22 Matching Annotations
  1. Mar 2023
  2. Dec 2022
    1. recommandation 1Sensibiliser, par l’intermédiaire desambassadeurs « non au harcèlement »,présents dans chaque établissement scolairedepuis la rentrée 2022, les professionnels del’Éducation nationale (chefs d’établissement,CPE, professeurs principaux) à la réalitédu phénomène du cyberharcèlementscolaire comme étant une manifestationdu harcèlement scolaire et les former aurepérage de ces situations et à l’utilisationdes dispositifs permettant de prévenir etde lutter contre le harcèlement scolaire, ycompris en ligne.
    2. recommandation 2Mieux sensibiliser les enfants et leurs parentsen prévoyant une information dédiée àchaque rentrée scolaire rappelant le droitexistant et les sanctions encourues en casde harcèlement et de cyberharcèlement,ainsi que les numéros dédiés, le 3018 et le3020, au signalement de telles situations et àl’accompagnement des victimes.
  3. Feb 2022
  4. Dec 2021
    1. Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

      Edge Computing: What It Is and Why It Matters0 https://en.itpedia.nl/2021/12/29/edge-computing-what-it-is-and-why-it-matters/ Edge computing is an emerging new trend in cloud data storage that improves how we access and process data online. Businesses dealing with high-frequency transactions like banks, social media companies, and online gaming operators may benefit from edge computing.

  5. Jul 2021
  6. Mar 2021
    1. What You Should Know About Online Tools During the COVID-19 Crisis », Electonic Frontier Foun-dation, mars 2020

      mars 2020 What You Should Know About Online Tools During the COVID-19 Crisis », Electonic Frontier Foun-dation, mars 2020

    2. Les risques cyber liés au télétravail des salariés confinés dans le cadre de la lutte contre le Co-vid-19 »,Flash ingérence économique n°63, DGSI, avril 2020
  7. Oct 2020
    1. Australia's Cyber Security Strategy: $1.66 billion dollar cyber security package = AFP gets $88 million; $66 million to critical infrastructure organisations to assess their networks for vulnerabilities; ASD $1.35 billion (over a decade) to recruit 500 officers.

      Reasons Dutton gives for package:

      • child exploitation
      • criminals scamming, ransomware
      • foreign governments taking health data and potential attacks to critical infrastructure

      What is defined as critical infrastructure is expanded and subject to obligations to improve their defences.

      Supporting cyber resilience of SMEs through information, training, and services to make them more secure.

  8. Jul 2020
    1. Digital and net-worked media offer new ways of expanding the reach and accessibility of connected learning so it is not just privileged youth who have these opportunities.

      So many online communities to choose from, but as of yet do not discuss the safety/privacy/security of connecting with these online communities

  9. Dec 2019
    1. В 2017 году количество устройств, подключенных к «интернету вещей», выросло до 8,4 миллиарда. Консалтинговое агентство Forrester прогнозирует, что к концу года более полумиллиона из них взломают. В Университете Иннополис уточняют, что в третьем квартале 2017 года в городской инфраструктуре стали фиксировать на 30 % больше случаев угрозы информационной безопасности. При этом каждый пятый из них оказался критичным. 
  10. Feb 2019
    1. In 2016, the top seven advanced to the grand championship finale, where they’d need to enter a full cyber-reasoning system—one that would not merely notice a problem but could also infer its nature.
  11. Apr 2017
    1. We often use terms such as "portal" or "site" or even "entry"

      This is a 2008 book, but by then, we were already seeing a shift away from related, three-dimensional spaces, like forums and a chatroom, towards walls and feeds. Video games still keep the image of the "cyber world," but the internet's gotten much flatter since I first started browsing.

  12. Dec 2016
  13. Jan 2016
  14. Dec 2015
    1. "It makes zero sense to lock up this information forever," said Jeremiah Grossman, who founded cybersecurity firm WhiteHat Security. "Certainly there are past breaches that the public should know about, is entitled to know about, and that others can learn from."

      I used to think the most fanciful thing about the movie "War Games" was not the A.I., but the defense computer connected to a public network. But if industrial control systems can be reached by the Internet or other public lines -- then maybe the government is that stupid.

  15. Jan 2015
    1. But a lot was in the open—cyber-attacks by the US government, for example. Already by 2006 or 2007 it was crystal clear that there were dedicated units within the Department of Defense whose job was to take down the websites of jihadists and other foes, even if there was typically tension between the Pentagon and the CIA, which wanted to derive intelligence from them so didn’t want them taken down.

      Which has grown into something quite else, because while it may not be possible to control the Internet by controlling every router, it is possible to effectively control the Internet by control the volume and direction of propaganda and cyber attacks. In other words it is possible to have a pivotal influence.