The Conceptual Framework of mLearning Security for University in Thailand Sarawut Ramjan Department of e-Commerce Management North-Chiang Mai university.

Slides:



Advertisements
Similar presentations
THE MLEARNING SECURITY RULE BASE SYSTEM WITH SOCIAL NETWORK ON ECAMPUS: A CASE STUDY OF NORTH-CHIANG MAI UNIVERSITY Sarawut Ramjan, North-Chiang Mai University.
Advertisements

Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Information Technology – Guidelines for the Management of IT Security
The International Security Standard
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Cloud Usability Framework
Chapter 3: Information Security Framework
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Fraud Prevention and Risk Management
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Challenges in Infosecurity Practices at IT Organizations
Presented by : Miss Vrindah Chaundee
Systems and Software Consortium | 2214 Rock Hill Road, Herndon, VA Phone: (703) | FAX: (703) Best.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
The New Era of HIA in Thailand HIA Development Report 2006 and the future HIA development strategy Suphakit Nuntavorakarn Healthy Public Policy.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Daniel Cuschieri Information Security Distance Learning Weekend Conference August 2013.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Introduction to Information Security
Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.
UNFCCC WORKSHOP ON METHODOLOGIES ON CLIMATE CHANGE IMPACT AND ADAPTATION back-to-back with UNDP-GEF WORKSHOP FOR DEVELOPING AN ADAPTATION POLICY FRAMEWORK.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Tunis, Tunisia, 28 April 2014 Cloud Computing Standardization Includes Security Ruan HE, Senior Expert, Orange, Verdana 24 2 nd SG 13.
DCSS Information Security Office Partnership for a secure environment Lawrence “Buddy” Troxler Chief Information Security Officer February 13, 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
1.  1. Introduction  2. Policy  3. Why Policy should be developed.  4. www policies 2.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
Copyright 2016, Techarex Networks LLC. | | Call Toll-Free : Benefits Of Hosted QuickBooks For CPA Firms.
Risk management.
CS 450/650 Fundamentals of Integrated Computer Security
Chapter Three Objectives
Information Security Awareness
LAND RECORDS INFORMATION SYSTEMS DIVISION
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
IT Vocab IT = information technology Server Client or host
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
ISO 13485:2003 Requirements that overlap with ISO 9001
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

The Conceptual Framework of mLearning Security for University in Thailand Sarawut Ramjan Department of e-Commerce Management North-Chiang Mai university

Introduction mLearning is employed for improving class management –Anytime –Anywhere Lecture mobile application Student mobile application Network infrastructure –Optional- Cloud computing

Issue Vulnerability points –Client –Server –Communication pipeline Cyber problem Focus on Thailand-digital divide –Border country –Each region

Solution Concerning issue Technological solution Concentrated in various viewpoint –C.I.A. Triad dimension Integrity Confidentiality Availability

List review Common threat –Access to data –Unauthorized –Device corruption –Malicious software

Experience countries I The similar direction Overlap in vulnerability points and C.I.A triad dimension –Threat and problem –Security control

Experience countries II Compromised to ISO/IEC27001 and ISO/IEC 17799:2005 –Security policy –Organization information security –Asset management –Human resource security

Experience countries III Compromised to ISO/IEC27001 and ISO/IEC 17799:2005 –Physical and environmental security communication and operation management –Access control –Information system acquisition, development and maintenance –System information security incident management –Business continuity management and compliance

The conceptual framework

Conclusion and recommendation Ease up to later model –Key success factor Practical guideline for Thai university –Rule base system Solution and procedure from various input Further paper study –Law/act

Q & A and Thank you