21st Century Learning and Teaching
586.1K views | +6 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tag: 'ID-Theft'. Clear
Scooped by Gust MEES
Scoop.it!

How safe is my student data? | CyberSecurity

How safe is my student data? | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

Being online means accepting risk
Attacks and data theft are all over the news (think: Sony Pictures). Both high and low profile targets are breached every day it seems, and the trend doesn’t appear to be letting up. As a teacher or administrator using various web-based tools, the question will probably come up, “How secure is my and my students’ data?” It’s an important one, and the only antidote to paranoia is knowledge.

.

The risks are manageable
The relative difficulty of discovering new zero-day attacks means that these methods fetch a hefty sum in underground trading due to their rarity. Typically those who are purchasing the heretofore unknown exploits are looking to make a return on their investment. 


Learn more:


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/



Gust MEES's insight:

Being online means accepting risk
Attacks and data theft are all over the news (think: Sony Pictures). Both high and low profile targets are breached every day it seems, and the trend doesn’t appear to be letting up. As a teacher or administrator using various web-based tools, the question will probably come up, “How secure is my and my students’ data?” It’s an important one, and the only antidote to paranoia is knowledge.

.

The risks are manageable
The relative difficulty of discovering new zero-day attacks means that these methods fetch a hefty sum in underground trading due to their rarity. Typically those who are purchasing the heretofore unknown exploits are looking to make a return on their investment. 


Learn more:


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


https://gustmees.wordpress.com/2015/01/28/practice-learning-to-learn-example-2/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Emisoft Hacks Identity Theft Again | More Entry Points, More Tools, More Prevention | Part 2

Emisoft Hacks Identity Theft Again | More Entry Points, More Tools, More Prevention | Part 2 | 21st Century Learning and Teaching | Scoop.it
Extend your Anti-Malware knowledge base with Part Two of our series on Hacking Identity Theft, where Emsisoft gives you even more tools for malware prevention.
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacking Identity Theft: Entry points, tools and prevention | Part 1

Hacking Identity Theft: Entry points, tools and prevention | Part 1 | 21st Century Learning and Teaching | Scoop.it
  Identity theft has been around as long as there has been identity. Long before the age of computers, people specialized in the art of forgery,
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Identity-Theft

 

Dan Kirsch's comment, January 14, 2014 12:43 PM
Thank you!
Scooped by Gust MEES
Scoop.it!

Identitätsdiebstahl verstehen 2: Mehr Angriffspunkte, mehr Tools und mehr Prävention

Identitätsdiebstahl verstehen 2: Mehr Angriffspunkte, mehr Tools und mehr Prävention | 21st Century Learning and Teaching | Scoop.it

Im Artikel Identitätsdiebstahl verstehen: Angriffspunkte, Tools und Prävention zeigten wir moderne Mittel und Wege auf, wie Sie Ihrer digitalen Identität beraubt werden können.  Wir beschrieben darin einige der verbreitetsten Wege und Tools, mit Hilfe derer Identitätsdiebe in Ihren Computer eindringen, und erklärten, wie Sie ihnen diese Wege versperren können und Diebstahl durch eine Lösung mit gesundem Menschenverstand und eine effiziente Anti-Malware-Software wie Emsisoft Anti-Malware 8 verhindert werden kann.

 

Wir widmeten ebenso viel Zeit dem Vergleich modernen Identitätsdiebstahls mit früherer Vorgehensweisen.  Wir diskutierten, wie viele Tools sich gewandelt haben, aber dass viele Ansätze, die auf Täuschung beruhen, nach wie vor gleich geblieben sind.

 
Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/securite-pc-et-internet/?tag=ID-Theft

 

No comment yet.