21st Century Learning and Teaching
586.7K views | +11 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: 'Cybersecurity', 'PDF'. Clear
Scooped by Gust MEES
Scoop.it!

Big Data Threat Landscape — ENISA

Big Data Threat Landscape — ENISA | 21st Century Learning and Teaching | Scoop.it
This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


Gust MEES's insight:
This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


No comment yet.
Scooped by Gust MEES
Scoop.it!

A Parent's Guide to Cybersecurity [pdf] | eSkills

Learn more:


http://gustmees.wordpress.com/2014/11/04/how-can-education-help-to-lower-cybercrime/


http://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Parent%27s+Guide+to+Cybersecurity


Gust MEES's insight:

Learn more:


How Can Education Help To Lower Cybercrime?


Learning basics of Cyber-Security


Cyber-Security Practice: Learn it in one week


Suvi Salo's curator insight, November 16, 2014 5:55 PM

This gives you clear advice (in positive manner).

HazelC's comment, November 16, 2014 11:06 PM
This is a great resource. This month we are focusing on Internet safety and cyber bullying!
Christine Kennerd's curator insight, November 17, 2014 3:27 PM

Great resource for parents

Scooped by Gust MEES
Scoop.it!

The Human Side of IT Security [PDF]

Gust MEES's insight:

The Human Side of IT Security [PDF]


No comment yet.
Scooped by Gust MEES
Scoop.it!

OUI, vous êtes réellement une cible pour les cybercriminels ! [PDF]


En savoir plus :


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/



Gust MEES's insight:


En savoir plus :


https://gustmees.wordpress.com/2013/10/27/cyber-security-is-easy-get-the-right-reflexes/



No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

McAfee Labs Threats report Q4-2013 [PDF]

Gust MEES's insight:


Check it out!!!

Gust MEES's curator insight, March 11, 2014 7:26 PM


Check it out!!!


Scooped by Gust MEES
Scoop.it!

Qu'est-ce qu'un Malware ? [pdf]

Gust MEES's insight:


En savoir plus :


http://gustmeesfr.wordpress.com/


No comment yet.
Scooped by Gust MEES
Scoop.it!

GetSafeOnline_RoughGuide.pdf

Gust MEES's insight:

 

Learn more:

 

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Malicious Websites-2013-Threat [Infographic]

Gust MEES's insight:

 

Learn more with Infographics:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

SYMANTEC | Internet Security Threat Report April 2013 [pdf]

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

Gust MEES's insight:

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

Gust MEES's curator insight, April 22, 2013 9:10 AM

 

Download the Report with a lot of infographics and WAKE UP!!! Get informed about the growing number of web based malware! When using e-Learning, m-Learning and "BYOD" (Bring Your Own Device) YOU should understand NOW that there is a MUST of having good PROTECTION on any device connecting to the Internet!!!

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

 

Check also other infographics here:

 

http://www.scoop.it/t/securite-pc-et-internet?tag=Infographic

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=Infographic

 

 

Scooped by Gust MEES
Scoop.it!

Test your security knowledge with the Sophos scavenger hunt - you could bag yourself a prize!

Test your security knowledge with the Sophos scavenger hunt - you could bag yourself a prize! | 21st Century Learning and Teaching | Scoop.it
Take Sophos's quick scavenger hunt - you'll not only learn some cool security facts to impress your friends with, you'll also be in with the chance of winning some goodies!
Gust MEES's insight:

A MUST for anyone who loves Challenges and a very good way to learn about the reality in "VirtualWorld"! 

 

Read the report (PDF) and try to win, here below the download link:

 

http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report.aspx?utm_source=STR2013&utm_medium=Cross-link&utm_campaign=STR2013-CL-NakSec

 

Useful links:

 

Teaching and Learning basics of Cyber-Security is a MUST in 21st Century!

Check also:

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

https://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

QR Code Security [pdf]

A MUST read!!!

 

Gust MEES's insight:

MUST read ALSO:

 

http://www.sba-research.org/wp-content/uploads/publications/QR_Code_Security.pdf

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Norton+Snap

 

Scooped by Gust MEES
Scoop.it!

Know your enemy - protect yourself - Microsoft Malware Protection Center

Know your enemy - protect yourself - Microsoft Malware Protection Center | 21st Century Learning and Teaching | Scoop.it

Of the many weapons and tricks in an attacker’s arsenal, none is more dangerous or insidious than the ability to hide and continuously compromise a system from within.

 

This is the role of a rootkit. Malware uses rootkits, or rootkit functionality, in order to hide their presence on an affected computer and thus impede their removal.

 

===> Once compromised by a rootkit, any information returned by an affected system can no longer be trusted and must be regarded as suspect (which is exactly how they hide themselves and their components from you - by modifying requests for information that might give them away). <===

 

===> Know your enemy and protect yourself by learning about these threats. <===

 

You can download the paper here [PDF]:

http://download.microsoft.com/download/D/2/C/D2C47748-0310-4D6F-AC72-3D298BE58108/Microsoft%20Malware%20Protection%20Center%20Threat%20Report%20Rootkits_English.pdf

 

Read more:

http://blogs.technet.com/b/mmpc/archive/2012/10/19/know-your-enemy-protect-yourself.aspx?utm_source=dlvr.it&amp;utm_medium=twitter

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Online Security Training Handbook for Data Loss Prevention

Online Security Training Handbook for Data Loss Prevention | 21st Century Learning and Teaching | Scoop.it
Free Training Handbook to Keep Your Employees Safe and Secure from Data Loss. Sophos is the Leader in Data Loss Prevention for Business.

 

These 10 tips each include a short video to give you some real-life examples of how things can go wrong when we aren't careful. We encourage you to think about how you can put these tips into practice and, better yet, share them with your friends and family.

 

===> Because we're all better off and safer when we look out for each other. <===

 

===> Security is the responsibility of us all. <===

 

Follow the tips in this handbook and you’ll be helping to keep yourself, your colleagues and our business safe.

 

Gust MEES:

This a ===> MUST read <=== and watch the videos as it explains in ONLY 1 minute videos how to stay secure and you can download also PDF handbooks (very short and easy to understand in 1 minute also! The BEST Tips I have seen so far: I rate it 10/10 and will include it in my online courses...

 

Read more:

http://www.sophos.com/en-us/security-news-trends/it-security-dos-and-donts/online-handbook.aspx

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

10 Steps To CyberSecurity | Infographic [pdf]


Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


Gust MEES's insight:

Learn more:


https://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



Gust MEES's insight:

McAfee Labs Threats Report August 2014 | Phishing | Cyber Security.


Learn more:


http://gustmeesen.wordpress.com/2012/01/07/pc-security-howto-fight-spam-efficiently/


https://gustmees.wordpress.com/2013/12/21/privacy-in-the-digital-world-shouldnt-we-talk-about-it/



No comment yet.
Scooped by Gust MEES
Scoop.it!

JA, sie sind tatsächlich ein Angriffsziel für Cyber-Kriminelle! [PDF]

Warum gerade Sie?


Verbrechen wie Betrug, Identitätsdiebstahl oder Erpressung sind, seit zivilisierte Gesellschaften existieren, ein Teil unseres täglichen Lebens. Ziel eines Verbrechers ist immer das Gleiche: so viel Geld wie möglich, so einfach wie möglich und mit so wenig Risiko wie möglich erbeuten. Traditionell war dies schwierig, weil Kriminelle oft auf Ihren Standort beschränkt ,waren und sich körperlich mit ihren Opfern auseinandersetzen mussten.

Dies hat nicht nur den Opferkreis begrenzt sondern auch die Kriminellen einem höheren Risiko ausgesetzt. Allerdings hat sich das Verbrechen mit dem Aufkommen des Internet und der Online-Technologie radikal verändert.

Heutzutage können Cyber-Kriminelle ganz einfach fast jeden in der Welt mit wenig oder gar keinen Kosten und einem sehr geringem Risiko angreifen. Zusätzlich organisieren sich die .Cyber-Kriminellen immer besser und werden dadurch effizienter und effektiver als je zuvor.

Gust MEES's insight:


Learn more:



No comment yet.
Scooped by Gust MEES
Scoop.it!

Yes, YOU Actually Are A Target For Cyber Criminals! [PDF]

Why You Are Targeted
Crimes such as fraud, identity theft or extortion have existed for as long as there have been civilizations, they are a part of our daily lives.


A criminal’s goal has always been the same: to make as much money as possible, as easily as possible, and with as little risk as possible.


Traditionally, this was difficult because criminals were often limited by their location and had to physically interact with their intended victims.


This not only limited whom criminals could target, but also exposed criminals to a great deal of risk. However, crime has radically changed
with the advent of the Internet and online technology.


Now cyber criminals can easily target almost everyone in the world, with little or no cost, and at very little risk. Additionally, cyber criminals have become highly organized .and efficient, enabling them to be more effective than ever


Learn more:



Gust MEES's insight:


Yes, YOU Actually Are A Target For Cyber Criminals!


Learn more:




Stephanie Georgiadis's curator insight, August 25, 2014 7:04 AM

2. Yes You Are A Target is a great source of information. It gives an overview of the topic, reasons why you could be a target and ways on how you can prevent it from happening. It is very informative and gives a good amount of information so you don't have to read ten pages. 

Scooped by Gust MEES
Scoop.it!

Was ist Schadsoftware (Malware)? [pdf]

Gust MEES's insight:


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Malware


No comment yet.
Scooped by Gust MEES
Scoop.it!

Security Threats in 2014 | Sophos Security Threat Report

Security Threats in 2014 | Sophos Security Threat Report | 21st Century Learning and Teaching | Scoop.it

It includes a range of security tips, and a section on proactive protection, entitled Staying Ahead of Today’s Most Sophisticated Attacks.

 

The report isn't just about Windows and Windows malware, either.

You'll find a wealth of information about how the cybercrooks are broadening their attack horizons to the Mac, Linux and Android platforms, too.

 

This is important material because it necessitates that we broaden our defensive horizons in reply.

 

The report also looks the technology and the underground economy behind crimeware tools such as exploit kits, botnets, click fraud, ransomware, and more.

 

As well as being a fascinating read, the Security Threat Report 2014 will help you to understand and to protect yourself against an enemy that is becoming ever smarter, shadier and stealthier.

 

Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2013/12/10/habits-you-should-apply-for-the-new-year/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Deepweb and Cybercrime [pdf]

Gust MEES's insight:

 

A MUST READ!!!

 

Gust MEES's curator insight, November 25, 2013 2:59 AM

 

A MUST READ!!!


Scooped by Gust MEES
Scoop.it!

Mobile Threat Report: Q1-2013 [pdf]

Gust MEES's insight:

 

A MUST read!!!

 

Learn more:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- - http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Mobile+Device+Security

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Adobe patches Acrobat and Reader, Mozilla debuts Firefox built-in PDF viewer

Adobe patches Acrobat and Reader, Mozilla debuts Firefox built-in PDF viewer | 21st Century Learning and Teaching | Scoop.it

Adobe has pushed out the announced update for Acrobat and Reader that patches the two vulnerabilities that were recently exploited in attacks in the wild.

But, the popularity of these Adobe products, the amount of security bugs they apparently contain, and Adobe's consistently slow release of patches make them the perfect entry point for cyber attackers, so it's no wonder that security experts are advising and users considering using alternative PDF viewers.

Google has solved part of the problem for users by building in a PDF viewer into Chrome and turning it on by default. Apple's Safari has done the same for Safari for Mac.

And now Mozilla has introduced one in its latest stable version of Firefox (v19.0).


Gust MEES's insight:

Google has solved of the problem for users by building in a PDF viewer into Chrome and turning it on by default. Apple's Safari has done the same for Safari for Mac.


And now Mozilla has introduced one in its latest stable version of Firefox (v19.0).

 

Check also:

 

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

SC Magazine's "Spotlight" on Education

SC Magazine's "Spotlight" on Education | 21st Century Learning and Teaching | Scoop.it

So in this special Spotlight edition of SC Magazine we present some updates on the certifications for which most of you must gain continuing education credits, while also sharing with you some news on the latest credentials that certification bodies are putting out there.


As well, for the fifth year we provide a listing of the top information assurance programs as decided by the


===> U.S. Department of Homeland Security and the National Security Agency. <===


Also, we include some opinions from leading information security pros to hear what they think of IT security education now and whether it has evolved to where it needs to be or ===> if it still has some maturing to do. <===


Gust MEES's insight:

A MUST read! Fill in the form and download the resource!

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Education on Online Safety in Schools in Europe [PDF]

Education on Online Safety in Schools in Europe
December 2009

No comment yet.
Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

10 steps to cybersecurity-advice-sheets [pdf]

10 steps to cybersecurity-advice-sheets [pdf]

 

No comment yet.