.  Another open source, multi-os, alternative is keepass (keepass.info)

 

On Wed, Jan 6, 2016 at 11:43 AM, Yvonne Reed <yvonner@ranchomiragelibrary.org> wrote:

Hi Everyone,

I would like offer or recommend a password management tool to my library staff that’s reliable and easy to use. Do any of you have one you can recommend?

 

 

Thank you,

 

Yvonne Reed

Technology Librarian

Rancho Mirage Public Library

71-100 Hwy 111

Rancho Mirage, CA 92270

(760)341-7323 x770
————————————–

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of O’English, Lorena
Sent: Wednesday, January 06, 2016 12:51 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I really like Dashlane (dashlane.com) – it has a lot of options, including the ability to give someone else access to your passwords in certain situations (plus, they support Firefox financially via low-impact ads). I think of this sometimes when I think about what would happen if a piano fell on me tomorrow – what a mess it would be for my spouse to cope with my digital life! That said, although I use Dashlane, I still have not quite managed to get myself to use all its functionality.

 

Lorena

***

Washington State University Libraries

oenglish@wsu.edu

wsulorena: Twitter, Skype, GTalk, Yahoo IM

———–

—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Cary Gordon
Sent: Wednesday, January 06, 2016 12:37 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management

 

1Password ++

————–

 

—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of COLLINS, MATTHEW
Sent: Wednesday, January 06, 2016 12:35 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I have used Roboform for at least 10 years and never had a problem.  It manages passwords for logins and bookmarks on my PCs, my iPhone and iPad.  It synchs online so work, home, tablet and phone all have the same info.  It also stores personal info (name & multiple addresses) and confidential notes and other info.

 

–Matthew

———————-

Has anyone mentioned Password Safe? http://passwordsafe.sourceforge.net/

 

It’s worked well for organizing and managing usernames/passwords.

 

 

Angela Stangl

 

Digital Services Coordinator

Rodney A. Briggs Library

University of Minnesota, Morris

(320) 589-6164

——————————-

FEATURES

http://keepass.info/features.html

 

PLUGINS

http://keepass.info/plugins.html

Note: CAPS is used here and there to call attention without extra Gmail formatting, not to shout at anyone. Still…I know I look like I yell here. I have flogged myself, I will now bathe in the River Salt.

 

MWoT

Ok, check it out.

Plugins, macros, group/profile/source/target/timing locks, separate DBs and separate metadata for these if you like, INTERNALLY-ROTATING SUPERKEYS via REGULAR KEY TRANSORMATIONS and TWO-CHANNEL AUTO-TYPE OBFUSCATION (for obfuscating your auto-typed passwords or keys, if you select Auto)….!!!…

…and well-reasoned, well-EXPLAINED approaches to certain critical areas of password management in general and to KeePass in particular.

 

For instance: In the FAQ, read the logic breakdown (thought-by-thought explanation) of why Keepass does NOT lock itself when a SUB-dialogue box is open in Keepass whle the user then LOCKS the workstation. =)

Why doesn’t KeePass lock when Windows locks and a KeePass sub-dialog is open?

http://keepass.info/help/base/faq_tech.html#noautolock

My support of Keepass as a primary, then a close alternative, comes from four of my six years in IT being in direct computer and network security roles. Sure, not the most trench years out there, but they are all engineering and tiered-analyst roles for several major US corporations.

I’m proud of that…and in terms of relevance, I worked – and still work – with and around many engineers, analysts, and scientists (data, algorithmic). I look up to these people a great deal, and many of these coworkers come fully assembled having forgotten more than I’ll ever know and still learning faster than I could ever talk about… and even THEY use Keepass and they use it powerfully.

Detection of each site’s contact (HTTP GET, form forcus, etc) or “touch” can be different with each browser it integrates into, and that’s just for starters. One can also script up a different timing to use before the credentials are passed….;)….one can also relegate references to a central database, or one can refer only to the local system or even just a specific profile that can access said .kdbx file (KeePass database), or one can limit the data source to just one .kdbx single-instance database file, or one can use the .kdbx as a secondary for some other central repository failure, if that happens.

One can make several .kdbx files for different uses…no requirement to have just one! Each a diffferent base of unique data keys, each wtih a different direction administered on when it is referenced, how it is run, and where it lives on a system.

Aaaaaand it can integrate with other DBMs, it’s not an island!

Keepass is not the end-all be-all, but it IS FOSS (Free and Open-Source Software, great for investigating its machinery). Also it is:

Programmable (via the Plugins model, you can write some yourself if you like!)

Modularizable (again, via the Plugins model)

Profile lockable, (<— really neat!)

– SMM (Secure Memory Manageable, for Windows Clipboard and the like)

– and more!

Anyway, Keepass is rad for its cost, but, like the others on this thread, I will second LastPass as well. LastPass  is a an alternative to Keepass. =)

Daniel Strickland
linkedin.com/in/dwstrickland

 

 

Matthew Collins

Director of the Ernest Miller White Library Associate Professor of Research and Bibliography Louisville Presbyterian Theological Seminary

1044 Alta Vista Road

Louisville, KY 40205

mcollins@lpts.edu| 502.992.5420

 

1 16 17 18 19 20 21