SlideShare ist ein Scribd-Unternehmen logo
1 von 12
2014
Edu ision
 What is Cyber-Security (CS) Education?
 Why should we provide this Education?
 Who is the target audience ?
 Curriculum for Cyber-Security
 Limitations of a Cyber-Security Curriculum
 Conclusion
 Future Work
 Education
Learning that enables
 Cyber-Security
Protection computers, networks, programs and data
from unintended or unauthorized access, change or
destruction, i.e. enforcing Confidentiality, Integrity,
Access (C.I.A) for the Internet.
 Increase in Malicious Cyber-Attacks
 Increase in internet open access
 Proliferation in social media (instagram, facebook)
 Adoption of new technologies (e.g. web bitcoins)
 Awareness levels close to real time is low
 Increase in Cyber-Security penetration
 Need for Cyber-Security Forensics
 Primary School Education
 High School Education
 College /Tertiary Education
 Curriculum at primary level education
Geared towards mobile safety and online conduct
 High School Education
Deeper in browser forensics and online tracking
 College Level /Tertiary Education
Emphasis on understanding threat models, creating
mitigation strategies and building solutions.
 Power up and Power down computers
 Identifying secure and insecure web pages
 Social Engineering for the Internet
 Identifying basic malicious attacks (e.g. pop ups,
script kiddies etc.)
 Reading web page instructions and terms and
conditions for using such pages.
 Advance Computer Networking
 Advance Digital Forensics and Incident
Response for the Internet
 Legal Policy for the Internet
 Cryptography Techniques for the Web
 Online Financial Security
 Internet Auditing and Risk Management
 Internet Governance
 Security is an interdisciplinary field
(many skills to hone)
 Policy adoption on security education
 Human Talent Pool of Educational Security
Experts at all levels of curriculum
 Technology Adoption
 Cyber-Security transformation education
initiatives at all levels of the curriculum required
 Existing National ICT initiatives lack the adequate
pool expertise at all requisite levels of curricula.
 As Internet penetration increases - a global intiative
on Cyber-Security is imperative and the Jamaican
context requirement is no less.
 Tertiary Level training to inform tertiary level
training and lower level curricula is required.
 Cyber-Security transformation education
initiatives at all levels of the curriculum required
 National ICT security policy initiatives that speak to
skills based initiatives to provide short term,
medium term and long term Security Talent
Management Pools
 Tertiary Level training to inform tertiary and lower
level curricula
?
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 

Was ist angesagt? (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 

Andere mochten auch

What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyEly Kahn
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
 
Teacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsTeacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsShelly Sanchez Terrell
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์deepre
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์deepre
 
Project 2000
Project 2000Project 2000
Project 2000lexsing
 
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieWat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieDigital creator Nederland
 
Food And Thought
Food And ThoughtFood And Thought
Food And Thoughtthandastuff
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1sasitorn
 
Video Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécritureVideo Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécriturevogmae
 
Flyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious StudiesFlyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious StudiesGrial - University of Salamanca
 
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateCourse 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateImad Daou
 
Персональное обучение. Мастер-класс
Персональное обучение. Мастер-классПерсональное обучение. Мастер-класс
Персональное обучение. Мастер-классDmitry Izmestiev
 
National Parks
National ParksNational Parks
National Parkstpuetz
 

Andere mochten auch (20)

What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity Policy
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Teacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsTeacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and Apps
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์
 
China K4
China K4China K4
China K4
 
Project 2000
Project 2000Project 2000
Project 2000
 
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieWat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
 
Food And Thought
Food And ThoughtFood And Thought
Food And Thought
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
 
Video Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécritureVideo Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécriture
 
Flyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious StudiesFlyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious Studies
 
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateCourse 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM Template
 
Персональное обучение. Мастер-класс
Персональное обучение. Мастер-классПерсональное обучение. Мастер-класс
Персональное обучение. Мастер-класс
 
Communication
CommunicationCommunication
Communication
 
National Parks
National ParksNational Parks
National Parks
 

Ähnlich wie Cyber-Security in Education

Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaachuamal415
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultSOCVault
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Assignment Help
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...advancedtrainingaus
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdfINFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdfteampcsdf
 
Become a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business ChallengesBecome a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business ChallengesMitedu
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Skillogic Solutions
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Skillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxSkillogic Solutions
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxSkillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxSkillogic Solutions
 

Ähnlich wie Cyber-Security in Education (20)

Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in kerala
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdfINFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
 
Become a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business ChallengesBecome a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business Challenges
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 

Mehr von Tyrone Grandison

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Tyrone Grandison
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicTyrone Grandison
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessTyrone Grandison
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Tyrone Grandison
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodTyrone Grandison
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...Tyrone Grandison
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab LaunchTyrone Grandison
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanTyrone Grandison
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusTyrone Grandison
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of InnovationTyrone Grandison
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMETyrone Grandison
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceTyrone Grandison
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social GoodTyrone Grandison
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationTyrone Grandison
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of AmericaTyrone Grandison
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsTyrone Grandison
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeTyrone Grandison
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in HealthcareTyrone Grandison
 

Mehr von Tyrone Grandison (20)

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 

Kürzlich hochgeladen

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 

Kürzlich hochgeladen (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 

Cyber-Security in Education

  • 2.  What is Cyber-Security (CS) Education?  Why should we provide this Education?  Who is the target audience ?  Curriculum for Cyber-Security  Limitations of a Cyber-Security Curriculum  Conclusion  Future Work
  • 3.  Education Learning that enables  Cyber-Security Protection computers, networks, programs and data from unintended or unauthorized access, change or destruction, i.e. enforcing Confidentiality, Integrity, Access (C.I.A) for the Internet.
  • 4.  Increase in Malicious Cyber-Attacks  Increase in internet open access  Proliferation in social media (instagram, facebook)  Adoption of new technologies (e.g. web bitcoins)  Awareness levels close to real time is low  Increase in Cyber-Security penetration  Need for Cyber-Security Forensics
  • 5.  Primary School Education  High School Education  College /Tertiary Education
  • 6.  Curriculum at primary level education Geared towards mobile safety and online conduct  High School Education Deeper in browser forensics and online tracking  College Level /Tertiary Education Emphasis on understanding threat models, creating mitigation strategies and building solutions.
  • 7.  Power up and Power down computers  Identifying secure and insecure web pages  Social Engineering for the Internet  Identifying basic malicious attacks (e.g. pop ups, script kiddies etc.)  Reading web page instructions and terms and conditions for using such pages.
  • 8.  Advance Computer Networking  Advance Digital Forensics and Incident Response for the Internet  Legal Policy for the Internet  Cryptography Techniques for the Web  Online Financial Security  Internet Auditing and Risk Management  Internet Governance
  • 9.  Security is an interdisciplinary field (many skills to hone)  Policy adoption on security education  Human Talent Pool of Educational Security Experts at all levels of curriculum  Technology Adoption
  • 10.  Cyber-Security transformation education initiatives at all levels of the curriculum required  Existing National ICT initiatives lack the adequate pool expertise at all requisite levels of curricula.  As Internet penetration increases - a global intiative on Cyber-Security is imperative and the Jamaican context requirement is no less.  Tertiary Level training to inform tertiary level training and lower level curricula is required.
  • 11.  Cyber-Security transformation education initiatives at all levels of the curriculum required  National ICT security policy initiatives that speak to skills based initiatives to provide short term, medium term and long term Security Talent Management Pools  Tertiary Level training to inform tertiary and lower level curricula