:: The 4th Era ::
92.9K views | +6 today
Follow
:: The 4th Era ::
Impact of the internet age on human culture and K-20 education policy/administration
Curated by Jim Lerman
Your new post is loading...
Your new post is loading...
Rescooped by Jim Lerman from 21st Century Learning and Teaching
Scoop.it!

Cyber-Security Practice: Learn it in one week

Cyber-Security Practice: Learn it in one week | :: The 4th Era :: | Scoop.it
. . Read, think, learn and share over Social Media… Security is everyone's responsibility! We are ALL responsible for the Internet's future! . ===> "Nothing in life is to be feared. It is only t...

 


Via Gust MEES
more...
todd harmsworth's curator insight, May 8, 2017 6:33 AM

security is everyones responsibility and when your in charge of a classroom full of adolescences they then become your responsibility. good to read and take notes from

todd harmsworth's curator insight, May 8, 2017 6:53 AM

security is everyones responsibility and when your in charge of a classroom full of adolescences they then become your responsibility. good to read and take notes from

Tiffany Wheatley's curator insight, May 9, 2017 5:01 AM
A critical part of our future career is being aware and informed about legal, safe and ethical protocols.
Rescooped by Jim Lerman from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | :: The 4th Era :: | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


=> NOBODY is perfect! A security by 100% doesn’t exist! <=

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
more...
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD