:: The 4th Era ::
139.8K views | +0 today
:: The 4th Era ::
Impact of the internet age on human culture and K-20 education policy/administration
Curated by Jim Lerman
Your new post is loading...
Your new post is loading...
Rescooped by Jim Lerman from 21st Century Learning and Teaching
Scoop.it!

Big Data Threat Landscape — ENISA

Big Data Threat Landscape — ENISA | :: The 4th Era :: | Scoop.it
This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...



Via Gust MEES
Gust MEES's curator insight, February 3, 2016 12:04 PM
This Threat Landscape and Good Practice Guide for Big Data provides an overview of the current state of security in the Big Data area. In particular, it identifies Big Data assets, analyses exposure of these assets to threats, lists threat agents, takes into account published vulnerabilities and risks, and points to emerging good practices and new researches in the field. To this aim, ongoing community-driven efforts and publicly available information have been taken into account.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Big+Data...


Rescooped by Jim Lerman from 21st Century Learning and Teaching
Scoop.it!

Cyber-Security Practice: Learn it in one week

Cyber-Security Practice: Learn it in one week | :: The 4th Era :: | Scoop.it
. . Read, think, learn and share over Social Media… Security is everyone's responsibility! We are ALL responsible for the Internet's future! . ===> "Nothing in life is to be feared. It is only t...

 


Via Gust MEES
todd harmsworth's curator insight, May 8, 2017 6:33 AM

security is everyones responsibility and when your in charge of a classroom full of adolescences they then become your responsibility. good to read and take notes from

todd harmsworth's curator insight, May 8, 2017 6:53 AM

security is everyones responsibility and when your in charge of a classroom full of adolescences they then become your responsibility. good to read and take notes from

Tiffany Wheatley's curator insight, May 9, 2017 5:01 AM
A critical part of our future career is being aware and informed about legal, safe and ethical protocols.
Rescooped by Jim Lerman from 21st Century Learning and Teaching
Scoop.it!

U.S. Gov't: The Internet of Things Is A Security Disaster Waiting To Happen | CyberSecurity | Privacy

U.S. Gov't: The Internet of Things Is A Security Disaster Waiting To Happen | CyberSecurity | Privacy | :: The 4th Era :: | Scoop.it
The Federal Trade Commission (FTC) is aware we live in a connected world. Americans wear Fitbits, have Nest thermostats, use automated light systems from companies like Belkin and Philips, even have televisions that predict what they want to watch. But in a new report, the FTC has a warning: Existing privacy regulations don’t really cover the Internet of Things, and the Commission doesn’t really trust device manufacturers to do the right thing—or even be aware of the risks of collecting all that data.

In a staff report issued this week, the FTC warned that makers of connected health, home, and transportation devices could potentially leave their users vulnerable to data hacks. Most of all, the FTC is concerned that private information will be used to jack up users' insurance rates or deny them access to loans.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Via Gust MEES
Gust MEES's curator insight, February 9, 2015 2:23 AM
The Federal Trade Commission (FTC) is aware we live in a connected world. Americans wear Fitbits, have Nest thermostats, use automated light systems from companies like Belkin and Philips, even have televisions that predict what they want to watch. But in a new report, the FTC has a warning: Existing privacy regulations don’t really cover the Internet of Things, and the Commission doesn’t really trust device manufacturers to do the right thing—or even be aware of the risks of collecting all that data.

In a staff report issued this week, the FTC warned that makers of connected health, home, and transportation devices could potentially leave their users vulnerable to data hacks. Most of all, the FTC is concerned that private information will be used to jack up users' insurance rates or deny them access to loans.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


deepak's curator insight, February 9, 2015 3:08 AM

उत्तर प्रदेश और किसान :

उत्तर प्रदे‌श राज्य के लिए राजनितिक सर्वे मे हमने पाया है कि अब तक उत्तर

प्रदेश में ज्यादा विकास नही हो पाया है| जैसे: कृषि,शिक्षा,उधोग आदि क्षैत्र में|

यह राज्य कृषि उत्पादन मे भारत मे सर्व श्रेठ है| यहाँ की भूमि बहुँत उपजाऊ है

जिससे हमे बहुँत फसल प्राप्त होती है जैसे गैहू, धान ,सरसो ,दाले आदि| जिनहे

हम विदेश में निर्यात करे तो अच्छा धन कमा सकते हैं पर इस राज्य में शासन

करने वाले इसे कम कीमत पर खरीद कर अच्छी कीमत पर बेच देते है | लाभ

राशि यहाँ के लोग नही बल्कि यहाँ की भ्रष्ट सरकार की साहयता से पूंजीपति उठा

लेते है

जिस्से किसान अच्छी कीमत नही कमा पाते है और किसान आर्थिक रूप से ग्रस्त

होते जा रहे है

उत्तर प्रदेश की इन सभी कमियो को मध्यनजर रखते हुए भारतीय जनता पार्टी

विकास के लिए कुछ जरूरी कदम उठाएगी |

1. सभी किसानो के लिए कृषि धन योजना खाते खोले जाएँगे | जिससे वह

गन्ना अदि फसल का भुगतान अपने खाते में पा सकते है |

2. किसानो के लिए लोन की सुविधा कम दर पर रखी जाएंगी | जिस्से वह

ज्यादा समय में आसानी से चुका सके |

3. फसल के बारे मे शिक्षा प्रदान करने के लिए कृषि विशेषज्ञयो को भेजा जाय

जाएंगा |

4. शिक्षा का स्तर बाल व बालिकाओ का निगमन साक्षरता की ओर होगा

जिस्मे नए प्राइमरी व इंटर तक के स्कूल खोले जायंगे |

5. सभी व्यावसायिक को व्यवसाय प्रदान किये जायंगे वो भी एक अच्छी प्रति

दिन कीमत पर |

6. उत्तर प्रदेश वासियों को कम यूनिट दर पर बिजली परदान की जाएगी |

संजय सिंह जी को भारतीय जनता पार्टी दुआर जेवर छेत्र के लिए चुने गये है

जो इस छेत्र मे काफी सुधार करने के इच्छुक है |

1. किसानो का गन्ना तथा आदि कृषि सम्बन्धी मुद्दा सुलझेंगे |

2. किसानो को आर्थिक सहायताए देंगे |

3. जेवर में सड़क सम्बन्धि तथा आदि कार्य कराएंगे |

Rescooped by Jim Lerman from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | :: The 4th Era :: | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD