The modern development of the higher education system is based on the use of innovative information and computer technologies. These technologies include the use of electronic textbooks, social networks, training sites, distance learning systems, and even the use of logistics elements in combination with modern information technologies. One of the important directions in teaching students is the use of software using cloud technology. At the same time, these technologies pose significant information security risks that are related to online education issues.
- Safe work on the Internet.
It has already been said above that in the process of distance learning, the child actively uses the Internet space. It should be understood that the World Information Network is not only a repository of valuable and diverse information, thanks to which it is possible to solve educational problems or find a free Economics essay online. Along with the obvious advantages of developing Internet communications, uncontrolled access to the global information space carries serious hidden and direct threats to students from the Internet. This is drug trafficking, terrorism, extremism, sectarianism, unethical advertising, etc.
- The dangers of the Internet.
As a rule, the “dangers of the Internet” are understood to mean such content that could harm users of computers connected to the Network, or their property. This harm can be both materials (damage to the computer, theft of money, distortion or theft of information), and moral (impact on the psyche). Such a definition is very arbitrary, but it seems that it defines the approximate spectrum of dangers that a person may encounter on the Internet as fully as possible.
- What are the online threats to the child?
The most common are:
- Unwanted site content that does not correspond to the age of the child, propaganda of cruelty, violence, racial hatred, sectarian ideology;
- gambling;
- malicious and unwanted programs that can damage the computer or worsen the quality of its work, as well as violate the confidentiality of information contained in the computer;
- scammers, hackers (computer crackers with the aim of obtaining confidential information);
- Internet addiction (virtual substitution of reality);
- sexual harassment;
- incorrect communication, online hooliganism (insults, rudeness).
- What to do?
To abandon the possibilities of the Internet as a learning environment or, nevertheless, try to protect the child from unwanted information?
What professionals advise: The problems of children’s safety online are problems that are relevant not only for parents and educators. Developers of Internet services reflect on them. If you download the Google search engine and enter the search query “child safety on the Internet”, you will receive hundreds of documents containing useful recommendations on this issue.
There are three main areas of use of cloud technologies at universities:
- collaboration on documents,
- joint project work of students,
- distance learning.
Since joint documents, projects, as a rule, do not carry secret information, the main threat to information security is the factor of the information collected when analyzing student training in order to predict the quality of training of future specialists and analyze their use in subsequent software work. Moreover, if the quality of training depends on a sufficiently large number of random factors, then the forecast for the use of software can be accurately determined. This is due to the algorithm of its application – students are trained on software samples, naturally, becoming students, former students work on the software on which they were trained (taking into account updates to new versions). Further, climbing the career ladder, the specialist becomes a manager and choosing software for the organization’s work will also choose his familiar options. By collecting information through cloud technologies that are used in teaching students, it is possible to make a forecast of their further use already in production and management activities. There are two types of threats when learning using distance technology. The first type of threat is associated with the active use of a computer in the process of distance learning, and the second with Internet browsing.
Conclusion:
Internet security is a very serious topic that touches upon both positive and negative aspects because it is a source of various threats. As mentioned in the article, due to access to certain information about the student, the future employer can understand in advance which person has come for an interview. But security risks of online education contain many threats on the Internet for children and adolescents and those risks must be closely controlled.