School of Computing. The Information Security Awareness Research Group.

Slides:



Advertisements
Similar presentations
A strategy for a Secure Information Society –
Advertisements

International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
[Your District's] Comprehensive Guidance Program: Linking School Success with Life Success 1 [Your District’s] Comprehensive Guidance Program Responsive.
E.g Act as a positive role model for innovation Question the status quo Keep the focus of contribution on delivering and improving.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
Start Smart Stay Safe. Calgary Police Service Calgary Catholic School District Calgary Board of Education Mount Royal University Centre for Child Well.
Empowering Nation by Quality Education “Empowering Nation by Quality Education” CYBER SECURITY Training For Student/Individual/Corporate.
1 5 steps to enjoying a safer internet experience SID 2013 presentation for adults who work/volunteer with children, young people and vulnerable adults.
Establishing Cyber Security education, awareness, training and trust for SMEs Roger Dean, Executive Director
ICT Curriculum Evening – an introduction to Wizkid.
Working group discussion 1 Cyber Risk Security, Privacy ?
Growing up Digital Opportunities and challenges for parents.
Date of Presentation Guidelines for Industry on Child Online Protection © UNICEF/NYHQ /OLIVIER ASSELIN.
Promoting Learning Styles Through ICT By Miss T.Magi (E-learning Specialist: Butterworth)
Social Networking in Education Presented by Justin R. Clark.
Parents and School Librarians: Partners in Student Learning The [school name] School Library A Presentation for the [name PTA or PTO] [Date] Your Name.
The digital economy: developments in participation and productivity Chris Chapman ACMA Digital Economy Workshop Wednesday 10 Sept 2008 Melbourne.
Open Development Landscape in Uganda Uganda Open Development Stakeholders Workshop, Hotel Africana 11 th - 12 th September 2012.
Margaret J. Cox King’s College London
Project themes in MALAWI: HIV/AIDS Health in prison Climate change.
Safer Internet Forum 2007, TANJA ŠTERK, project coordinator SAFE-SI: SLOVENIAN AWARENESS NODE IDENTIFYING THE ACTORS AND ACTIONS.
Dr E Kritzinger – UNISA SACSAW Cyber Awareness Implementation Plan (CAIP) for schools.
A Cyber- Security Portal for Southern Africa Dr. Johan van Niekerk & Prof. Rossouw von Solms.
Chronic Diseases and Health Promotion – Tilly de Bruin (WHO) Vancouver, 6 June 2007 Overview of the different WHO school initiatives.
NGOs and ICTs : UNFT’s experience By Ms Rim Belhaj UNFT Executive Board Member Hammamet :May 26 th,
Can we afford the risk? Internet safety and security.
CHILD FOCUS Belgian Safer Internet Centre How to raise awareness among children, young people and their educators? Example of practice Nadège BASTIENEN.
Presidential National Commission on Information Society and Development (PNC on ISAD)  Government commitment to information society Accelerated Shared.
Fostering ethical, responsible use of online technology Hans Martens, Insafe.
Cyber habits of school children Rossouw von Solms Institute for ICT Advancement.
Dot.Safe visie 14 June 2002 Rolduc, The Netherlands Margit Hofer/ Roger Blamire.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
ELearning Vision Dallas Primary School & Kindergarten 2010.
Copyright © 2014 CyberSecurity Malaysia CyberSAFE Malaysia Website Fundamentals.
Primary Headteacher Report. January Methodology 8 Primary Schools both rural and urban Ranged from Ofsted ‘Outstanding’ to one just out of ‘special.
A Focus on Health and Wellbeing Wendy Halliday Learning and Teaching Scotland.
In this presentation we will... Learn what blogs and wikis are Look at blogs and wikis in the ELT context Discover how to set up a blog or a wiki Focus.
”Doing action-research on online self-help groups – advantages and challenges” TTeC
A Cyber Security Curriculum for Southern African Schools By Mariska de Lange and Prof Rossouw von Solms.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Valley Let’s create a better internet together.
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
School logo here LOGO. School logo here “Harnessing Technology to Transform Learning – the challenges for the ICT Technical Team in keeping xxxx Community.
E-Safety THURSDAY 12 TH FEBRUARY. E-Safety  What are the risks?  Jenny’s Story  The Byron report  Evaluation of resources  Planning an e-safety lesson.
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Social, Legal, and Ethical Issues.  Social Networking Students face a certain amount of risk when engaging in social networking.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Welcome to the Starz Conference March New proposals for Computing PoS How will you ensure you provide a child’s legal entitlement if the new proposal.
Blogging as a thinking tool Building Home/School Relationships.
Acceptable Use Policies and Internet Safety Melissa Borger Jamie Grauel Sam Westbrook Liz Robb Melissa Borger Jamie Grauel Sam Westbrook Liz Robb.
National Centre for Technology Education Dot.Safe Internet Safety Workshop Friday, 5 th October 2001 Mont Clare Hotel Dublin.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
E-Safety. When using computers, we need to keep our data safe. We also need to keep ourselves safe online. Data security is about making sure that data.
The IT Industry The Online World Building and Installing Know the components of computer systems Understand and practically apply appropriate connectivity.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
Acceptable Use Policy (Draft)
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
ITU Regional Standardization Forum For Arab Region SESSION 2 11:05-11:35 Overview of key documents and terms used in study groups and WTSA meetings.
Introducing STARTIFY7: Thematically-focused and lean-training summer academy system for young future ICT entrepreneurs Liverpool, UK– September 2016 ICT b.
Overview: Exam board is Edexcel
National Cyber Security Alliance and Raytheon Survey Findings 2015
A Guide for Parents and Carers
ITU-T Study Group 17 Security
Learning Area 1 Information And Communication Technology and Society
VPN What, where, who, why when?.
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
Mr Douglass Subject Leader ICT & Computing
Presentation transcript:

School of Computing

The Information Security Awareness Research Group

Quote by Bruce Schneier “People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems”

Users of information inexperienced users experienced users may not be aware of the risks have a higher technical knowledge of information security and possible threats Take responsibility for the information they work with

Users of information Younger users of information enthusiastic users of social networks extremely risky worst users in terms of threat awareness and security practices

Projects Focus Information security awareness and education amongst home users A citizen who uses ICT for personal use outside the work environment self responsible to secure computer children adults elderly

Projects Focus Information security awareness and education amongst home users A citizen who uses ICT for personal use outside the work environment self responsible to secure computer children adults elderly

Projects Focus Information security awareness and education amongst home users A citizen who uses ICT for personal use outside the work environment self responsible to secure computer children Role players teachers parents caregivers

Projects Open discussion share ideas, experiences, challenges and concerns regarding cyber awareness among children and users of information

Projects Open discussion share ideas, experiences, challenges and concerns regarding cyber awareness among children and users of information Guidelines on E-safety in Schools in collaboration with Joy Rosario from the Dept of Basic Education

Projects Open discussion share ideas, experiences, challenges and concerns regarding cyber awareness among children and users of information Guidelines on E-safety in Schools in collaboration with Joy Rosario from the Dept of Basic Education Internet awareness and education day in collaboration with Dept of Basic Education, government & industry

Themes: Educating children on the ethical and responsible use of social networking systems Post graduate students

Themes: Educating children on the ethical and responsible use of social networking systems Enhancing information security awareness in organisations by incorporating social issues into the information security awareness programmes Post graduate students

Themes: Educating children on the ethical and responsible use of social networking systems Enhancing information security awareness in organisations by incorporating social issues into the information security awareness programmes Assessing information security awareness programmes in South African banks Post graduate students

Themes: Educating children on the ethical and responsible use of social networking systems Enhancing information security awareness in organisations by incorporating social issues into the information security awareness programmes Assessing information security awareness programmes in South African banks Enhance privacy for online social networking Post graduate students

“If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” Conclusion

“If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.” Conclusion Our vision Contribute towards the creation of a cyber awareness culture