Education Cybersecurity Weekly is a curated weekly news overview for those who are concerned about the Education industry. It provides brief summaries and links to articles and news across a spectrum of cybersecurity and tech development topics that are specific to the industry.
Low grades, curiosity, classmates’ respect, practical interest, or just fun – there is a range of reasons, why students breach their schools. But what can faculty do to avoid the reign of young hackers over the district?
For educational organizations, Internet access is as vital as blood for human beings. However, there are places, where the lack of Internet connection is felt particularly acutely.
Student hackers challenging K–12 cybersecurity
EdTech Magazine on February 20, 2019
Do you remember the story, when two 12-year-old hackers accessed computer network of their district? Low grades, curiosity, classmates’ respect, practical interest, or just fun – there is a range of reasons, why students breach their schools. But what can faculty do to avoid the reign of young hackers over the district?
In addition to a comprehensive security system, districts should ensure Children’s Internet Protection Act compliance with on-campus and off-campus web filtering. A real-time insight into network activity will allow the IT department to widen visibility and control.
According to a Verizon report, 11% is a percentage of data and hack attacks in education where “fun” was cited as the underlying motive. Therefore, good cybersecurity habits, driven by ethics concepts, should be established for both faculty and students.
Furthermore, make sure that essential information sticks to essential personnel. It would mitigate the risk of sensitive information being hacked.
The lack of internet access decreases the academic success of rural students
eSchool News on February 21, 2019
Nowadays Internet access seems to be not just a product of tech development. For educational organizations, it is as vital as blood for human beings. However, there are places, where the lack of Internet connection is felt particularly acutely.
The recent report, based on a survey of students, who took the national ACT test, revealed that rural students are less likely than non-rural students to declare that their home internet access is “great”. Moreover, rural students, in comparison with non-rural, have less access to a laptop or desktop computer at home.
Too often students in rural areas are overlooked when it comes to education policy reform, despite the fact that nearly one in five students in U.S. public elementary and secondary schools live in a rural area. We need to do a better job of closing these equity gaps to ensure that we’re providing all students with the opportunity to be successful.
Jim Larimore, Chief Officer for ACT’s Center for Equity in Learning
The AI race favorites
The Tech Advocate on February 25, 2019
We think that “Common Era” and “Era of AI” have already become synonymous. It could really be the truth, especially when it comes to the achievements of the top countries leading the AI race. Do you have any ideas what these countries are?
- The US has always been famous for its effective tech development culture. Nearly $10 billion in venture capital is funneled towards AI development. However, there are consequences, making the future of AI uncertain, like increased education costs and immigration restrictions for international research professionals.
- China has really high ambitions for AI. Recently the government has announced its aim to become a $150 billion AI global leader by the year 2030. Moreover, the research potential of China is impressive – the number of studies on deep learning is greater than in other leading countries.
- Germany – Berlin is Europe’s leading hub for AI. “Cyber Valley”, created in 2016 is a result of a collaboration among universities, major private companies, and a research organization.
Bobby the Fish
Sometimes we need to look at things from different points of view. When it comes to building cybersecurity awareness, the unconventional techniques, such as cartoon characters, can be more helpful than traditional methods. To show you ins and outs of data security in education, we introduce our cybersecurity helper to you – Bobby the Fish.
Fish morning, ladies and gentlemen. While my man is hastily beating the keyboard by his fins, I have just got amazing news from my cousin Robby, a stickleback of the one university lab.
My man Anthony assumes that humans underestimate fish as well as the cybersecurity of education! Recently, scientists find out that a small fish can provide insight into the genetic basis of evolution. Researchers discovered that “the populations within the same type of habitat showed the same genetic variants in dozens of regions of the genome”.
Wow! Among these words I understood only “small fish” but I am sure it is something significant.
Whoops, my man turned off his electronic aquarium! See ya!
Bobby the Fish
The post Try a Different Angle of Education Tech Development appeared first on EdGuards – Security for Education.
*** This is a Security Bloggers Network syndicated blog from EdGuards – Security for Education authored by edguards. Read the original post at: https://edguards.com/egnews/education-cybersecurity-weekly/try-different-angle-of-education-tech-development/