Due to COVID-19, schools and colleges are non-operational across India, physically. Although there is no immediate disruption to education and teaching, learning has almost moved entirely from physical to virtual. This presents an added responsibility and stress for parents to keep their children safe from cyber criminals who could be trying to leverage this opportunity to lure online users to click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best practices to be followed to safeguard children from becoming targets of malware and thus, to protect them cyber threats.
From a SOCITM Meeting June 2014 (Society of Information Technology Managers). A 10 minute presentation on how ICT in Learning is developing, a few requirements to provide the right infrastructure to support essential technology rich learning environments and how a vision and framework can support this.
From a SOCITM Meeting June 2014 (Society of Information Technology Managers). A 10 minute presentation on how ICT in Learning is developing, a few requirements to provide the right infrastructure to support essential technology rich learning environments and how a vision and framework can support this.
Though AR has many benefits, implementing it is challenging. Yes, the education app development company you choose will help you with the technological aspects. However, there are other limitations that you need to tackle.
Parental Control Apps/Software for Android & iPhoneNischint
Nischint, provides the most advanced Parental Control and Guidance Apps/Software service that allow tracking your child’s real time navigation and alerts like Phone Calls, SMS, Images, videos, etc. More on www.nischint.com
Presentation discusses the key reasons for considering mobile learning as a part of your training mix. Also covers ways to get started with mLearning quickly.
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyAntonino Galo
This is a short Description related to children safety when using mobile technology devices and ICT, and the commitments that regulators & society most have to address this issue.
Also the industry have to take in account that mobile technology, has to provide the necessary tools to avoid children´s abuse over ICT platforms.
Regulators must be the enforcement body & play active roles together with society and industry to assure a good implementation of Actions Plans and activities to avoid/reduce the risks when children use mobile technology devices.
The society & communities have to participate decisively in any kind of action/activities to teach/provide/transmit the knowledge to children in order to be aware of the threats they face when using mobile technology.
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
This assignment has been submitted as part fulfillment for a Masters Degree in Educational Technology at The American College of Education.
Any comments, opinions or suggestions, to improve this assignment are highly welcome. Please feel free to contact through email, mulingoh@hotmail.com, or at yahoo.com.
Thank you.
Though AR has many benefits, implementing it is challenging. Yes, the education app development company you choose will help you with the technological aspects. However, there are other limitations that you need to tackle.
Parental Control Apps/Software for Android & iPhoneNischint
Nischint, provides the most advanced Parental Control and Guidance Apps/Software service that allow tracking your child’s real time navigation and alerts like Phone Calls, SMS, Images, videos, etc. More on www.nischint.com
Presentation discusses the key reasons for considering mobile learning as a part of your training mix. Also covers ways to get started with mLearning quickly.
Childrens and Mobile Technology -Regulator´s Commitment to Children´s SafetyAntonino Galo
This is a short Description related to children safety when using mobile technology devices and ICT, and the commitments that regulators & society most have to address this issue.
Also the industry have to take in account that mobile technology, has to provide the necessary tools to avoid children´s abuse over ICT platforms.
Regulators must be the enforcement body & play active roles together with society and industry to assure a good implementation of Actions Plans and activities to avoid/reduce the risks when children use mobile technology devices.
The society & communities have to participate decisively in any kind of action/activities to teach/provide/transmit the knowledge to children in order to be aware of the threats they face when using mobile technology.
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
This assignment has been submitted as part fulfillment for a Masters Degree in Educational Technology at The American College of Education.
Any comments, opinions or suggestions, to improve this assignment are highly welcome. Please feel free to contact through email, mulingoh@hotmail.com, or at yahoo.com.
Thank you.
Good Cybercitizens Make the Internet a Safer Place
Own your online presence. To keep yourself safe, set privacy and security settings on web services, apps, and devices to your comfort level. ...
Be a good digital citizen. ...
Respect yourself and others. ...
Practice good communications. ...
Protect yourself and your information.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
WPGC empowers K-12 organizations with robust cybersecurity solutions. Explore effective strategies to safeguard against evolving threats in the educational landscape
What is the purpose of a digital citizenship program? Who is the audience in schools - teachers, parents, students? This presentation looks at some of the research and discusses the factors to consider when developing a digital citizenship program for your school.
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Assignment Help
In a world where the internet is spread widely, it has become one of the fundamental components of our life. It allows for communication, learning, and entertainment through for 24/7. Nevertheless, among such advantages, there is also exposure concerning our privacy, safety, and general well-being, as the web is a dangerous area of all things. For computer science students, knowing and fully understanding the factors associated with cybersecurity is essential. To embed these points among the students, the university gives them assignments related to internet safety. The research they conduct for the assignments helps them understand the topic well. However, it is challenging for some students to complete assignments independently since cybersecurity is a challenging topic. Hence, they take computer science assignment help from experts. It is constructive and beneficial for them to get good grades and knowledge simultaneously.
How to Teach Digital Citizenship to Students A Comprehensive Guide for Teache...digitalrajnikant
n Whether you re wanting to explore the concept of digital citizenship or seeking to educate others about it, our blog offers a comprehensive resource for all your needs Read now!
free demo for sweedu education management software
https://sweedu.com/start-your-trial.php
Ruth Hammond - Saftguarding Children in a Digital WorldNaace Naace
ICT has opened up a world of opportunity; however we must all ensure that whilst the children and young people in our care enjoy the benefits they are also prepared for the risks. This session will aim to highlight the key policy messages and resources which are available to help safeguard our digital natives!
Digital twins for secure, green and healthy future citiesIET India
Most cities across the world are looking at transforming into ‘smart cities’. With the world becoming exponentially digital and data increasing in volume and value, smart cities are now becoming more of a necessity. Most of the countries have been using Digital twins for an effective plan, design, build and management of the cities. While there are different kinds of systems within a city, in this webinar, we discussed four core systems of the city namely: 1) Healthcare system 2) Water management system 3) Safety & Security system 3) Environment system.
Read the report for insights on - creating city twins, predicting the city's future, empowering city administrators to take preventive and proactive actions using digital twins to improve health, safety, traffic, environment, infrastructure in Cities and insights on how to improve the city's Gross Happiness Index.
Download the full report here: https://bit.ly/3lZBHAi
You can also catch the on-demand discussion: https://youtu.be/40faBmjChlc
Leveraging blockchain to transform rattled supply chainsIET India
Covid-19 has disrupted supply chains beyond an unlikely return to the pre-pandemic levels. With dependency reducing on exports and emphasis on vocal for local, blockchain technology can play an influencing role in tackling supply chain failures.
Read our report that throws light on how #blockchain technology can re-define #supplychains. Gain insights on the impact, challenges and opportunities of plugging the technology into the existing #supplychain framework.
Download the complete report here: https://bit.ly/33Xux9r
Catch the on-demand discussion here: https://youtu.be/VZBoxs2_6pg
Ventilator tracking for Covid-19 preparednessIET India
Shortage of ventilators is a grave reality across the globe as covid cases continue to rage.
The Healthcare working group of our Future Tech Panel, have created a blueprint to address the challenge of ventilator shortage in the country.
In this paper, we propose technological frameworks that will enable hospitals and medical institutions effective track medical assets – their availability, live location, existing condition, etc. The proposed solution aims to provide care to those who need in need.
Read the report for a quick and effective solution for tracking ventilator availability in the country.
Electric vehicle charging infrastructure in India: Challenges and road aheadIET India
Charging infrastructure is the backbone for EV adoption in India, in the same way as Internet was for e-commerce. The Government of India announced an outlay of ₹10,000 crore for
FAME 2 to boost the number of electric vehicles in India and a total of ₹1,000 crore has been earmarked for setting up charging stations for EVs. Much of the remaining policy are
behavioural modifications and demand incentives for end users. However, the adoption relies heavily on how we crack the chicken and egg situation of charging infrastructure.
IET’s Future of Mobility and Transport Panel brought together a set of EV infrastructure experts drawn from organisations representing battery manufacturers, fleet operators, charging service providers, fintech firms as well as the Government of India in a bid to articulate current challenges in adoption of EV vehicles in India. Read the report to get answers to your questions regarding: Should fleet owners go beyond their core competency and deploy charging infrastructure or should the government plan for the demand? What will the numbers look like in 3 years? How
can demand load planning be done with the distribution companies? What business models will be successful?
The global pandemic has had a massive socio-economic impact on the urban mobility sector. As the government eases lockdown measures, urban mobility is becoming a huge focus of anxiety, with a large number of people considering when and how to resume travel. This implies that the transport system will have to be re-designed such that passengers are at a safe enough distance from each other. Serious questions like: will personal vehicles become the safest means to travel? What about the safety of people who cannot afford personal vehicles? What will happen to the present mode of public transport, will need answers.
This report titled, “Resetting for Urban Mobility 2020+ in India” discusses challenges brought in the urban mobility space by the COVID-19 pandemic. The document highlights the key measures to be taken at both the government and individual levels as public
transportation across the globe begins to unlock. Viewpoints from London, Singapore, and India – on the future of urban planning and public transport in response to the ongoing pandemic have also been discussed in this document. Experts from these counties contribute to a deeper understanding of safety measures adopted.
Learning and Skilling - A Future Work PerspectiveIET India
Businesses seem to be changing at a relentless pace with the advent of AI and big data. Organisations exist in a VUCA (Volatility, Uncertainty, Complexity, and Ambiguity) state rather than anticipating known risks. Change is the new normal and here to stay, we need to embrace it.
Upskilling and staying relevant are much needed during these trying times and staying calm and focused can help put things in perspective.
Ability to adapt is the most important skill at a time when companies are undergoing digital transformation and this skill takes precedence over technical knowledge, communication skills or problem solving – all of which are touted as important 21st century skills. But how do individuals as well as organisations build this crucial skill?
View the report to know how to bridge the skill gap
Enabling Indian manufacturing MSMEs for global competitivenessIET India
The COVID-19 pandemic has been a watershed moment for businesses globally. While the scenario looks gloomy all around, there are significant local and global factors that may prove to be favourable for FDI in manufacturing, especially in the Micro, Small & Medium Enterprises (MSME) sector in India.
Post the lethal impact of COVID-19, more and more manufacturing companies are looking towards India as an investment destination and as a reliable alternative to other low-cost producer countries. This will benefit the growth of established firms/sectors, providing significant new prospects for Indian MSMEs to step up and move to the next level. However, it is important to be cognisant of the fact that in order to successfully grab these opportunities, there needs to be a serious rethink of existing business models.
This paper focuses on the opportunities available, scope for improvement, and solutions to varied challenges for the MSME sector in India.
Indo-Canada dialogue: Opportunities in the automotive segment in the backdrop...IET India
On the 3 February 2020, the Institution of Engineering and Technology (IET) and the High Commission of Canada organised a joint round table on the topic ‘Opportunities in the automotive segment in the backdrop of Industry 4.0 – An Indo-Canadian Start-up Dialogue.’ The discussion revolved around diverse perspectives on how the Indian and Canadian automotive industry is gearing towards embracing new-age technology and what new offerings exist for companies based out of countries like Canada - especially in the back drop of Industry 4.0
E-mobility trends in India: Challenges and OpportunitiesIET India
India is the 4th largest automotive industry in the world and is rapidly adopting connectivity and other advanced technologies in the mobility segment. The recent approval from the Government of India for the second phase of the Faster Adoption and Manufacturing of Electric vehicles (FAME 2) is a clear signal of the country’s positive intent in striding towards green mobility.
IET’s Future of Mobility and Transport Panel has brought together experts from the e-mobility industry in India to discuss the technological trends in the e-mobility space and ways of optimising e-mobility use for everyday life. This document gives a brief summary of the discussions that shed light on the progress of e-mobility in India, pressing challenges that lie ahead and the way forward for e-mobility in the country. Experts also discussed the technology driven trends faced by the Indian market and how these will impact mobility behaviour in India.
IET India cybersecurity advisory: security practices for remote workingIET India
We are living in a heightened time of cyber risk. Organisations are still operational by allowing their employees to work from home. Cybercriminals have started taking advantage of public fear to generate coronavirus themed phishing attacks. We should be aware of COVID-19 tagged emails with misleading links or attachments. The IET’s Cybersecurity working group has put together some best practices to be followed at this crucial time to safeguard employees and as well as organisations that are navigating the new order of remote working.
Read ahead to know steps that both organisations and individual employees can undertake to do their bit to secure their enterprise data.
Urban mobility in Bengaluru- Key takeaway reportIET India
A round table session in Bengaluru with 12 handpicked global experts representing various areas of the global mobility ecosystem was organised in October 2019. The discussion titled ‘Urban Mobility- the Next Decade’ aimed to assess challenges that are preventing the Indian cities from reaching their fullest urban potential. The discussion was led by Shashi Verma, Director of Strategy and Chief Technology Officer, Transport for London. Outcomes from the discussion and a proposed agenda for action for Bengaluru city have been finalised and presented here
IET's Engineering the Future of Work PlaybookIET India
The IET’s Engineering the Future of Work playbook has been designed as a comprehensive guide to navigate the ever-changing world of work. This has a series of articles with perspectives on how technology might shape the future for work and highlights the best practices for meaningful work. It is aimed at creating a guideline that would help build organisational designs and policies feasible for the Future of Work domain.
This whitepaper focuses on the impact of IoT on the Society, how it is reshaping the world around us. The challenges of navigating the transition are great as well. The individual,
organizational, governmental and societal adjustments are non-trivial, and the impact of these
adjustments will be felt by everyone. The speed of various aspects of the transition are hard to
predict, but it is not difficult to see that our world will function quite differently 10-15 years from
now. Being prepared to navigate the transition begins with awareness of the shifts to come and some understanding of their implications, and this paper is a start at raising the awareness.
This white paper dwells upon some of the finer and crucial factors on IIoT adoption in India - is India as a market ready for accepting IIoT, what is the market potential, what are the challenges / road blocks, how DIGITAL INDIA & MAKE IN INDIA programs are propelling the emanation and adoption of IIoT technology, along with some of the IIoT use cases to address and improve output, efficiency, reduction in energy consumption & GHG.
The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices deliver new experiences to people throughout the world. Examples include connected cars, robotic manufacturing, smarter medical equipment, smart grid, countless industrial control systems and many more. Unfortunately, this growth in connected devices brings increased security risks. Threats quickly evolve to target this rich and vulnerable landscape. Serious risks include physical harm to people, prolonged downtime, and damage to equipment such as pipelines, blast furnaces, power generation facilities etc. As several such facilities and IoT systems have already been attacked and materially damaged, security must now be an essential consideration for anyone making or operating IoT devices or systems, particularly for the industrial Internet.
How can anyone secure the IoT? IoT systems are often highly complex, requiring end-to-end security solutions that span cloud and connectivity layers, and support resource-constrained IoT devices that often aren’t powerful enough to support traditional security solutions. Security must be comprehensive or attackers simply exploit the weakest link. Of course, traditional Information Technology (IT) systems often drive and handle data from IoT systems, but IoT systems themselves have unique additional security needs.
The security solution should be powerful and easy-to-deploy foundations of security architectures to mitigate the vast majority of security threats to the Internet of Things, including advanced and sophisticated threats. This paper describes the necessity and strategies for easy and effective implementation. No single, concise document can cover all of the important details unique to each vertical. Instead, this paper attempts to provide advice applicable to all verticals, including automotive, energy, manufacturing, healthcare, financial services, government, retail, logistics, aviation, consumer, and beyond.
New World of Energy is where electricity is increasingly distributed and connected, and the flow is bi-directional between smart supply and smart demand. The new ecosystem starts from the supply side of Smart Generation and converges all the way till the Smart Grids from the supply side to the demand side of diverse consumer-ends.
In the area of Smart Generation, there is deep innovation and transformation in areas such as Renewable and Distributed Energy. In Smart Grids, there are huge opportunities for Automation, Demand Response and Distributed Management Systems, including Micro grids. On the demand side, we have Smart Buildings and Homes, Smart Industry and Efficient Data Centres.
Indian telecom getting ready for m2 m iotIET India
M2M/IoT and how it is getting ready for the next revolution. This paper is arranged in three sections and is a summary of study & research of various
documents/papers from various Government organisations, M2M/IoT & Telecom Solution
providers, Standards development organisations, information available on the internet
etc.
l Section 1 - M2M/IoT Telecom guidelines & standards in India today - where are we
and what is defined/being discussed currently
l Section 2 - Mobile network technology, 5G and IoT - why is 5G being discussed /
required for IoT. How do 4G and LPWAN technologies support IoT services
l Section 3 - Captive / Dedicated IoT versus Wide Area Network IoT - what are the
telecom IoT solutions for these use-cases and what technologies work best for short range coverage and wide range coverage.
It is very exciting indeed to release this document of some IoT case studies deployed in India. You will find in the following pages, there are several IoT use cases across industry verticals, addressing a variety of business needs. These are a select list and showcase a range of situations and benefits achieved. IoT is already impacting a wide range of businesses in India!
These use cases are grouped by the business need being addressed by them. Smart Manufacturing / Industry 4.0 section consists of use cases focused on improving factory operations; the Supply Chain segment has use cases related to improving efficiency of the entire value chain of any business and the Service Operations use cases impact the enterprises that provide customer services of any kind. Transportation & Logistics, Healthcare, Smart Governance & Smart Utilities have use cases that are unique to the industry they are deployed in.
We hope that the stories in this document excites you about the potential impact IoT can have on enterprises in India. However, the fact is that the opportunity of IoT is limitless and open to imagination. As dedicated IoT networks are rolled out and the ecosystem is strengthened, IoT is set to become an integral conversation in any organisation’s digital transformation journey.
Smart Education – Making education Efficient, Affordable and Reachable for IndiaIET India
OBJECTIVE OF THIS WHITEPAPER
Key objective(s):
• Raise awareness about the smart education concepts covering education delivery modes such as classroom-based learning, experiential learning, project-based learning, physical education, sports and athlete trainings, gymnasiums, remote learning, online among other mediums.
• Highlight Key Challenges for the technology adoption, regulatory support, industry standards, and the ecosystem within the context of IoT.
• Give Recommendation to all the stakeholders on how to leverage and benefit from technology such as IoT, AI, AR and others to enhance the learning experience and the outcome or the impact of the education.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
3. 3 | P a g e
Introduction
Due to COVID-19, schools and colleges are non-operational across India. Although there is no
immediate disruption to education and teaching, learning has, almost entirely moved from physical
classrooms to online classes. This presents an added responsibility for parents to keep their children
safe from cyber criminals who could be trying to leverage this emergency and luring internet users to
click on malicious links and files. The IET’s Cybersecurity Working Group has put together some best
practices to be followed to safeguard children from becoming targets of malware and thus, to protect
them cyber threats.
Make kids aware about cybersecurity threats
The essential factor in protecting children from cyber threats is to communicate
openly. Parents should treat cybersecurity as a subject of technology. A common
mistake is that parents approach online safety habits as a matter of values and
behaviour. In reality, children should be taught safe browsing behaviours as a skill
from a very young age.
Children should be made aware about social media deception tricks including the
ones where adversaries devise fraudulent profiles to befriend children pretending to
be friend or known buddy. Installing such malware helps cyber-criminals steal
sensitive information.
Safeguard your network
There are various content security products designed to protect home networks, and
they come with varying configurations at different security layers. They also offer
multiple configuration options to users for customising privacy settings to block
irrelevant content. Parents should explore these options proactively.
Use software and applications to restrict unsolicited content
To protect kids from content that is not suitable for their age, parents could use a host
of available apps as well as in-app filters. These applications restrict adult websites and
suspicious social networking sites for kids’ safety. They also check proxies and VPNs
that possibly allow bypassing content restrictions. They help enable ‘safe mode’ for
browsing the web and popular video platforms.
4. 4 | P a g e
Use parental control applications
To ensure kids spend their extra time on the internet in a safe manner, parents can use
freely available control applications. These applications monitor and protect children
online. It is seen that this approach works better with younger kids than teenagers, as
teenagers quickly uncover ways to bypass such controls and access the content they
seek. Therefore, having open conversations with teenagers about being circumspect in
online environments are a better approach than such apps.
Before installing any stalker-ware applications it is important, that you ensure that they
are from a reliable source. Phony versions of these applications are aplenty and can be
cybersecurity threats by themselves.
Engage children onto learning platforms
In addition to applying necessary restrictions online, parents can also help their children
engage with a wealth of knowledge that is available online in a safe manner. Multiple
online learning platforms have now put their repertoire of content online for free
consumption. Learning resources like the IET’s Faraday Programme offer cool projects
and fun activities that could be tried at home. These are extremely engaging set of
activities that help learning concepts in Science, Technology, Engineering and
Mathematics (STEM). Explore them here: https://education.theiet.org/primary/ and
https://education.theiet.org/secondary/
Social responsibility
Technology organisations and telecom providers must come forward and do everything
they can, to keep children safe online. These includes providing access to no-cost (toll
free) child helplines, age-appropriate services and reliable e-education platforms. They
could also act as advocates of best practices and share child online safety advisories
with their subscribers at regular intervals.
Cautiousness against socially engineered attacks
From executives to employees to children - all those using home networks are potential
targets of cyber attackers. Social engineering always preys on unpatched vulnerabilities.
It is a constant attack that goes round the clock. Children are soft targets as
cybercriminals are experts in the art of masquerading, influencing, and devising
methods to trick children. A moment of lapse, and children inadvertently end up giving
attackers easy access to our networks and facilities.
While it is best practice to not share credit card details with anyone, if parents have
shared their credit card details and internet banking credentials with their children, it is
essential to regularly monitor and keep an eye on statements/bills to save themselves
from financial thefts that are on the rise.
5. 5 | P a g e
Conclusion
We believe that we are currently witnessing the largest remote working scenario in the history of
mankind. While organisations are working on a range of measures to protect the interests of enterprise
security, cyber criminals are always exploring new ways to exploit vulnerabilities. The indispensability of
technology in lives of children and their active presence over the internet makes them a soft target for
cyber risks. Hence, it is important that children are equipped with the knowledge and skills to be safe
and responsible online and parents can play an important role in doing this.
People are following social distancing for the last few weeks to protect themselves against the novel
coronavirus. Likewise, people should learn and practice cyber distancing to safeguard themselves from
attackers.
Contributor
Anand Handa
Member – IET Cybersecurity Working Group
Project Executive Officer, Interdisciplinary Centre for Cyber Security and Cyber
Defence of Critical Infrastructures, Department of Computer Science and
Engineering, Indian Institute of Technology, Kanpur
If you have a question or query, please feel free to reach out to us at sectors@theiet.in. Read more
about our work at india.theiet.org