CYBER SECURITY

UGC releases Digital Hygiene handbook to help teachers follow cyber security protocols:


 To handle this, the UGC released a ‘Digital Hygiene’ handbook that lists tips for the teachers to ensure safe virtual classrooms. This handbook will help students and teachers in the rural parts, who were suddenly exposed to digital learning. The handbook offers information on the concepts of safe cyber space protocols and teachers’ redefined roles for using digital tools. These protocols aim to expand the role of teachers as mentors.

Sudharshan Mishra, head, Department of Education, Ravenshaw University, Cuttack, Odisha said that the UGC handbook has listed a set of rules on what to do and what not do, and this will help teachers to utilize the allotted teaching hours in more productive manner. He says, “The protocols have brought one such sharp qualitative teaching option for achieving learning goals. Besides this, responsibilities of teachers and their teaching style are also redefined and have got diversified, making us aware of secure online pathways to preparing and delivering a lesson plan in a tech-savvy style”

Mishra further said that to keep students engaged in virtual classroom, teachers do keep a track of all asked queries or doubts and respond to all communications, mostly on a real-time basis. He says,” Besides, answering queries raised at discussion forums, chat rooms, videos, or other forms of the virtual classroom, teachers have to remain available for students after the class hours too.”

Comments

  1. Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.

    ReplyDelete
  2. Medical services, retailers and public entities experienced the most breaches, with malicious criminals responsible for most incidents. Some of these sectors are more appealing to cybercriminals because they collect financial and medical data, but all businesses that use networks can be targeted for customer data, corporate espionage, or customer attacks.

    With the scale of the cyber threat set to continue to rise, the International Data Corporation predicts that worldwide spending on cyber-security solutions will reach a massive $133.7 billion by 2022. Governments across the globe have responded to the rising cyber threat with guidance to help organizations implement effective cyber-security practices.

    In the U.S., the National Institute of Standards and Technology (NIST) has created a cyber-security framework. To combat the proliferation of malicious code and aid in early detection, the framework recommends continuous, real-time monitoring of all electronic resources.

    The importance of system monitoring is echoed in the “10 steps to cyber security”, guidance provided by the U.K. government’s National Cyber Security Centre. In Australia, TheAustralian Cyber Security Centre(ACSC) regularly publishes guidance on how organizations can counter the latest cyber-security threats.

    ReplyDelete
  3. Definition. Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access.

    ReplyDelete
  4. Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security

    ReplyDelete

Post a Comment

Popular Posts