Your SlideShare is downloading. ×
0
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Cyber-Security in Education
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber-Security in Education

97

Published on

This presentation speaks to the need for Cyber-Security education to be performed at all levels of education in Jamaica (and the Caribbean) for the people to remain relevant in this field.

This presentation speaks to the need for Cyber-Security education to be performed at all levels of education in Jamaica (and the Caribbean) for the people to remain relevant in this field.

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
97
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 2014 Edu ision
  • 2.  What is Cyber-Security (CS) Education?  Why should we provide this Education?  Who is the target audience ?  Curriculum for Cyber-Security  Limitations of a Cyber-Security Curriculum  Conclusion  Future Work
  • 3.  Education Learning that enables  Cyber-Security Protection computers, networks, programs and data from unintended or unauthorized access, change or destruction, i.e. enforcing Confidentiality, Integrity, Access (C.I.A) for the Internet.
  • 4.  Increase in Malicious Cyber-Attacks  Increase in internet open access  Proliferation in social media (instagram, facebook)  Adoption of new technologies (e.g. web bitcoins)  Awareness levels close to real time is low  Increase in Cyber-Security penetration  Need for Cyber-Security Forensics
  • 5.  Primary School Education  High School Education  College /Tertiary Education
  • 6.  Curriculum at primary level education Geared towards mobile safety and online conduct  High School Education Deeper in browser forensics and online tracking  College Level /Tertiary Education Emphasis on understanding threat models, creating mitigation strategies and building solutions.
  • 7.  Power up and Power down computers  Identifying secure and insecure web pages  Social Engineering for the Internet  Identifying basic malicious attacks (e.g. pop ups, script kiddies etc.)  Reading web page instructions and terms and conditions for using such pages.
  • 8.  Advance Computer Networking  Advance Digital Forensics and Incident Response for the Internet  Legal Policy for the Internet  Cryptography Techniques for the Web  Online Financial Security  Internet Auditing and Risk Management  Internet Governance
  • 9.  Security is an interdisciplinary field (many skills to hone)  Policy adoption on security education  Human Talent Pool of Educational Security Experts at all levels of curriculum  Technology Adoption
  • 10.  Cyber-Security transformation education initiatives at all levels of the curriculum required  Existing National ICT initiatives lack the adequate pool expertise at all requisite levels of curricula.  As Internet penetration increases - a global intiative on Cyber-Security is imperative and the Jamaican context requirement is no less.  Tertiary Level training to inform tertiary level training and lower level curricula is required.
  • 11.  Cyber-Security transformation education initiatives at all levels of the curriculum required  National ICT security policy initiatives that speak to skills based initiatives to provide short term, medium term and long term Security Talent Management Pools  Tertiary Level training to inform tertiary and lower level curricula
  • 12. ? Thank You

×