Discussion:Syllabus e-safety : Différence entre versions
m (→Security tools and network security) |
|||
Ligne 36 : | Ligne 36 : | ||
<span style="color:#FF0000"> --''(same here - we actually do not understand what is it about</span>[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''</span> | <span style="color:#FF0000"> --''(same here - we actually do not understand what is it about</span>[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 15:11 (UTC))''</span> | ||
+ | here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity | ||
Version du 10 juin 2011 à 14:00
Discussions
Here is the place to make comments on the Syllabus.
Sommaire
Todo list
- Focus map
- Define number of chapters
- Organise Items and Notions
- Find Quiz
- Discuss about chapter 4 --Rémi LEVY 7 juin 2011 à 09:04 (UTC)
- Give the rights on Mindomo --Rémi LEVY 7 juin 2011 à 09:18 (UTC)
About Items
Chapter 1 - Basic knowledge on e-safety
1.1. History : from static web1 to dynamic web2 environments
--(What are those web1, web2 and web3 environments? Is it necessary? by Mantas (Lithuania team) 8 juin 2011 à 14:58 (UTC))
1.2. Intention : web3 proposing constructive engagement in participatory society (or : security through light instead of old model of security through obscurity),
--(same here - we actually do not understand what is it aboutby Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))</span>
here is a reference about obscurity: http://en.wikipedia.org/wiki/Security_through_obscurity
1.3. Know about equity between opportunities & risks since web2
--(if speaking about opportunities & risks it should be clarified - do we mean Internet? if so - it should be mentioned.by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.4. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855)
--(what do you mean by "basic codes"?by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.5. Know about social engineering and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated)
--)what is "participative culture and abuses"? We think that it is already included in the definition of social engineerging. We recommend to stick to version "Know about social engineering and it’s methods".by Mantas (Lithuania team) 8 juin 2011 à 15:23 (UTC))
1.6. Understand the differences of contents (functional, factual, creative) of information (I don't understand this item --Rémi LEVY 7 juin 2011 à 07:51 (UTC)
--(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:31 (UTC))
1.7. Understand the differences of formats (open, privative)
--(there is no such word "privative". We recommend "Understand the differences of data formats (open, private, business, etc.)" This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:36 (UTC))
1.8. Understand the notion of identity
maybe to be repositioned in some other chapter --Rémi LEVY 9 juin 2011 à 19:49 (UTC)
1.9. eTools : Product versus function
--(Should be clarified--by Mantas (Lithuania team) 8 juin 2011 à 15:48 (UTC) )
1.10. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving…)
- must be repositioned into the scam/hoax (chapter 5 or 6) ?
--( We recommend to leave in this chapter--by Mantas (Lithuania team) 8 juin 2011 à 16:00 (UTC) )
1.11. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).
1.12. Organizational security (school security) – or social engineering?, usage of school web pages, content publishing, access
--( social engineering is already mentioned in 1.5. We recommend "Know about Organizational security: school security, usage of school web pages, content publishing, access, etc."--by Mantas (Lithuania team) 8 juin 2011 à 15:56 (UTC))
Privacy and data management
I suggest : to begin with "Distinguish between data and information" --Rémi LEVY 7 juin 2011 à 07:49 (UTC)
(...)
2.7. Understand what intellectual property on Internet is and be aware of privacy protection legal act.
--(Privacy protection legal act is already mentioned in 1.11. Lets make this one only "Understand what intellectual property on Internet is."--by Mantas (Lithuania team) 8 juin 2011 à 16:11 (UTC) )
(...)
2.9. Privacy Management : Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.
- 2.9 to 2.11 to me merged ? --Rémi LEVY 10 juin 2011 à 07:49 (UTC)
- 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet cookies. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)
- 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.
--(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --by Mantas (Lithuania team) 8 juin 2011 à 16:17 (UTC))
- As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network--Rémi LEVY 10 juin 2011 à 07:53 (UTC)
Security tools and network security
see how integrate from 3.5 to 2.11 --Rémi LEVY 7 juin 2011 à 07:52 (UTC)
3.1. Know computer network types ,
(local area network (LAN), wide area network (WAN), virtual private network (VPN)) and why protection is needed.--Renata (Lithuania Team) 8 juin 2011 à 16:19 (UTC)
3.2. Know different network connection methods (Mobile networks, Wireless, Cable).
3.3. Be able to use wireless network safe and know how to connect to a protected/unprotected wireless network.--by Mantas (Lithuania team) 8 juin 2011 à 16:30 (UTC)
3.3. Sharing and accessing resources over network (Files, Printer, Screen).
3.4. Understand safety means of computer networks (Firewall, Antivirus, Password protection, Connection encryption – wireless).
--(Firewall, Antivirus, Password protection, Connection encryption are all already mentioned in other items and fit there by content and integrity better. We recommend to cross this 3.4. out at all)--by Mantas (Lithuania team) 8 juin 2011 à 16:36 (UTC)
3.5. Be able to use standard OS integrated protection tools.
3.6. [[#see how integrate 3.5 to 2.11 : "All about malware and intrusion protection tools" - RL]] Know what a quality anti-virus, anti-spyware, spam blocker, and personal firewall is and how to use it. (Be able to turn on / off and adjust protection level in standard security means that are integrated in the operating system (Firewall, Protection tools, etc.), know that it is unsafe to turn antivirus software off and know consequences). Distinguish different modes of antivirus protection (active, passive…).
--(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
- 3.7.[#Updating operating system- RL]. Know how to follow, download and use updates for your operating system, software and importance of antivirus definition files. Understand the benefits of these updates.
--(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
- 3.8. Distinguish different modes of antivirus protection (active, passive…).[# see also 3.6]
--(3.5, 3.6, 3.6 and 2.11 are all different things, they must be left as is --by Mantas (Lithuania team) 8 juin 2011 à 16:25 (UTC))
- 3.9. Know what has to be done and in what order, if you suspect that computer system is infected.
- 3.10. Distinguish infected files deletion, quarantining and curing.
- 3.11. Informal and formal periodic external checkup.
--(what do you mean by "checkup")--by Mantas (Lithuania team) 8 juin 2011 à 16:30 (UTC)
Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion
Have discussion.....--Rémi LEVY 7 juin 2011 à 09:05 (UTC)
Social networks and safe usage of the Internet
I suggest "5.10. Dependency and addiction to the Internet" to be develop --Rémi LEVY 7 juin 2011 à 07:46 (UTC)