SlideShare a Scribd company logo
1 of 39
20/11/2014 E-safety: safer systems, safer users 
Nigel Ecclesfield, Lee Harrigan-Green, Katie McAllister
E-safety: safer systems, safer users 20/11/2014 2 
Speakers 
» Nigel Ecclesfield, Head of change implementation support 
programmes - Further Education and Skills, Jisc 
» Lee Harrigan-Green, Senior CSIRT member, Jisc 
» Katie McAllister, Student support and enrichment manager, 
Peterborough Regional College 
» Jackie Milne, Legal information specialist, Jisc
E-safety: safer systems, safer users 20/11/2014 3 
Internet safety and security 
E-safety is about safe and responsible practice 
with technology and the sensible management of 
risks presented by the digital world. 
Jisc e-Safety infoKit
E-safety: safer systems, safer users 20/11/2014 4 
Purpose of session 
» Explore e-safety issues for providers 
» Safety policies 
› Setting objectives and priorities 
» Safe systems 
› External safeguards and support 
› Internal systems 
» Safe users 
› Safe practices 
› Increase awareness of e-safety
E-safety and social media - risky mix or recipe for success? 
Jackie Milne, Legal information specialist, Jisc
E-safety: safer systems, safer users 20/11/2014 6 
Social Media 
“The most 
influential and 
powerful voice of 
the people… 
needs to be 
regulated” 
Chloe Madeley 
“Ability to give a 
voice to people 
who would never 
have been heard” 
Bill Gates 
“A catalyst for the 
advancement of 
everyone’s rights” 
Queen Rania of 
Jordan 
“Just a buzz word 
until you come up 
with a plan” 
Unknown
E-safety: safer systems, safer users 20/11/2014 7 
Storm in a T cup? 
FB comments result in sacking Think before you tweet or risk arrest 
Sexting pressure on the rise 
Social network is social nightmare 
Internet trolls may face two years in jail 
Teacher in FB meltdown 
Half of child exploitation happens on We don’t need any new social media laws 
social networks
E-safety: safer systems, safer users 20/11/2014 8 
Which legal duties do you have? 
Statutory Contractual Common law All of these
Janet Computer Security Incident Response Team (CSIRT) 
and keeping yourself safe 
Lee Harrigan-Green, Senior CSIRT member, Jisc
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 10 
Overview 
» About Janet CSIRT (Computer Security Incident Response Team) and our role 
» An overview of the incidents we see 
» Some examples of incidents 
» What can you do to help yourself 
» If you have any questions please just interrupt me
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 11 
What is CSIRT? 
» Janet CSIRT (Computer Security Incident Response Team) 
» CERT© or CERT-CC, IRT, CIRT, SERT 
» Names can vary in different organisations, but they all carry out similar tasks: 
› Coordinate with our community and other CERTs, ISPs 
› Provide advice and assistance in relation to security with confidentiality
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 12 
What do we do? 
» Incident Response 
» Proactive Monitoring 
» Advice and Expertise
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 13 
What we don’t do! 
» We don’t hack systems 
» We don’t probe systems looking for vulnerabilities to advise owners 
» We are not the internet police 
» We don’t pass information onto the Government / CIA... but we do work with them
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 14 
How we detect security incidents 
» Netflow data 
» Emails or alerts from 3rd parties 
» Website monitoring 
» Telephone calls 
» Keeping up to date with the security landscape / vulnerabilities 
» Google searches 
» Post incident analysis
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 15 
Types of issues we deal with 
» Compromise 
› Data, usernames, passwords, personal information 
› Systems 
» Copyright notices 
» Denial of service 
» Queries 
› Law enforcement agencies requests for information (RIPA) 
› Legal / policy advice 
› Networking / security advice 
» Other issues: scanning, phishing, social engineering, unauthorised use, unsolicited 
bulk email (SPAM)
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 16 
Incident type 2012 2013 2014 to date 
Compromise 1487 1329 363 
Copyright 2000 91 (1293) 2815 
Denial of Service 43 127 430 
General query 59 82 154 
LEA query 46 29 31 
Legal / Policy query 7 9 4 
Malware 3209 5148 4133 
Misconfiguration 0 0 275 
Net / Security query 115 89 162 
Other 114 196 682 
Phishing 243 427 307 
Scanning 578 380 137 
Social engineering 16 6 1 
Unauthorised use 39 42 28 
Unsolicited bulk email 238 256 144 
Total 8194 8212 (9505) 9666
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 17 
Regulation of Investigatory Powers notifications 
» Regulation of Investigatory Powers Act 
2000 
» Graded 1 (critical), 2 or 3 
» Must originate from a single point of 
contact (SPoC) 
» CSIRT can verify a SPoC exists in Home 
Office database
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 18 
Recent activities with the National Crime Agency 
(NCA) 
» Gameover Zeus (Zeus-p2p) and Cryptolocker 
» Advanced warning of the botnet takedown 
» Worked with the NCA and FBI to establish the best course of action from a UK 
perspective 
» Distributed the list of known domains associated with the malware 
» Issued advice and guidance to affected customers on the global day of action 
» Taken positive action within our resolver service so that our customers are protected 
from this malware. 
» More in the pipeline …
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 19 
Example of a hacked website 
» A small website was vulnerable to a SQLi attack 
» Details of usernames, passwords, and email addresses were dumped 
» Automated email received at 23:15 
» By 9:30 the following morning we had sent notifications to 42 different sites about the 
breach 
» We also alerted the site that was hacked. They were not aware and took the site 
offline and also notified all users in their database about the breach
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 20 
Example of a Moodle system hack 
» Content of usernames and hashed passwords were put on pastebin approximately 
3500 unique hashes. 
» Investigation started at 08:50 the following day 
» A Janet connected organisation system was compromised due to running a old 
version of administration software on a Moodle server 
» 48% of the passwords were cracked 
» Site advised of the very weak passwords 
» They rebuilt system 
» A student at the site was responsible
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 21 
Policies are there when you need them 
There are many different types of policies that you require to keep yourself safe. 
» Disaster Recovery 
» Acceptable Use 
» Incident Response 
» Backup 
» And more 
We recommend: 
» Testing your policies to make sure they work in practice 
» Review your policies regularly - trigger points might be a yearly review, change in 
legislation or a security incident
Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 22 
What can you do to keep yourself safe? 
» By following best practices you can keep yourself safe 
» Logging is the most important of these – Firewall, proxy, DHCP, email and web server 
» Use a system log (syslog) to keep them in one easy location 
» Keep systems up to date with latest patches and security updates 
» Maintain up to date security contacts with CSIRT 
» Contact us at CSIRT if you have any security related questions or queries, including 
advice on policies and practice to keep your systems and users safe
E-safety: safer systems, safer users 20/11/2014 23 
Lee Harrigan-Green, Senior CSIRT Member 
irt@csirt.ja.net 
Lumen house, Library Avenue, Harwell, Didcot 
Oxfordshire OX11 0SG 
T 0300 999 2340 
info@jisc.ac.uk jisc.ac.uk 
Except where otherwise noted, this work is licensed under CC-BY-NC-ND
Safeguarding & E-Safety 
Katie McAllister, 
Student Support and Enrichment Manager, 
Peterborough Regional College 
Equipping learners to be safe
The starting point 
• The college, in light of the growing child sexual 
exploitation issues, potential extremism and increasing e-safety 
concerns, was determined to ensure both staff and 
learners participated in a constructive dialogue relating to 
their safety.
The Challenge 
• Addressing the (potential) increase in cyberbullying, 
extremism, child sexual exploitation etc 
• Meeting our legal and statutory duties relating to ICT 
whilst reducing any risks 
• Identifying all of the across college areas we would need 
to consider such as our hosting liability and data 
protection 
• Educating employers, contractors, parents/carers
Review tools 
• A rigorous evaluation of our current practices including 
Jisc guidance & the use of the 360 degree safe self 
review tool 
 It’s free to access! 
 Provides subject areas (top line and in detail) 
 Provides action plan as you go 
 Identifies AFIs and best practices 
 Is online so a whole college approach is possible 
Compares your own responses to others who have completed it
Areas for review 
Each 
element has 
strands. 
Each strand 
has aspects.
The Safeguarding Toolkit 
• Resources and documentation to support a tailored 
recruitment and enrolment process for learners. 
• An enhanced induction for Looked After Care (LAC) 
learners. 
• Designated mentors and progress support meetings for 
LAC learners. 
• Online and magazine based hints, tips and guidance 
(staff and students).
The Safeguarding Toolkit 
• HE debates. 
• Tutorials and across college calendar of events covering 
personal safety and resilience for a range of 
levels/abilities (sexual health, alcohol, mental health, e-safety, 
being street wise). 
• Development of activities and resources to embed within 
teaching and learning sessions.
Multi Agency work 
• Multi agency partnership with housing, city youth 
workers, council, police, schools and Local Safeguarding 
Children Boards (LSCB) 
– members shared expertise and resources which resulted in a 
proactive approach to child sexual exploitation, monitoring of 
city wide tensions and action cohesion work. 
• Approach is being adopted by other police forces and 
was recorded for a Panorama documentary.
Training 
• The College Welfare Advisor and a College Youth 
Worker were specifically trained to support Looked After 
Care leavers - more vulnerable to child sexual 
exploitation and radicalisation. 
• Staff training incorporating extremism awareness and 
reporting (WRAP, Prevent).
Training 
• Prevent training to over 1000 students by the local 
Prevent officer. 
• The college completed a business continuity plan and 
staff training with the National Counter Terrorism Security 
Office (NaCTSO). 
• E-Safety handbook/toolkit. 
• Updated induction staff training.
Impact in 2013/14 
• 98% of learners felt safe whilst at college. 
• 92% retention for LAC learners (9% increase on 12/13). 
• 88% retention for unaccompanied minors (5% increase on 2012/13). 
• Safeguarding embedded into teaching and learning - 
differentiated across the levels/abilities. 
• Significant, collaborative partnerships with quicker 
identification of and action to issues.
Impact in 2013/14 
• Ongoing, robust self-assessment 
• The safeguarding toolkit has successfully contributed to 
the College receiving: 
– the BIG award (Bullying Intervention) 
– Gold ROSPA 
– the Buttle Quality Mark (Exemplary) 
– Customer Service Excellence & Matrix 
– The South West Grid for Learning Trust 360 degree safe award 
(first FE college).
Information 
• Freshers Fayre Event (1 Oct) 
• Anti-bullying & Resilience Stand (17 Nov) 
• Wellbeing Team Stand (E-safety: 1 Dec) 
• Safer Internet Day Stand (10 Feb) 
• Be Healthy, Stay Safe, Be Green Event (19 Mar)
Summary 
• The College has taken a proactive and passionate stance 
against these contemporary issues that are affecting our 
learner’s wellbeing, and our ongoing actions are 
positively removing barriers and ensuring the learners are 
able to fully engage with their studies. 
• For more information contact: 
katie.mcallister@peterborough.ac.uk
Questions? 
Q&A panel
Find out more… 
39 
Find out more 
communications@jisc.ac.uk 
www.jisc.ac.uk/internet-safety 
Except where otherwise noted, this 
work is licensed under CC-BY-NC-ND

More Related Content

What's hot

How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJDavid Sweigert
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud finalguest50a642f
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianPECB
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelPaul Di Gangi
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013Dan Michaluk
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Chris Hails
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
 

What's hot (20)

How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Best Practices For Seizing Electronic Evidence -- DoJ
 Best Practices For Seizing Electronic Evidence  -- DoJ Best Practices For Seizing Electronic Evidence  -- DoJ
Best Practices For Seizing Electronic Evidence -- DoJ
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Privacy issues in the cloud final
Privacy issues in the cloud   finalPrivacy issues in the cloud   final
Privacy issues in the cloud final
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
One hour cyber july 2013
One hour cyber july 2013One hour cyber july 2013
One hour cyber july 2013
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing Why Government & Corporate Cyber Programmes are Failing
Why Government & Corporate Cyber Programmes are Failing
 
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021Save yourself with the CSDF - ISACA Auckland - 16 June 2021
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Funsec3e ppt ch13
Funsec3e ppt ch13Funsec3e ppt ch13
Funsec3e ppt ch13
 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
 

Similar to Jisc e safety presentation AoC 2014

CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityAIS Network
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersAPNIC
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxCapitolTechU
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due DiligenceShiva Bissessar
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVAndris Soroka
 

Similar to Jisc e safety presentation AoC 2014 (20)

CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Cybercrime Bill 2014: Due Diligence
Cybercrime Bill 2014:   Due DiligenceCybercrime Bill 2014:   Due Diligence
Cybercrime Bill 2014: Due Diligence
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
 

More from Jisc

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 

More from Jisc (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Recently uploaded

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 

Jisc e safety presentation AoC 2014

  • 1. 20/11/2014 E-safety: safer systems, safer users Nigel Ecclesfield, Lee Harrigan-Green, Katie McAllister
  • 2. E-safety: safer systems, safer users 20/11/2014 2 Speakers » Nigel Ecclesfield, Head of change implementation support programmes - Further Education and Skills, Jisc » Lee Harrigan-Green, Senior CSIRT member, Jisc » Katie McAllister, Student support and enrichment manager, Peterborough Regional College » Jackie Milne, Legal information specialist, Jisc
  • 3. E-safety: safer systems, safer users 20/11/2014 3 Internet safety and security E-safety is about safe and responsible practice with technology and the sensible management of risks presented by the digital world. Jisc e-Safety infoKit
  • 4. E-safety: safer systems, safer users 20/11/2014 4 Purpose of session » Explore e-safety issues for providers » Safety policies › Setting objectives and priorities » Safe systems › External safeguards and support › Internal systems » Safe users › Safe practices › Increase awareness of e-safety
  • 5. E-safety and social media - risky mix or recipe for success? Jackie Milne, Legal information specialist, Jisc
  • 6. E-safety: safer systems, safer users 20/11/2014 6 Social Media “The most influential and powerful voice of the people… needs to be regulated” Chloe Madeley “Ability to give a voice to people who would never have been heard” Bill Gates “A catalyst for the advancement of everyone’s rights” Queen Rania of Jordan “Just a buzz word until you come up with a plan” Unknown
  • 7. E-safety: safer systems, safer users 20/11/2014 7 Storm in a T cup? FB comments result in sacking Think before you tweet or risk arrest Sexting pressure on the rise Social network is social nightmare Internet trolls may face two years in jail Teacher in FB meltdown Half of child exploitation happens on We don’t need any new social media laws social networks
  • 8. E-safety: safer systems, safer users 20/11/2014 8 Which legal duties do you have? Statutory Contractual Common law All of these
  • 9. Janet Computer Security Incident Response Team (CSIRT) and keeping yourself safe Lee Harrigan-Green, Senior CSIRT member, Jisc
  • 10. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 10 Overview » About Janet CSIRT (Computer Security Incident Response Team) and our role » An overview of the incidents we see » Some examples of incidents » What can you do to help yourself » If you have any questions please just interrupt me
  • 11. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 11 What is CSIRT? » Janet CSIRT (Computer Security Incident Response Team) » CERT© or CERT-CC, IRT, CIRT, SERT » Names can vary in different organisations, but they all carry out similar tasks: › Coordinate with our community and other CERTs, ISPs › Provide advice and assistance in relation to security with confidentiality
  • 12. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 12 What do we do? » Incident Response » Proactive Monitoring » Advice and Expertise
  • 13. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 13 What we don’t do! » We don’t hack systems » We don’t probe systems looking for vulnerabilities to advise owners » We are not the internet police » We don’t pass information onto the Government / CIA... but we do work with them
  • 14. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 14 How we detect security incidents » Netflow data » Emails or alerts from 3rd parties » Website monitoring » Telephone calls » Keeping up to date with the security landscape / vulnerabilities » Google searches » Post incident analysis
  • 15. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 15 Types of issues we deal with » Compromise › Data, usernames, passwords, personal information › Systems » Copyright notices » Denial of service » Queries › Law enforcement agencies requests for information (RIPA) › Legal / policy advice › Networking / security advice » Other issues: scanning, phishing, social engineering, unauthorised use, unsolicited bulk email (SPAM)
  • 16. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 16 Incident type 2012 2013 2014 to date Compromise 1487 1329 363 Copyright 2000 91 (1293) 2815 Denial of Service 43 127 430 General query 59 82 154 LEA query 46 29 31 Legal / Policy query 7 9 4 Malware 3209 5148 4133 Misconfiguration 0 0 275 Net / Security query 115 89 162 Other 114 196 682 Phishing 243 427 307 Scanning 578 380 137 Social engineering 16 6 1 Unauthorised use 39 42 28 Unsolicited bulk email 238 256 144 Total 8194 8212 (9505) 9666
  • 17. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 17 Regulation of Investigatory Powers notifications » Regulation of Investigatory Powers Act 2000 » Graded 1 (critical), 2 or 3 » Must originate from a single point of contact (SPoC) » CSIRT can verify a SPoC exists in Home Office database
  • 18. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 18 Recent activities with the National Crime Agency (NCA) » Gameover Zeus (Zeus-p2p) and Cryptolocker » Advanced warning of the botnet takedown » Worked with the NCA and FBI to establish the best course of action from a UK perspective » Distributed the list of known domains associated with the malware » Issued advice and guidance to affected customers on the global day of action » Taken positive action within our resolver service so that our customers are protected from this malware. » More in the pipeline …
  • 19. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 19 Example of a hacked website » A small website was vulnerable to a SQLi attack » Details of usernames, passwords, and email addresses were dumped » Automated email received at 23:15 » By 9:30 the following morning we had sent notifications to 42 different sites about the breach » We also alerted the site that was hacked. They were not aware and took the site offline and also notified all users in their database about the breach
  • 20. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 20 Example of a Moodle system hack » Content of usernames and hashed passwords were put on pastebin approximately 3500 unique hashes. » Investigation started at 08:50 the following day » A Janet connected organisation system was compromised due to running a old version of administration software on a Moodle server » 48% of the passwords were cracked » Site advised of the very weak passwords » They rebuilt system » A student at the site was responsible
  • 21. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 21 Policies are there when you need them There are many different types of policies that you require to keep yourself safe. » Disaster Recovery » Acceptable Use » Incident Response » Backup » And more We recommend: » Testing your policies to make sure they work in practice » Review your policies regularly - trigger points might be a yearly review, change in legislation or a security incident
  • 22. Our Computer Security Incident Response Team (CSIRT) and keeping yourself safe20/11/2014 22 What can you do to keep yourself safe? » By following best practices you can keep yourself safe » Logging is the most important of these – Firewall, proxy, DHCP, email and web server » Use a system log (syslog) to keep them in one easy location » Keep systems up to date with latest patches and security updates » Maintain up to date security contacts with CSIRT » Contact us at CSIRT if you have any security related questions or queries, including advice on policies and practice to keep your systems and users safe
  • 23. E-safety: safer systems, safer users 20/11/2014 23 Lee Harrigan-Green, Senior CSIRT Member irt@csirt.ja.net Lumen house, Library Avenue, Harwell, Didcot Oxfordshire OX11 0SG T 0300 999 2340 info@jisc.ac.uk jisc.ac.uk Except where otherwise noted, this work is licensed under CC-BY-NC-ND
  • 24. Safeguarding & E-Safety Katie McAllister, Student Support and Enrichment Manager, Peterborough Regional College Equipping learners to be safe
  • 25. The starting point • The college, in light of the growing child sexual exploitation issues, potential extremism and increasing e-safety concerns, was determined to ensure both staff and learners participated in a constructive dialogue relating to their safety.
  • 26. The Challenge • Addressing the (potential) increase in cyberbullying, extremism, child sexual exploitation etc • Meeting our legal and statutory duties relating to ICT whilst reducing any risks • Identifying all of the across college areas we would need to consider such as our hosting liability and data protection • Educating employers, contractors, parents/carers
  • 27. Review tools • A rigorous evaluation of our current practices including Jisc guidance & the use of the 360 degree safe self review tool  It’s free to access!  Provides subject areas (top line and in detail)  Provides action plan as you go  Identifies AFIs and best practices  Is online so a whole college approach is possible Compares your own responses to others who have completed it
  • 28. Areas for review Each element has strands. Each strand has aspects.
  • 29. The Safeguarding Toolkit • Resources and documentation to support a tailored recruitment and enrolment process for learners. • An enhanced induction for Looked After Care (LAC) learners. • Designated mentors and progress support meetings for LAC learners. • Online and magazine based hints, tips and guidance (staff and students).
  • 30. The Safeguarding Toolkit • HE debates. • Tutorials and across college calendar of events covering personal safety and resilience for a range of levels/abilities (sexual health, alcohol, mental health, e-safety, being street wise). • Development of activities and resources to embed within teaching and learning sessions.
  • 31. Multi Agency work • Multi agency partnership with housing, city youth workers, council, police, schools and Local Safeguarding Children Boards (LSCB) – members shared expertise and resources which resulted in a proactive approach to child sexual exploitation, monitoring of city wide tensions and action cohesion work. • Approach is being adopted by other police forces and was recorded for a Panorama documentary.
  • 32. Training • The College Welfare Advisor and a College Youth Worker were specifically trained to support Looked After Care leavers - more vulnerable to child sexual exploitation and radicalisation. • Staff training incorporating extremism awareness and reporting (WRAP, Prevent).
  • 33. Training • Prevent training to over 1000 students by the local Prevent officer. • The college completed a business continuity plan and staff training with the National Counter Terrorism Security Office (NaCTSO). • E-Safety handbook/toolkit. • Updated induction staff training.
  • 34. Impact in 2013/14 • 98% of learners felt safe whilst at college. • 92% retention for LAC learners (9% increase on 12/13). • 88% retention for unaccompanied minors (5% increase on 2012/13). • Safeguarding embedded into teaching and learning - differentiated across the levels/abilities. • Significant, collaborative partnerships with quicker identification of and action to issues.
  • 35. Impact in 2013/14 • Ongoing, robust self-assessment • The safeguarding toolkit has successfully contributed to the College receiving: – the BIG award (Bullying Intervention) – Gold ROSPA – the Buttle Quality Mark (Exemplary) – Customer Service Excellence & Matrix – The South West Grid for Learning Trust 360 degree safe award (first FE college).
  • 36. Information • Freshers Fayre Event (1 Oct) • Anti-bullying & Resilience Stand (17 Nov) • Wellbeing Team Stand (E-safety: 1 Dec) • Safer Internet Day Stand (10 Feb) • Be Healthy, Stay Safe, Be Green Event (19 Mar)
  • 37. Summary • The College has taken a proactive and passionate stance against these contemporary issues that are affecting our learner’s wellbeing, and our ongoing actions are positively removing barriers and ensuring the learners are able to fully engage with their studies. • For more information contact: katie.mcallister@peterborough.ac.uk
  • 39. Find out more… 39 Find out more communications@jisc.ac.uk www.jisc.ac.uk/internet-safety Except where otherwise noted, this work is licensed under CC-BY-NC-ND