{"id":20497,"date":"2025-06-08T22:49:33","date_gmt":"2025-06-09T02:49:33","guid":{"rendered":"https:\/\/pacificopencourses.col.org\/ds4tc21\/?page_id=20497"},"modified":"2025-06-08T22:49:33","modified_gmt":"2025-06-09T02:49:33","slug":"cybersecurity-practices","status":"publish","type":"page","link":"https:\/\/pacificopencourses.col.org\/ds4tc21\/learning-pathways\/module-1-building-digital-competence-for-the-21st-century-classroom\/cybersecurity-practices\/","title":{"rendered":"Cybersecurity Practices"},"content":{"rendered":"<div id=\"content\" class=\"mw-body container\" role=\"main\">\n<div class=\"row\">\n<div class=\"col-md-12\">\n<div class=\"panel\">\n<div class=\"panel-body\">\n<div id=\"bodyContent\">\n<div id=\"mw-content-text\" lang=\"en\" dir=\"ltr\" class=\"mw-content-ltr\">\n<p>With your equipment safety lesson set up in Moodle or Google Classroom and a collaborative group in place, it is time to secure your tools to protect both your class and their data. Cybersecurity plays a key role in safeguarding digital identities and student information. It also helps create a safe and trusted online learning environment.\n<\/p>\n<div style=\"background-color: #f4f4f4;border-radius: 5px;margin-top: 20px\">\n<h3 style=\"background-color: #ccc;color: black;padding: 10px;margin-bottom: 10px;border-top-right-radius: 5px;border-top-left-radius: 5px\"><span class=\"mw-headline\" id=\"Password_Management_and_Authentication\">Password Management and Authentication<\/span><\/h3>\n<div style=\"padding: 10px\">\n<p>If you are using Moodle, password security for institutionally managed systems is typically handled by the Moodle administration team. They usually implement measures such as encrypted password storage and regular security updates. However, it is important to check with your IT support to confirm that these safeguards are in place.\n<\/p>\n<p>For Google Classroom and communication apps like WhatsApp, Viber, or Telegram, be sure to create strong passwords and enable two-factor authentication (2FA) where available. You can usually activate 2FA through the app settings using a mobile device or email account\n<\/p>\n<\/div>\n<\/div>\n<div style=\"background-color: #f4f4f4;border-radius: 5px;margin-top: 20px\">\n<h3 style=\"background-color: #ccc;color: black;padding: 10px;margin-bottom: 10px;border-top-right-radius: 5px;border-top-left-radius: 5px\"><span class=\"mw-headline\" id=\"General_Password_Practices\">General Password Practices<\/span><\/h3>\n<div style=\"padding: 10px\">\n<p>Regularly update passwords across all tools (Moodle, Google Classroom, WhatsApp, Viber, and Telegram), and advise students to keep theirs secure. They should never share their passwords and should always log out after using shared computers in places like libraries, labs, or community centres. These practices help prevent unauthorised access. Encourage students to use different passwords for each platform to reduce the risk if one account is compromised. They can also consider using a password manager, such as <a rel=\"nofollow\" class=\"external text\" href=\"https:\/\/bitwarden.com\/\" target=\"_blank\" title=\"(opens in a oew browser tab\/window)\">Bitwarden<\/a> (free for personal use), to securely store unique passwords.\n<\/p>\n<\/div>\n<\/div>\n<div style=\"background-color: #f4f4f4;border-radius: 5px;margin-top: 20px\">\n<h3 style=\"background-color: #ccc;color: black;padding: 10px;margin-bottom: 10px;border-top-right-radius: 5px;border-top-left-radius: 5px\"><span class=\"mw-headline\" id=\"Data_Protection_and_Privacy\">Data Protection and Privacy<\/span><\/h3>\n<div style=\"padding: 10px\">\n<p>Set permissions to control access to shared resources in Google Classroom. For example, you can make materials \u2018view only\u2019 or allow editing by adjusting settings in the \u2018Classwork\u2019 tab. Students can join your Google Classroom using a class code or an email invite. Ensure they have a Google account and internet access. Once all students have joined, reset the class code in the \u2018People\u2019 tab to prevent unauthorised access. Avoid using public Wi-Fi when managing classroom tools.\n<\/p>\n<p>For WhatsApp, Viber, or Telegram, add students using phone numbers or invite links, and restrict group access as needed. Regularly review privacy options in the apps\u2019 settings, such as WhatsApp\u2019s \u2018Privacy\u2019 tab or Telegram\u2019s \u2018Privacy and Security\u2019 section, to ensure that personal data is not publicly shared. These apps use end-to-end encryption, which means that only you and the intended recipient can read the messages. For Viber, double-check encryption settings regularly, as updates may affect how encryption is applied.\n<\/p>\n<\/div>\n<\/div>\n<p><b>Main Case Study Progression:<\/b> You\u2019ve secured your equipment safety lesson by using strong passwords and managing access to your WhatsApp, Viber, or Telegram group. With these safeguards in place, you can now grant students access to your chosen LMS and communication group. Your students are ready to begin engaging with the lesson.\n<\/p>\n<p><!-- \nNewPP limit report\nCPU time usage: 0.003 seconds\nReal time usage: 0.003 seconds\nPreprocessor visited node count: 10\/1000000\nPreprocessor generated node count: 22\/1000000\nPost\u2010expand include size: 0\/2097152 bytes\nTemplate argument size: 0\/2097152 bytes\nHighest expansion depth: 1\/40\nExpensive parser function count: 0\/100\n--><\/p>\n<p><!-- Saved in parser cache with key we_en-mw_:pcache:idhash:191528-0!*!*!!*!*!* and timestamp 20250608221804 and revision id 1109520\n -->\n<\/div>\n<div class=\"visualClear\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12\">\n<ul class=\"pager\">\n<li class=\"previous\">\n            <a href=\"\/ds4tc21\/learning-pathways\/module-1-building-digital-competence-for-the-21st-century-classroom\/digital-tools-for-teaching\">\u2190 Previous<\/a>\n          <\/li>\n<li class=\"next\">\n            <a href=\"\/ds4tc21\/learning-pathways\/module-1-building-digital-competence-for-the-21st-century-classroom\/evaluating-digital-tools\">Next \u2192<\/a>\n          <\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div id=\"wenote-ids\"><script type='text\/javascript' id='wenotes-ids'>\n    var WEnotesSite = \"https:\/\/wikieducator.org\";\n    var WEnotesPath = \"\/DS4TC21\/Building_Digital_Competence\/Cybersecurity_Practices\";\n    var WEnotesSiteID = \"0e3d258fbd36841f92259eefcd41d5e9\";\n    var WEnotesPathID = \"89b991d0d6fe16f3cc476a06836a80ec\";\n    var WEnotesIDs = { site: \"https:\/\/wikieducator.org\", path: \"\/DS4TC21\/Building_Digital_Competence\/Cybersecurity_Practices\", site_id: \"0e3d258fbd36841f92259eefcd41d5e9\", path_id: \"89b991d0d6fe16f3cc476a06836a80ec\" };\n<\/script><\/div>\n<\/div>\n<footer><\/footer>\n","protected":false},"excerpt":{"rendered":"<p>With your equipment safety lesson set up in Moodle or Google Classroom and a collaborative group in place, it is time to secure your tools to protect both your class and their data. Cybersecurity plays a key role in safeguarding digital identities and student information. It also helps create a safe and trusted online learning [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":0,"parent":20489,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-20497","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/pages\/20497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/comments?post=20497"}],"version-history":[{"count":1,"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/pages\/20497\/revisions"}],"predecessor-version":[{"id":20498,"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/pages\/20497\/revisions\/20498"}],"up":[{"embeddable":true,"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/pages\/20489"}],"wp:attachment":[{"href":"https:\/\/pacificopencourses.col.org\/ds4tc21\/wp-json\/wp\/v2\/media?parent=20497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}