Discussion:Syllabus e-safety : Différence entre versions
(→Privacy and data management) |
m (→Privacy and data management) |
||
Ligne 120 : | Ligne 120 : | ||
<span style="color:#FF0000">--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''</span> | <span style="color:#FF0000">--''(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --[[Utilisateur:Mlukosevicius|by Mantas (Lithuania team)]] 8 juin 2011 à 16:17 (UTC))''</span> | ||
− | : As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network --[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC) | + | : ''As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network''--[[Utilisateur:Remilevy|Rémi LEVY]] 10 juin 2011 à 07:53 (UTC) |
===Security tools and network security=== | ===Security tools and network security=== |
Version du 10 juin 2011 à 08:54
Discussions
Here is the place to make comments on the Syllabus.
Sommaire
Todo list
- Focus map
- Define number of chapters
- Organise Items and Notions
- Find Quiz
- Discuss about chapter 4 --Rémi LEVY 7 juin 2011 à 09:04 (UTC)
- Give the rights on Mindomo --Rémi LEVY 7 juin 2011 à 09:18 (UTC)
About Items
Chapter 1 - Basic knowledge on e-safety
1.1. History : from static web1 to dynamic web2 environments
--(What are those web1, web2 and web3 environments? Is it necessary? by Mantas (Lithuania team) 8 juin 2011 à 14:58 (UTC))
1.2. Intention : web3 proposing constructive engagement in participatory society (or : security through light instead of old model of security through obscurity),
--(same here - we actually do not understand what is it aboutby Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))</span>
1.3. Know about equity between opportunities & risks since web2
--(if speaking about opportunities & risks it should be clarified - do we mean Internet? if so - it should be mentioned.by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.4. Know about netiquette and other basic codes of conducts in the cyberspace (RFC 1855)
--(what do you mean by "basic codes"?by Mantas (Lithuania team) 8 juin 2011 à 15:11 (UTC))
1.5. Know about social engineering and it’s methods, including participative culture and abuses if you don't understand/respect them, for example having your password stolen (to be reformulated)
--)what is "participative culture and abuses"? We think that it is already included in the definition of social engineerging. We recommend to stick to version "Know about social engineering and it’s methods".by Mantas (Lithuania team) 8 juin 2011 à 15:23 (UTC))
1.6. Understand the differences of contents (functional, factual, creative) of information (I don't understand this item --Rémi LEVY 7 juin 2011 à 07:51 (UTC)
--(needs to be clarified with Theo. This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:31 (UTC))
1.7. Understand the differences of formats (open, privative)
--(there is no such word "privative". We recommend "Understand the differences of data formats (open, private, business, etc.)" This item could be moved to syllabus chapter 2 - after 2.0. by Mantas (Lithuania team) 8 juin 2011 à 15:36 (UTC))
1.8. Understand the notion of identity
maybe to be repositioned in some other chapter --Rémi LEVY 9 juin 2011 à 19:49 (UTC)
1.9. eTools : Product versus function
--(Should be clarified--by Mantas (Lithuania team) 8 juin 2011 à 15:48 (UTC) )
1.10. Be aware of different identity for authorization theft methods (skimming, pretexting, shoulder surfing, information diving…)
- must be repositioned into the scam/hoax (chapter 5 or 6) ?
--( We recommend to leave in this chapter--by Mantas (Lithuania team) 8 juin 2011 à 16:00 (UTC) )
1.11. Be aware of privacy protection legal act (be aware of the responsibility for own actions on the Internet: do not publish the information without permission, be responsible by writing comments, do not download music, movies and so on).
1.12. Organizational security (school security) – or social engineering?, usage of school web pages, content publishing, access
--( social engineering is already mentioned in 1.5. We recommend "Know about Organizational security: school security, usage of school web pages, content publishing, access, etc."--by Mantas (Lithuania team) 8 juin 2011 à 15:56 (UTC))
Privacy and data management
I suggest : to begin with "Distinguish between data and information" --Rémi LEVY 7 juin 2011 à 07:49 (UTC)
(...)
2.7. Understand what intellectual property on Internet is and be aware of privacy protection legal act.
--(Privacy protection legal act is already mentioned in 1.11. Lets make this one only "Understand what intellectual property on Internet is."--by Mantas (Lithuania team) 8 juin 2011 à 16:11 (UTC) )
(...)
2.9. Privacy Management : Know how to start and finish safe browsing session (https, lock icon, always logout and close the browser window). Know consequences of unsafe browsing.
- 2.9 to 2.11 to me merged ? --Rémi LEVY 10 juin 2011 à 07:49 (UTC)
- 2.10. Know how to browse the Web securable. Know about advantages, disadvantages and dangers of Internet cookies. Know about tools that ensure safety when browsing the Internet (blocking of cookies, ActiveX control, etc.)
- 2.11. [#Privacy-RL] Be able to manage, clear temporary Internet files, browser history, passwords, cookies, and autocomplete data.
--(2.9 , 2.10 , 2.11 may be consolidated and must be moved to chapter 5 --by Mantas (Lithuania team) 8 juin 2011 à 16:17 (UTC))
- As it is technical, I don't see why to put this on chapter 5 which is more about behaviour in social network--Rémi LEVY 10 juin 2011 à 07:53 (UTC)
Security tools and network security
see how integrate from 3.5 to 2.11 --Rémi LEVY 7 juin 2011 à 07:52 (UTC)
Children, newcomers in schools and workplaces : means of safe use for socio-digital inclusion
Have discussion.....--Rémi LEVY 7 juin 2011 à 09:05 (UTC)
Social networks and safe usage of the Internet
I suggest "5.10. Dependency and addiction to the Internet" to be develop --Rémi LEVY 7 juin 2011 à 07:46 (UTC)