Security Vs. Access Flashcards

1
Q

Inappropriate content: assumptions

A
  1. Without supervision adolescents well him discover inappropriate sites
  2. Filter software can fully protect students
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Inappropriate content: solutions

A
  1. Blocking software: may cause good sites to be accidentally blocked
  2. Acceptable use policy: written rules and responsibilities of computer use as well as consequences of misuse
  3. Direct supervision: either by an adult or via the use of software that tracks the history of users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inappropriate use: recommendation

A
  1. Teach students how to be responsible consumers of the Internet
  2. educators need to set the rules about usage and explain what is inappropriate and help them make the right choices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Predators: issues

A
  1. Concern about young children giving too much personal information online
  2. Despite the fact that online communication has become a medium in sex crimes, these crimes themselves aren’t new. Crime of these natures are called statutory rape and in most states have established criminal laws against them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Predators: recommendation:

A
  1. Communication: explain threats of chat rooms especially about sex and sending personal information to strangers
  2. Monitoring history and access to passwords: adults need to know about social networks and learn that way of communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber bullying: issues

A
  1. Mobile communication devices in the hands of the students would mean more incidents of miss use and unwanted student behavior. Data doesn’t support that assumption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber bullying: recommendation:

A
  1. Adults need to educate themselves about mobile Communication devices work and the various capabilities of their use
  2. Establishing school policies that regulates the use of various features of mobile communication devices which can be beneficial as tools to enhance education like surveys or clickers
  3. Educate students about the danger of cyber bullying and encourage open communication about reporting incidents
  4. Parent involvement parents need to be informed about school policies regarding mobile devices and be educated about potential threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network security: issues

A
  1. Expense to replace programs or hardware
  2. confidential information being accessed
  3. Student safety in terms of being exposed to harmful content on the Internet
  4. Teacher access to be able to use technology effectively, teachers need sufficient access to the Internet and to students files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network security: recommendation

A
  1. Sitting Secure remote access virtual private network VPN to allow teachers to access confidential information safely
  2. Managing desktop use an activity
  3. Monitor students use
  4. Filters to blog unauthorized access
  5. Customize firewall to meet functional needs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Inappropriate use of network: issues

A
  1. Students will be distracted from instruction if using technology on mobile devices
  2. Students might communicate inappropriate content
  3. Some parents and administrators don’t see it you occasional by you in using web 2.0 tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Inappropriate use: recommendation

A
  1. Use AUPs
2. Vicki Davis recommends:
     Internet safety and privacy 
     information literacy 
     Internet citizenship 
     Internet teamwork 
     intentional Internet activities 
     engaged teachers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Copyright infringement issues

A
  1. Information about teaches rights and student ride to “copyright material is conflicting
  2. Copyright policies are complex which results in teachers not sharing innovative instructional approaches
  3. Most educators arenot sure what is fair use
  4. TEACH ACT signed by President Bush allow teachers to use copyrighted material for the purpose of instruction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Copyright infringement: recommendation

A
  1. Get permission to use copyrighted material
  2. Use work in the public domain
  3. Use royalty-free work
  4. Always give credit to the original creator and a link to the original work
  5. Education about copyright laws for students and teacher to prevent the utilization of innovative instruction tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data and identity Theft: issues

A
  1. Digitizing data poses a threat to the confidentiality of students information and can lead to identity theft
  2. Data theft most of the time lead to data manipulation and illegal distribution of tests or grades
  3. Data theft can put schools in violation of state in a federal laws
  4. Identity theft due to unsecured networks can lead to financial loss to the victims
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dayton and identity theft: recommendation:

A
  1. Computer and network security through restricting access and installing filters and firewalls
  2. Data encryption from plain text to ciphertext
  3. Setting user profiles to determine levels of access to keep data secure and not accessible to students
  4. Installing tracking devices on school equipments
  5. Provide staff training on how to handle sensitive information
  6. Establish technology plan that includes data security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Issues

A
  1. Inappropriate content
  2. Predators
  3. Cyber bullying
  4. Network security
  5. Inappropriate use of network
  6. Copyright infringement
  7. Data and identity theft