CeTUSS Dec 2005 Margaretha Eriksson A holistic view on information security training and education Margaretha Eriksson Ph.D. Student DSV / SU

Slides:



Advertisements
Similar presentations
The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
Advertisements

CS3773 Software Engineering Lecture 01 Introduction.
1 Graduates’ Attributes : EMF, EUR-ACE and Federal Educational Standards Alexander I. Chuchalin, Chair of the RAEE Accreditation Board Graduates’ Attributes.
Open Educational Recourses - SOCIOLOGY Department.
Cyber Education Project Accreditation Committee November 2014.
Georgia Department of Education. Information Technology Pathways.
Welcome to Karlstad University Our vision We challenge the established and explore the unknown!!
The Department of Telematics Faculty of Information Technology, Mathematics and Electrical Engineering Norwegian University of Science and Technology Prof.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
IS6112 Application Modelling and Design Introduction.
Advances research methods and proposal writing Ronan Fitzpatrick School of Computing, Dublin Institute of Technology. September 2008.
The Education of a Software Engineer Mehdi Jazayeri Presented by Matthias Hauswirth.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
©TheMcGraw-Hill Companies, Inc. Permission required for reproduction or display. COMPSCI 125 Introduction to Computer Science I.
Designing Your Project Output Achieving your objectives by targeting your audience Ken Peffers UNLV February 2004.
Careers in Mathematics 24 March Careers In Mathematics What can you do with a B.Sc. degree in Mathematics ? Where do you want to work ?
CS351 - Software Engineering (AY2005)1 What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects.
Teaching and learning on the Net 5 November 2001.
Masters in Information Science and Technology (IST) Thesis and Non-Thesis Option (30 Credits)
Social and Economic Impacts of IT Professor Matt Thatcher.
Social and Economic Impacts of IT Professor Matt Thatcher.
ADAPTING TO CHANGE TRAINING NEEDS OF LIS PROFESSIONALS By Mrs. Chandrakala N PaiMr. V Sriram Librarian, Chief Librarian, KNRaj Library Prin. KMK College.
Week 3 1 S514: Social Aspects of IT. 2 Disciplines related to SI Social ScienceManagementComputer Sci. Science & Technology Studies MIS Information Science.
Information and Communication Technologies in the field of general education in Armenia NATIONAL CENTER OF EDUCATIONAL TECHNOLOGIES.
Miss V Tatler Computer Science Subject Leader
Brno University of Technology Program for the Third Age Jiří Kunovský address:Brno University of Technology.
CONTI’2008, 5-6 June 2008, TIMISOARA 1 Towards a digital content management system Gheorghe Sebestyen-Pal, Tünde Bálint, Bogdan Moscaliuc, Agnes Sebestyen-Pal.
ALISE 2014 Conference Jeonghyun Kim & William E. Moen
June 6, 2001By: Respickius Casmir1 Doctoral Thesis Title and Author A Systemic-Holistic Approach to Academic Programmes In IT Security Presented By Louise.
DSV – Campus IT-university in Kista AK nov 2007 Department of Computer and Systems Sciences - DSV Established Joint dep. for SU – Faculty of Social.
School of Management & Information Systems
Integrating Digital Curation in a Digital Library curriculum: the International Master DILL case study Anna Maria Tammaro University of Parma Florence,
Computer Jobs 2013 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
Experiences in Undergraduate Studies in the University of Zaragoza LEFIS Undergraduate studies Oslo, 19 th -20 th May 2006.
LEFIS W2 Posgraduate Workshop 1 LEFIS, WG 2 Postgraduate studies Meeting, Rotterdam.
ST-CS Introduction to Web Interface Design Fall 2010 Dr. Angela Guercio ( Course Web.
Computer Jobs 2014 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
DOP - A CPU CORE FOR TEACHING BASICS OF COMPUTER ARCHITECTURE Miloš Bečvář, Alois Pluháček and Jiří Daněček Department of Computer Science and Engineering.
Michigan High School Science Meap Test Constructing.
Curriculum Innovations in the Department of Informatics of TEI-A Prof. K. Georgouli Nis, 24 March 2006 SCM Tempus project CO15A05.
A General Course on Science of Information Juan G. Lalinde-Pulido Universidad EAFIT Medellín – Colombia
Purpose of study A high-quality computing education equips pupils to use computational thinking and creativity to understand and change the world. Computing.
Gilbertine IKILI OSSANA Information Systems: CERAG Advisor: Marc FAVIER Ethics and ICT/IS in Organizations Presentation of PhD subject: June 8, 2012.
The lives of psychologists A short introduction. Goals of psychologists »In any field, psychologists attempt to do the following: »Observe »Describe »Explain.
Informatics Institute 6/19/081 A Draft Plan for the Informatics Institute (Graduate Program) Informatics Institute A Draft Plan for the Informatics Institute.
CHATS IN THE CLASSROOM: EVALUATIONS FROM THE PERSPECTIVES OF STUDENTS AND TUTORS AT CHEMNITZ UNIVERSITY OF TECHNOLOGY, COMMUNICATION ON TECHNOLOGY AND.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
BUSINESS INFORMATICS descriptors presentation Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST) Linkoping.
Information Systems. What are Information Systems? The largest growth in most economies is coming from 'information' industries. The success of such knowledge-based.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
KFUPM-COE Industrial Advisory Council Meeting 31/5/ Department of Computer Engineering (COE) College of Computer Sciences and Engineering (CCSE)
“4WARD – Architecture and Design for the Future Internet” D2.1 Technical Requirement Hoon-gyu Choi
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, & Management, 6 th Edition, Rob & Coronel Learning Objectives.
MoRob – Modular Educational Robotic Toolbox Uwe Gerecke.
ANIE IE Research Workshop Objectives towards a Curriculum Development University of Pretoria July 4-5, 2011 Rafael Capurro International Center for Information.
Systems Analysis and Design in a Changing World, Fourth Edition
By Laili Hashim Rafidah Abd. Aziz laili Hashim & Rafidah Aziz.
Software Engineering Chapter: Computer Aided Software Engineering 1 Chapter : Computer Aided Software Engineering.
1 컴퓨터 교육 2 학기 김혜원 Teaching Networking and Operating System to Information Systems Majors D. Robert Adams and Carl Erickson Department of computer Science.
DOE Data Management Plan Requirements
Common features for the subject area report Law and Policy LEFIS Continuing education Malta, 8th April 2006.
Revision of Course: Lecture 1 – 15 Lecture 31 Research Tools and Techniques.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Julia Lane New York University
Information Security Seminar
CS 1104 INTRODUCTION TO COMPUTER SCIENCE
CIS460 – NETWORK ANALYSIS AND DESIGN
A Survey of Digital Library Education
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

CeTUSS Dec 2005 Margaretha Eriksson A holistic view on information security training and education Margaretha Eriksson Ph.D. Student DSV / SU

CeTUSS Dec 2005 Margaretha Eriksson DSV / SU and SecLab Laboratory for research and education in Computer Security and Security Informatics. Professor Louise Yngström Mission to advance theory and practice in computer and information security, for the benefit of society. Holistic approach To investigate problems of security from technical, social, managerial, economic, and legal perspectives In computer and systems sciences context, utilizing disciplines, such as sociology, pedagogy, jurisprudence, economics, etc. Some Research Areas: Education and Awareness in Security (alternative methods for teching and learning security,... Management of Information Security (to understand, explain, control, predict...)

CeTUSS Dec 2005 Margaretha Eriksson Information Security Courses DSV / SU Introduction to Cryptography Generell systemteori med tonvikt på styr- och kontrollfunktioner Informations- och datasäkerhet KTH Principles of Computer Security Introduction to Information Security and its Environment Network Security Value based Risk Management

CeTUSS Dec 2005 Margaretha Eriksson Systemic-holistic framework for IT security (Yngström) Design/ Architecture Theory/ Models Physical construct Process, store, communicate, collect, displayOperational Administrative, ManagerialLegalEthical Technical aspect Non-technicalaspects Context

CeTUSS Dec 2005 Margaretha Eriksson

The Missing Human IT security in a holistic manner - in real life... Attend lectures, read the literature and scan Internet Play with IT security in a safe sandbox Write reports on findings on technical issues But... Where are the users of the system? The system limits is excluding the human users!

CeTUSS Dec 2005 Margaretha Eriksson More than technology...

CeTUSS Dec 2005 Margaretha Eriksson Cross-over areas Steel milling vs Pulp and Paper industry - similar format, different density of material Content Management vs Configuration Management - similar structuring, html document vs products SW Object Orientation vs Structured writing (IMAP ® method) - similar structuring method, source code vs text chunks

CeTUSS Dec 2005 Margaretha Eriksson A working method... TÖI/SU IT for translators course – designing and teaching Computer based Translation tools to non-engineers Process and work-flow related Life-cycle approach of the translation