SlideShare a Scribd company logo
Digital Security
Electronic Precautions to Guarantee Safety
by Maria Mustelier
Digital Security
As members of the Online Age, we are
vulnerable to attacks by dishonest people
who try to gain information, money, and
access to our private lives, through:
●  theft
●  defacing (via “hacktivism”)
●  disruption
Digital Security in the Classroom
Forget the digital classroom for a minute. In
every class there are rules meant to
provide a safe learning environment:
●  Be Responsible For Your Own Actions and Words
●  Be respectful to the Teacher and classmates
●  Follow instructions
●  Tell an adult if you feel unsafe
In fact--a classroom without even those
basic rules is asking for trouble--usually
in the form of:
●  theft
●  defacing school and other’s property
●  disruptive behavior
The same is true...
...for the Digital Classroom.
Digital Security is part of
Digital Citizenship
Without it?
●  cheating
●  bullying
●  viruses and loss of equipment,
productivity, and learning
●  threats to personal safety/information
Creating a Digitally Secure Classroom
The School should monitor and update:
●  all computers
●  servers
●  networks
●  anti-virus and spyware suppression
●  filtering
●  firewalls
●  user access
●  personal devices connecting to network
Creating a Digitally Secure Classroom
Students should:
●  keep track of their digital devices
●  use good passwords (and never share)
●  back up data
●  and learn digital etiquette & literacy
Digital Security in Society
These same issues have created a society
where identity theft, invasion of
privacy, and disruption in service
and productivity are more the norm
than the exception. Our digital society
makes us vulnerable.
Likewise in the classroom...
...it is not difficult to imagine the nightmare
caused in a school that is susceptible to:
●  virus
●  password theft
●  servers, networks, and users not closely
monitored or updated
Ultimately...
...our digital experiences
expose us to a
world of dishonest people--
--people who wish
to invade our lives
for fun or profit.
Be proactive!
Digital Security ensures students are
safe, responsible, and successful.
Protect yourself by helping
your students protect themselves in a
digitally secure classroom.

More Related Content

Viewers also liked

Flipbook Assignment: Digital Security
Flipbook Assignment: Digital SecurityFlipbook Assignment: Digital Security
Flipbook Assignment: Digital Security
Erica Carnevale
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009
Hamilton Public Library
 
Digital safety security quest 4.1.2
Digital safety   security quest 4.1.2Digital safety   security quest 4.1.2
Digital safety security quest 4.1.2
Deepa Muralidhar
 
Security in the Digital Workplace
Security in the Digital WorkplaceSecurity in the Digital Workplace
Security in the Digital Workplace
LiveTiles
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
Maurice Dawson
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
mdhague
 
Smartphones for safety: digital technologies and the refugee’s journey
Smartphones for safety: digital technologies and the refugee’s journeySmartphones for safety: digital technologies and the refugee’s journey
Smartphones for safety: digital technologies and the refugee’s journey
mysociety
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
SoftServe
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
JK Tech
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
xtin101
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
Rahul Neel Mani
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Ocean9, Inc.
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
PaloAltoNetworks
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
Dr. Lydia Kostopoulos
 
Citizenship and Safety in a Digital World
Citizenship and Safety in a Digital WorldCitizenship and Safety in a Digital World
Citizenship and Safety in a Digital World
Shelly Sanchez Terrell
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
Paul McGillicuddy
 
Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)
Michael Johansen
 
Digital security
Digital securityDigital security
Digital security
kamcuff
 

Viewers also liked (20)

Flipbook Assignment: Digital Security
Flipbook Assignment: Digital SecurityFlipbook Assignment: Digital Security
Flipbook Assignment: Digital Security
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009
 
Digital safety security quest 4.1.2
Digital safety   security quest 4.1.2Digital safety   security quest 4.1.2
Digital safety security quest 4.1.2
 
Security in the Digital Workplace
Security in the Digital WorkplaceSecurity in the Digital Workplace
Security in the Digital Workplace
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
Digital safety and security
Digital safety and securityDigital safety and security
Digital safety and security
 
Smartphones for safety: digital technologies and the refugee’s journey
Smartphones for safety: digital technologies and the refugee’s journeySmartphones for safety: digital technologies and the refugee’s journey
Smartphones for safety: digital technologies and the refugee’s journey
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
Citizenship and Safety in a Digital World
Citizenship and Safety in a Digital WorldCitizenship and Safety in a Digital World
Citizenship and Safety in a Digital World
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)Personal Digital Security (JavaZone Academy 2017)
Personal Digital Security (JavaZone Academy 2017)
 
Digital security
Digital securityDigital security
Digital security
 

Similar to Digital security -mariamustelier

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
crw526
 
Cyber security
Cyber securityCyber security
Cyber security
Sannith Reddy
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Assignment Help
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
bigblackschlong
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
Triveni Prabaakar
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
Ritik Kumar
 
Cyber safety
Cyber safetyCyber safety
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...
Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...
Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...
Education 2Conf
 
Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?
Srashti Jain
 
Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
Robert Schuetz
 
Presentation (6) (1).pptx
Presentation (6) (1).pptxPresentation (6) (1).pptx
Presentation (6) (1).pptx
MohdHassan92
 
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Kasperi Lötjönen
 
cyber security (1).pdf
cyber security (1).pdfcyber security (1).pdf
cyber security (1).pdf
network27
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Cyber Security | Mayur Rele
Cyber Security | Mayur ReleCyber Security | Mayur Rele
Cyber Security | Mayur Rele
Mayur Rele
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Eng. Shuaib ibrahim
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
Dattatreya Reddy Peram
 
Learn Online Cyber Security Courses With Certificates in Delhi..pdf
Learn Online Cyber Security Courses With Certificates in Delhi..pdfLearn Online Cyber Security Courses With Certificates in Delhi..pdf
Learn Online Cyber Security Courses With Certificates in Delhi..pdf
Bytecode Security
 

Similar to Digital security -mariamustelier (20)

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Cyber security
Cyber securityCyber security
Cyber security
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
INTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptxINTERNET SAFER DAY-2021.pptx
INTERNET SAFER DAY-2021.pptx
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...
Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...
Cybersecurity Tips For Schools - Reviewing Approaches To Keeping Students Saf...
 
Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?Why is Cyber Security Important for Education Sector?
Why is Cyber Security Important for Education Sector?
 
Internet safety presentation 2013
Internet safety presentation   2013Internet safety presentation   2013
Internet safety presentation 2013
 
Presentation (6) (1).pptx
Presentation (6) (1).pptxPresentation (6) (1).pptx
Presentation (6) (1).pptx
 
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
Mastering Digital Self-Defense: Protecting Your Online Identity in a Connecte...
 
cyber security (1).pdf
cyber security (1).pdfcyber security (1).pdf
cyber security (1).pdf
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Cyber Security | Mayur Rele
Cyber Security | Mayur ReleCyber Security | Mayur Rele
Cyber Security | Mayur Rele
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Learn Online Cyber Security Courses With Certificates in Delhi..pdf
Learn Online Cyber Security Courses With Certificates in Delhi..pdfLearn Online Cyber Security Courses With Certificates in Delhi..pdf
Learn Online Cyber Security Courses With Certificates in Delhi..pdf
 

Recently uploaded

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 

Recently uploaded (20)

Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 

Digital security -mariamustelier

  • 1. Digital Security Electronic Precautions to Guarantee Safety by Maria Mustelier
  • 2. Digital Security As members of the Online Age, we are vulnerable to attacks by dishonest people who try to gain information, money, and access to our private lives, through: ●  theft ●  defacing (via “hacktivism”) ●  disruption
  • 3. Digital Security in the Classroom Forget the digital classroom for a minute. In every class there are rules meant to provide a safe learning environment: ●  Be Responsible For Your Own Actions and Words ●  Be respectful to the Teacher and classmates ●  Follow instructions ●  Tell an adult if you feel unsafe
  • 4. In fact--a classroom without even those basic rules is asking for trouble--usually in the form of: ●  theft ●  defacing school and other’s property ●  disruptive behavior
  • 5. The same is true... ...for the Digital Classroom. Digital Security is part of Digital Citizenship
  • 6. Without it? ●  cheating ●  bullying ●  viruses and loss of equipment, productivity, and learning ●  threats to personal safety/information
  • 7. Creating a Digitally Secure Classroom The School should monitor and update: ●  all computers ●  servers ●  networks ●  anti-virus and spyware suppression ●  filtering ●  firewalls ●  user access ●  personal devices connecting to network
  • 8. Creating a Digitally Secure Classroom Students should: ●  keep track of their digital devices ●  use good passwords (and never share) ●  back up data ●  and learn digital etiquette & literacy
  • 9. Digital Security in Society These same issues have created a society where identity theft, invasion of privacy, and disruption in service and productivity are more the norm than the exception. Our digital society makes us vulnerable.
  • 10. Likewise in the classroom... ...it is not difficult to imagine the nightmare caused in a school that is susceptible to: ●  virus ●  password theft ●  servers, networks, and users not closely monitored or updated
  • 11. Ultimately... ...our digital experiences expose us to a world of dishonest people-- --people who wish to invade our lives for fun or profit.
  • 12. Be proactive! Digital Security ensures students are safe, responsible, and successful. Protect yourself by helping your students protect themselves in a digitally secure classroom.