This site is no longer maintained. Please see MGLink.org for updated content.
If you are an IT Director, you may be called upon to transfer files in a secure manner. In school districts, there are several ways to accomplish that. Each way is briefly explored below and solutions offered.
This approach entails creating an encrypted conduit through which unencrypted files will be transferred from a server or your computer on a nightly basis. You will need to be able to automate this process and rely on a secure File Transfer Protocol (sFTP) solution or FTPs (read how sFTP is different from FTPs). This may entail you purchasing and implementing a secure FTP solution on a district server outside the firewall.
Server Side sFTP Solutions
Client Side sFTP Solutions
Some of the features most need include:
Using a Pretty Good Privacy (PGP) or open source equivalent (GPG), such as OpenPGP Encryption Tool (GoAnywhere MFT for automated encryption). You can write scripts that automate this using PowerShell if on Windows or other solutions if on GNU/Linux or Mac. Exploring the use of scripting solutions for data encryption is beyond the scope of this webinar.
Some have eschewed this approach in the favor of an sFTP solution or simply encrypting data using a tool like 7zip or SSE (Step 3) with AES-256 encryption (more on that below).
"A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network" (Wikipedia).
When we talk about using a VPN in a school setting, we're not discussing consumer-level VPN tools like those used for individual protection.
Some solutions in use in Texas schools:
Like many, if not all of you, I found myself spending way too much time on filtering issues. Block this, unblock that, getting teachers by-pass rights, etc. I finally just got fed up with all the time it was requiring. When I started looking at trends I realized we were using the filter as a student management tool and not for its intended purpose. Let me be very clear, we are still filtering and complying with CIPA and other mandates.
What we are NOT doing any longer, is blocking all the multitudes of other sites that might have inappropriate material. There are many sites, YouTube comes to mind, that have a lot of great educational material but also have content that is inappropriate at school.
If I block YouTube, then many of the school safe sites, like the browser Kidzui, Gaggle.net, and many others that use videos from YouTube, will not work. So, I did something drastic. I deleted the entire custom “blocked” sites in the filter. These are the sites that we add over time to the blocked library. There were literally thousands. The custom block library had become unmanageable. It was a total senseless mess....
The bottom line is that we are no longer using the filter as a student management device. We still block clearly inappropriate sites that have absolutely no educational value. The rest is up to proper monitoring and when that fails, treating the issue as a discipline issue, which it is. We have put the responsibility back on the teacher in the lab to monitor students effectively. Source: Texas Technology Director
This voluntary Framework consists of standards, guidelines, and best practices to manage cybersecurity-related risk. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. Watch a long video overview | Watch short video
View Framework in Google Sheets format (find most up to date copy at NIST)
MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge. MITRE started this project in 2013 to document common tactics, techniques, and procedures (TTPs) that advanced persistent threats use against Windows enterprise networks.
The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. Watch video shown right to learn more.
Listen and Learn about MITRE's ATT&CK "CyberThreat Encyclopedia"
Personal Tip: Try Firefox Quantum with the Multi-Account Container, which allows you to group your browser cookies. This prevents one site from spying on you while you are looking at another (Facebook does this, as do many other sites). Try privacy add-ons, too.
Need to encrypt using public/private key encryption tools that are compatible with PGP/GPG? Consider GoAnywhere's Open PGP Studio for Windows, Mac, or GNU/Linux computers. GoAnywhere also offers a Secure File Transfer Protocol (FTP) solution.
"Virtual Private Networks provide an important element of privacy protection for users," Electronic Frontiers Association says. . .VPNs [are] one of the most effective tools for protecting privacy when using the Internet, due to the degree of anonymity they provide when accessing online services.
*Cost associated, usually approx. <=$50 annual
*Cost associated, usually approx. <=$50 annual
To facilitate decryption, open the Paranoia Text Encryption Online tool (via the web browser on your device, including smartphones) and paste in the text that appears below. Use the password - kQgWbQhc58wc - and send it to "mguhlin@tcea.org" via email. Obviously, this password would not be shared on a web page for anyone to access. It is shared here for demonstration purposes.
==Begin Encrypted Text Below (only copy encrypted content, not anything with == in front of it)
fIqoBFlGIJibGhbYnHhdKkrpjQs2a]DKvDuxGOIEosjfgk)bHvqKB693PuPdSGCbtT9rS]KB3PFNo0MVKm95B)yF06rj)]KrLJnPfpogU1yIT]DgCzbsw8PlqxSZ]ndqcefwocfLOX9)q3tDSWtNg9WPw85yMyI47H6t8y1)LESw3P3roKKx3)3QscDPifOOTPhwOzmMkvl5ZgzvkzIbX8gQrcXrXJR2O9r5axA63]L6Ja9L6UeVt1Q810oZlDkLD2RIu0RS6ilV8aIR)TIrs66MxYYOqgh2HQ1UgSuI33EMuV8jGENDYxjxGA)5K]g6YJekzBGr5iWGYymUTP)UQvRIU2TSfmkIYzpAIozEMcBsrZ9KBzfchP1LdkB7oOH6ZSnFIrDskFwgx31AjCGeOEjy8bhkvF9gx2UkCDr28rMfR6DIPUGX7vjZY5fuDR])blioTUqE1I66ltMkJ9lMHTjntNQhu1rED232iV727yBPuNHJWu1qfNDgQLNsxngWIuxu7Y2Wt3jH1ql3IpePG3w1sjicGwmfzsj]1lW)1MoXzkFuLI8fC5556Q8FSG6R44XS)Sy5z5Xq412u6XPPU4M3HanQrIb1SGGTcjf1QDStWTREzQQKeT9G5blz499O8YxWqq9Q4Q1poQYFqDXYBPZjV9i93AiP9W4JStyShTU)ezjqBWpQmEy4UVCPD7yR]QLBcSUZT7OshQ)Ow6lxZm)lU6A!
==End Encrypted Text Below (only copy encrypted content above)
To encrypt text, type your own message in the Paranoia Text Encryption Online tool and then send the encrypted text to "mguhlin@tcea.org" with subject line of "Encrypted Text." Use the password - T5ecaJiMepSU - to encrypt. Or, if you prefer, use a different password.
You can easily encrypt emails in Google Suites using a tool like SecureGmail. Here are a few more alternatives:
Make sure to shred/wipe the ORIGINAL decrypted files/folder(s) when "at rest." Of course, first check that your decryption password works.
Dragging items to the Trash/Recycle Bin is insufficient since they can be recovered using a free tool like Recuva on Windows or your hard drive accessed on a GNU/Linux system then files recovered.
This is a question you will get. Make sure you keep your response simple and make it a requirement of dealing with sensitive data.
Seventy percent of hiring managers say they’ve decided not to hire an applicant because of information they have found online, according to a survey commissioned by Microsoft of 1,200 human relations managers and consumers. While most of those surveyed stated they research candidates online and think they are justified in doing so, only seven percent of consumers believed that recruiters check out potential candidates online when making hiring decisions.
Over one-half of managers surveyed agreed that data on lifestyle, inappropriate written text and inappropriate photos were types of information that could result in rejecting a candidate. An overview of the findings from the survey can be accessed at http://www.microsoft.com/privacy/dpd/research.aspx.
Positive online reputations matter.
Jane Hart put together her Top Tools for Learning list into a framework. (via tweet)
This is your chance to develop your own framework! Use the Google Draw document to create your own (here's the PPTx version).
SafeSchools.net offers K-12 school districts the ability to assign cyberbullying courses and more to staff. Staff have to actually complete a battery of online materials. The SafeSchool system tracks completion and allows for greater accountability.
Need ideas on how to celebrate Digital Citizenship Week? Check out these activities and resources that are sure to help you.
Digital Citizenship Week (October 16 – 22) is the perfect time for you and your students to reflect on the role technology plays in your lives. It’s an opportunity to stress the importance of positive online habits, to learn about digital safety and responsibility, and to encourage acts of kindness.
Often, it's one thing to develop policy, quite another to implement it in a way that makes sense. How can we, as leaders in a learning organization, model responsible use of technology with students and staff?
Over the next 30-40 minutes, you will explore this question and learn how the school district plans to introduce students and staff to digital citizenship, cybersafety and responsible use.
Being a good digital citizen is more than knowing your way around the web. It's about connecting and collaborating in ways you didn't even know were possible.
Our K–12 digital citizenship program includes comprehensive learning resources for students, teachers, and family members and 65 grade-differentiated lesson plans.
National Cyber Security Awareness Month (NCSAM) – observed every October – was created as a collaborative effort between government and industry (the U.S. Department of Homeland Security and the National Cyber Security Alliance) to ensure every American has the resources they need to stay safer and more secure online. 2017 marks the 14th year of National Cyber Security Awareness Month.
Twitter: @diben | Email: dbenner@tcea.org
This binder is an attempt to collect and organize Digital Citizenship resources by age (grade level). Often when we think of Digital Citizenship, we only think about the safety aspects of it but being a digital citizen is much more than just being safe. The nine elements of Digital Citizenship as outlined in the book Digital Citizenship in Schools by Mike Ribble and Gerald Bailey are: Digital Etiquette; Digital Communication; Digital Literacy; Digital Access; Digital Commerce; Digital Law; Digital Rights & Responsibilities; Digital Health & Wellness; and, Digital Security (self-protection).
http://www.livebinders.com/play/play/34991#
WoodWardTrac shares a variety of resources and links to assist you in learning about digital citizenship. An annotated bibliography is also included as well as a list of blogs and Twitters you may be interested in following.
http://digitalcitizenship21.wikispaces.com/
This link takes you to pins that have been labeled with 'Digital Citizenship'. You may also be interested in clicking on Boards to reduce some of the clutter and redundancy.
http://pinterest.com/search/?q=digital+citizenship
Take part in the conversation that is going on via Twitter. You can search for the hashtag #DigCit to find information and resources. You can also search for "Digital Citizenship" (in quotes) to find resources.
This documents provides information about cyberbullying and cyberthreats for educators and other professionals who focus on youth safety and well-being and sets forth recommendations for a comprehensive school and community-based approach to address these concerns.
http://www.wcs.k12.va.us/users/honaker/cyberbullying-for-teachers.pdf
This toolkit was developed by Common Sense Media
https://www.commonsensemedia.org/educators/cyberbullying-toolkit
Howcast shares their video on using proper netiquette while online. Though this may include some items you may not cover in netiquette, it has good information.
[Time: 2:39]
http://www.youtube.com/watch?v=6dRoclqDJh0
This fun video was created using the SockPuppets app. Since the app doesn't create long videos, short 30 second clips were pieced together to explain the nine elements of being a digital citizen.
[Time: 8:56]
http://www.youtube.com/watch?v=zD_CANwFASU
This video shares how easy it is to find out information about a student if they aren't careful about what they post. Even though the video is a little pixelated, it is a great tool to emphasize the need to think before you post.
[Time: 5:01]
http://www.youtube.com/watch?v=aMJ4u3zfmoo
This short video shares how damaging it can be when someone misuses your information and how it can hurt others.
[Time: 1:50]
http://www.youtube.com/watch?v=SQP3s1HmrAo
This tragic story of Kacie Woody is worth telling so that others may avoid falling for the trap that ensnared her. She was an honor studet, her dad was a police officer, and still some bad decisions were made that ended fatally.
http://www.youtube.com/watch?v=-mEirio3xIg
Known for providing quality research, the Pew Center has a lot of information related to teens and their use of the Internet. They make it easy to find specific topics, demographics, and/or technologies.
http://pewinternet.org/Topics.aspx
This study, by Marsha Roth, examined Elementary students’ perceptions of how bullying issues are addressed in their classroom. Relevant data were obtained from 3rd, 4th and 5th grade Elementary school students and from 12 Elementary school teachers. The goal of the study is to determine the correlation between teachers and students perceptions of bullying in the classroom. SS Elementary teachers lack the information in knowing how their students perceive bullying in the classroom.
Though it may be easy to feel like you are sinking when you start reading research, jump to the section on Findings - page 74 of this document. This is where the rubber meets the road for our conversation. Interesting findings though maybe not surprising. This information can help inform you when implementing your curriculum.
In this article, June Ahn, reviews emerging research surrounding youth's engagement with social networking sites. While this article is very academic, it does offer good insight and data.
http://onlinelibrary.wiley.com/doi/10.1002/asi.21540/pdf
TeachersFirst is a collection of resources and lessons for teachers. Suggestions for safe Web 2.0 sites as well as online safety resources are given.
http://www.teachersfirst.com/spectopics/safety.cfm
Designed for grades 3 through 8, each scavenger hunt provide students a list of questions they have to answer as they explore various websites.
http://usa-sos.org/index.cfm?Page=Scavenger_Hunt
In this article, Allen W. Achilees shares tips for teachers and teens to help them have a more secure and safe online experience.
Based on a security breach of a popular site with teens, it was surprising to find out the most common passwords. Even though it may be cumbersome and tedious, teens and adults should create strong passwords. Do you use any of these common ones?
As in many states, students in Illinois are required to receive a certain number of hours of instruction each year dedicated to Internet Safety. While the idea is noble, the parameters are sketchy. Some schools have an “Internet Safety Day” or some such “special occasion” but too often these “occasions” serve no purpose other than compliance with the requirement and very little learning occurs.
http://www.techlearning.com/article/52762
This eye-opening article discusses various aspects of the use of social media websites by teens. Very interesting read.
If you are needing to communicate your curriculum to parents and the community, you might find this method a good overview that can quickly be shared.
http://www.nwcsd.k12.ny.us/Page/377
In this article, Jeff Dunn discusses the teacher's role in keeping students safe online. Several tips as well as additional resources are shared to assist teachers in this task.
“It might surprise parents to learn that it is not a waste of time for their teens to hang out online,” said Mizuko Ito, University of California, Irvine researcher and the report’s lead author. “There are myths about kids spending time online – that it is dangerous or making them lazy. But we found that spending time online is essential for young people to pick up the social and technical skills they need to be competent citizens in the digital age.”
MacArthur Digital Media and Learning Report
Use of social media and its success in schools.
Educators would like more training, professional development, and direction on using social networking and other technology from school/district leaders. Although educators are joining social networks, they express a need for guidance, training, and professional development.
Many educators have a high level of concern about joining social networking sites. They are concerned about privacy; they have very little time; and they get too much email.
Schools and districts often block access to sites, and many educators are frustrated by this....
Source: A Survey of K-12 Educators on Social Networking and Content-Sharing Tools, EdWeb.net
Educators who have joined a social network are more positive about the value of this technology for education than those who haven’t, but they want the ability to separate their personal and professional communications.
Source: A Survey of K-12 Educators on Social Networking and Content-Sharing Tools, EdWeb.net
Students who attempt to multi-task, checking social media sites while studying, show reduced academic performance (http://viralms.com/blog/2011/04/how-social-media-affects-students/). Their ability to concentrate on the task at hand is significantly reduced by the distractions that are brought about by YouTube, stumbleupon, Facebook or Twitter. Social networking has increased the rate and quality of collaboration for students. They are better able to communicate meeting times or share information quickly, which can increase productivity and help them learn how to work well in groups. (Source: http://edudemic.com/2011/07/social-media-education/)
Social Media Best Practices (Suggested)
Tools to Manage Social Media/Networking
Educational Uses of Facebook
Educational Uses of Twitter
Other Resources