Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
Challenges of E-Learing in Nigerian University Education Based on the Experie...IJMIT JOURNAL
This paper present a review of the challenges of e-learning in Nigerian University education based on the experience of four developed countries, UK, Australia, Korea and France. The survey shows that these countries have: (i) vision and action plans for e-learning, (ii) they have good government policies and financial support, (iii) they earmark action programs and set committees with sufficient funds to pursue it goals, (iv) they believe in research as a fundamental part of e-learning strategy, and lastly (v) they embark on awareness, training and motivational programs. The paper pointed out that, for the challenges of Nigerian university education to be reduced to minimum, the Federal Government should improve on educational funding as UNESCO recommended 26% of the annual budget. In addition the government should fulfill her promise on the issue of improving Electricity supply in the country. Furthermore, the university administrators should embark on awareness and training of staff on the use of ICTs, with motivations attached. The Internet is a major driver of ICT in education and bandwidth is a major issue in the deployment of e-learning. Therefore government should make Internet connectivity a priority for higher education to be able to leverage on the promises and opportunities ICTs present.
Constraint to Effective use of ICT on Islamic Education A Critical Analysis o...YogeshIJTSRD
This research focused and analyze some problems that militate the effective use of ICT on Islamic education in secondary schools. These problems include Lack of technical knowhow by the teachers, Interest of parental influence, Lack of maintenance, Lack of political will to support ICT programme, Inadequate provision of modern ICT facilities, Irregular power supply and Lack of Arabic language to use Islamic gadget. Survey research design is adopted in the study and validated self structure questionnaire is raise and use to obtain data about 111 questionnaires were randomly distributed to both public and private secondary school teachers in Jos, Plateau state. The quantitative data returned were evaluated using descriptive statistics and further analyzed using Independent sample Mann Whitney U test in SPSS version 25 . The results of the study reveal that there is an Insignificant difference between public and private secondary school to the challenges faces to effective use of ICT with Z= .508 at P .05 level of significance, where we retain the null hypothesis of the statistical test. It is recommended that ICT programme should be implemented and make it compulsory to each and every school by the government, continues training of ICT skill to teachers and buying of modern facilities should be adhere, and involvement of parent and political leaders should be encourage, equally they should motivate and sponsored the ICT resources and programme respectively to their various home and zones. Dr. Mustapha Garba Muhammad | Adam Mustapha Garba | Garba Sufiyanu Mustapha "Constraint to Effective use of ICT on Islamic Education: A Critical Analysis of Public and Private Secondary School" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38715.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/education/38715/constraint-to-effective-use-of-ict-on-islamic-education-a-critical-analysis-of-public-and-private-secondary-school/dr-mustapha-garba-muhammad
This presentation is regarded as a good introduction about using ICTs in education. It explains the advantages of implementing them during the process of teaching in the classroom. It shows also some objectives and evaluation of technology during teaching.
Challenges of E-Learing in Nigerian University Education Based on the Experie...IJMIT JOURNAL
This paper present a review of the challenges of e-learning in Nigerian University education based on the experience of four developed countries, UK, Australia, Korea and France. The survey shows that these countries have: (i) vision and action plans for e-learning, (ii) they have good government policies and financial support, (iii) they earmark action programs and set committees with sufficient funds to pursue it goals, (iv) they believe in research as a fundamental part of e-learning strategy, and lastly (v) they embark on awareness, training and motivational programs. The paper pointed out that, for the challenges of Nigerian university education to be reduced to minimum, the Federal Government should improve on educational funding as UNESCO recommended 26% of the annual budget. In addition the government should fulfill her promise on the issue of improving Electricity supply in the country. Furthermore, the university administrators should embark on awareness and training of staff on the use of ICTs, with motivations attached. The Internet is a major driver of ICT in education and bandwidth is a major issue in the deployment of e-learning. Therefore government should make Internet connectivity a priority for higher education to be able to leverage on the promises and opportunities ICTs present.
Constraint to Effective use of ICT on Islamic Education A Critical Analysis o...YogeshIJTSRD
This research focused and analyze some problems that militate the effective use of ICT on Islamic education in secondary schools. These problems include Lack of technical knowhow by the teachers, Interest of parental influence, Lack of maintenance, Lack of political will to support ICT programme, Inadequate provision of modern ICT facilities, Irregular power supply and Lack of Arabic language to use Islamic gadget. Survey research design is adopted in the study and validated self structure questionnaire is raise and use to obtain data about 111 questionnaires were randomly distributed to both public and private secondary school teachers in Jos, Plateau state. The quantitative data returned were evaluated using descriptive statistics and further analyzed using Independent sample Mann Whitney U test in SPSS version 25 . The results of the study reveal that there is an Insignificant difference between public and private secondary school to the challenges faces to effective use of ICT with Z= .508 at P .05 level of significance, where we retain the null hypothesis of the statistical test. It is recommended that ICT programme should be implemented and make it compulsory to each and every school by the government, continues training of ICT skill to teachers and buying of modern facilities should be adhere, and involvement of parent and political leaders should be encourage, equally they should motivate and sponsored the ICT resources and programme respectively to their various home and zones. Dr. Mustapha Garba Muhammad | Adam Mustapha Garba | Garba Sufiyanu Mustapha "Constraint to Effective use of ICT on Islamic Education: A Critical Analysis of Public and Private Secondary School" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38715.pdf Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/education/38715/constraint-to-effective-use-of-ict-on-islamic-education-a-critical-analysis-of-public-and-private-secondary-school/dr-mustapha-garba-muhammad
This presentation is regarded as a good introduction about using ICTs in education. It explains the advantages of implementing them during the process of teaching in the classroom. It shows also some objectives and evaluation of technology during teaching.
This paper describes briefly the Purpose & Aims of ICT in Education, in which not only the concept of ICT has been discussed but also its influence on education has explained.
Information and communication technologies (ICT) are simply technologies arising fromscientific and technological progress in computer sciences, electronics andtelecommunications. They enable us to process, store, retrieve and disseminate valuableinformation in text, sound and video form. In an increasing interconnected world, brought about by the application of technological advances to all sectors of society, quality education necessitates active and innovative exploration to maximize the benefits of ICT and developand maintain the partnerships that use of ICT in education requires. This calls for re-conceptualising and restructuring the educational enterprise, so as to confront thetechnological challenges of this millennium. With rapid changes within society and radical transformations in the way people acquire knowledge, new teaching paradigms arerequired, ones that tune educational systems to modern times and ensure quality trainingfor large numbers of persons.
Unit – I: INFORMATION AND COMMUNICATION TECHNOLOGY
ICT: Concept, Objectives, Need and Importance of ICT - Characteristics and Scope of Information and Communication Technology.
This presentation provides an overview of how the Point2Protect service can help UK schools keep children safe while using a wide range of tablets and smartphones, both in school and at home.
Unlocking digital literacy practices of EFL teachersEkoPurwanti1
Digital literacy practice is necessary for education since information and communication technology has developed rapidly, resulting in shifting to the era of digital technology. The digital literacy practices in school and especially in classrooms are required for preparing 21st-century students. This study aims to (1) determine teachers’ perceptions of digital literacy practices in the level of classroom and school, (2) point out the digital literacy practices of English Foreign Language (EFL) teachers, and (3) investigate the challenges faced by the EFL teachers in applying digital literacy practices in the classroom. This study revealed the digital literacy practices of thirteen EFL Teachers in Yogyakarta using questionnaires and semi-structured interviews. The results uncovered that digital literacy was highly supported, evidenced by the facility, equipment, and the connectivity provided in all schools with a variety of free internet access. In the classroom level, these teachers practised digital literacy by using some digital tools. In implementing digital literacy, the teachers faced some challenges, such as defective equipment and Internet access and intrinsic factors such as teachers’ knowledge in technology, their attitudes toward digital technology, and students’ commitment to apply digital literacy. These findings are followed by recommendations for schools, teachers, and further research.
Inclusive education: helping teachers to choose ICT resources and to use them...eLearning Papers
Authors: Vincenza Benigno, Stefania Bocconi, Michela Ott.
This paper looks at the issue of school inclusion by referring to the concept of Universal Access to Education. It focuses on the strong potential Information and Communication Technologies (ICT) provide to avoid any kind of discrimination among students. The paper also argues that teachers play a fundamental role in capitalising the opportunities offered by new technologies to support the full inclusion of all students in mainstream education systems.
Role of ict in education a case of indira college 2IAEME Publication
Latent fingerprints lifted from crime scenes often contain overlapping prints, which are
difficult to separate and match by state-of-the-art fingerprint matchers. The methods that have been
proposed to separate overlapping fingerprints and successful matching previously suffer from limited
accuracy of the estimated orientation field. In this paper, the robustness of overlapping fingerprints
separation is increased, particularly for low quality images. This algorithm reconstructs the
orientation fields of component prints by modeling fingerprint orientation fields. To facilitate this,
orientation cues of component fingerprints are utilized, which are manually marked by fingerprint
examiners. The effectiveness of this model has been evaluated.
This paper describes briefly the Purpose & Aims of ICT in Education, in which not only the concept of ICT has been discussed but also its influence on education has explained.
Information and communication technologies (ICT) are simply technologies arising fromscientific and technological progress in computer sciences, electronics andtelecommunications. They enable us to process, store, retrieve and disseminate valuableinformation in text, sound and video form. In an increasing interconnected world, brought about by the application of technological advances to all sectors of society, quality education necessitates active and innovative exploration to maximize the benefits of ICT and developand maintain the partnerships that use of ICT in education requires. This calls for re-conceptualising and restructuring the educational enterprise, so as to confront thetechnological challenges of this millennium. With rapid changes within society and radical transformations in the way people acquire knowledge, new teaching paradigms arerequired, ones that tune educational systems to modern times and ensure quality trainingfor large numbers of persons.
Unit – I: INFORMATION AND COMMUNICATION TECHNOLOGY
ICT: Concept, Objectives, Need and Importance of ICT - Characteristics and Scope of Information and Communication Technology.
This presentation provides an overview of how the Point2Protect service can help UK schools keep children safe while using a wide range of tablets and smartphones, both in school and at home.
Unlocking digital literacy practices of EFL teachersEkoPurwanti1
Digital literacy practice is necessary for education since information and communication technology has developed rapidly, resulting in shifting to the era of digital technology. The digital literacy practices in school and especially in classrooms are required for preparing 21st-century students. This study aims to (1) determine teachers’ perceptions of digital literacy practices in the level of classroom and school, (2) point out the digital literacy practices of English Foreign Language (EFL) teachers, and (3) investigate the challenges faced by the EFL teachers in applying digital literacy practices in the classroom. This study revealed the digital literacy practices of thirteen EFL Teachers in Yogyakarta using questionnaires and semi-structured interviews. The results uncovered that digital literacy was highly supported, evidenced by the facility, equipment, and the connectivity provided in all schools with a variety of free internet access. In the classroom level, these teachers practised digital literacy by using some digital tools. In implementing digital literacy, the teachers faced some challenges, such as defective equipment and Internet access and intrinsic factors such as teachers’ knowledge in technology, their attitudes toward digital technology, and students’ commitment to apply digital literacy. These findings are followed by recommendations for schools, teachers, and further research.
Inclusive education: helping teachers to choose ICT resources and to use them...eLearning Papers
Authors: Vincenza Benigno, Stefania Bocconi, Michela Ott.
This paper looks at the issue of school inclusion by referring to the concept of Universal Access to Education. It focuses on the strong potential Information and Communication Technologies (ICT) provide to avoid any kind of discrimination among students. The paper also argues that teachers play a fundamental role in capitalising the opportunities offered by new technologies to support the full inclusion of all students in mainstream education systems.
Role of ict in education a case of indira college 2IAEME Publication
Latent fingerprints lifted from crime scenes often contain overlapping prints, which are
difficult to separate and match by state-of-the-art fingerprint matchers. The methods that have been
proposed to separate overlapping fingerprints and successful matching previously suffer from limited
accuracy of the estimated orientation field. In this paper, the robustness of overlapping fingerprints
separation is increased, particularly for low quality images. This algorithm reconstructs the
orientation fields of component prints by modeling fingerprint orientation fields. To facilitate this,
orientation cues of component fingerprints are utilized, which are manually marked by fingerprint
examiners. The effectiveness of this model has been evaluated.
V virada-empreendedora marco 2015 - institucionalANA FONTES
Um dos maiores eventos de empreendedorismo na quinta edição e acontecerá dias dias 25 e 26 de abril na FGV em SP. São 24 horas intensas com palestras inspiradoras, workshops, competições e muito networking para quem quer empreender ou já é empreendedor. Citado como um dos eventos imperdíveis pela Revista PEGN. Inscrições: www.viradaempreendedora.com.br
A location based movie recommender systemijfcstjournal
Available recommender systems mostly provide recommendations based on the users’ preferences by
utilizing traditional methods such as collaborative filtering which only relies on the similarities between users and items. However, collaborative filtering might lead to provide poor recommendation because it does not rely on other useful available data such as users’ locations and hence the accuracy of the recommendations could be very low and inefficient. This could be very obvious in the systems that locations would affect users’ preferences highly such as movie recommender systems. In this paper a new locationbased movie recommender system based on the collaborative filtering is introduced for enhancing the
accuracy and the quality of recommendations. In this approach, users’ locations have been utilized and
take in consideration in the entire processing of the recommendations and peer selections. The potential of
the proposed approach in providing novel and better quality recommendations have been discussed through experiments in real datasets.
DESK Coworking - Escritório Virtual | Escritório Compartilhado | Salas de Reu...DESK Coworking
O DESK Coworking, é um Escritório Compartilhado que oferece serviços de Coworking, Escritório Virtual, Locação de Salas de Reuniões, Salas de Treinamento e Salas Privativas aos profissionais liberais, empreendedores, micro e pequenos empresários.
Com excelente localização, ambiente climatizado e estruturado para suportar a operação de diversas empresas.
Conheça mais em www.deskcoworking.com.br
A internet é a principal fonte de informação dos brasileiros quando vão adquirir produtos, atingindo 83,8% das elites (classes A/B), e 74,3% das classes emergentes (C/D/E). O 'boca a boca' faz parte da natureza do brasileiro, muito influenciado pela opinião de familiares e amigos quando pretende adquirir algum produto caro ou contratar serviço importante. ( Site Terra)
BTO Educational - Consiglio Direttivo - 19 novembre 2010BTO Educational
Verbale della riunione del Consiglio Direttivo
BTO Educational
Il giorno diciannove del mese di Novembre dell'anno duemila dieci, alle ore 21, presso Trattoria Garga – via del Moro 56r, Firenze - regolarmente convocato, si e' riunito il Consiglio Direttivo per discutere il seguente ordine del giorno:
1. Ampliamento Consiglio Tecnico Scientifico
2. Social Media Week, a Roma 7 – 11 Febbraio 2011
3. Iscrizione all’Associazione ifitt
4. Enter, a Innsbruck dal 26 al 28 Gennaio 2011
5. ToscanaLab #generazioni2.0@arezzo
6. Bilancio economico della commessa Florence Promhotels relativo al contributo scientifico/organizzativo di BTO Educational all’evento BTO – Buy Tourism Online 2010
7. Seminario a porte chiuse BTO Educational
8. Varie e eventuali
Sono presenti:
Robert Piattelli – Presidente
Giancarlo Carniani – Vice Presidente
Roberta Milano – Consigliere
Rodolfo Baggio – Presidente del Consiglio Tecnico Scientifico
Diese Präsentation handelt von dem Barmer Billard Club. Sie soll Ihnen den Club etwas näher bringen. Und vielleicht spielen Sie selbst bald mit.
Also viel Spass mit der Präsentation !!!
Der Barmer Billard Club
REGIONE UMBRIA
10 Novembre 2010
Bando per il finanziamento di interventi volti alla promo-commercializzazione turistica di prodotti tematici e prodotti d’area mediante la realizzazione di progetti integrati collettivi
Social business - Looking beyond Social Media and Enterprise 2.0 to real ROIDion Hinchcliffe
I examine the latest trends in Social Business with a focus on how ROI is going to be achieved in the longer term once high-scale information expansion takes place inside companies that adopt Enterprirse 2.0.
The Global problem of water scarcity (Глобалният проблем с недостига на вода)Simona Nikolova
The presentation describes the main global issues that affect water crisis worldwide.
Презентацията описва основните глобални проблеми, които засягат водната криза в световен мащаб.
This research paper is a statistical comparative study of a few average case asymptotically optimal sorting algorithms namely, Quick sort, Heap sort and K- sort. The three sorting algorithms all with the same average case complexity have been compared by obtaining the corresponding statistical bounds while subjecting these procedures over the randomly generated data from some standard discrete and continuous
probability distributions such as Binomial distribution, Uniform discrete and continuous distribution and Poisson distribution. The statistical analysis is well supplemented by the parameterized complexity analysis.
Video Trends presentation by VideoSticky.com founder Rodney Rumford presented at blogging conference SOBCON May 2007. Video Aggregation is at the forefront.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
WPGC empowers K-12 organizations with robust cybersecurity solutions. Explore effective strategies to safeguard against evolving threats in the educational landscape
Current Issues In Education Technology WPG Consulting .pdfmeetsolanki44
Explore the forefront of education technology with WPG Consulting. Navigate current issues, trends, and solutions shaping the educational landscape for a tech-forward future.
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
An educated workforce is essential to government and industry, hence the need to provide a high-quality workforce has been crucial in higher education academic program development. In the cybersecurity field, the situation is not quite satisfactory, the reason comes down to the fact that this new industry is lacking a portable and measurable framework to evaluate the efficacy of the academic programs, thus, to provide the industry with the unified high-quality workforce. In this paper, we aim to come up with a design of an analytical framework for portable and measurable academic programs for future workforce development. The ultimate purpose for our research is to develop cybersecurity workforce through the increase of the number of cybersecurity professionals with a 4-year degree, in this project we will develop a seamless pathway for students transferring from 2-year programs such as Ivy Tech Community College of Indiana(Ivy Tech) Cybersecurity AAS program to a 4- year program such as Purdue University Northwest(PNW) CIT program.
Information security threats encountered by Malaysian public sector data cen...nooriasukmaningtyas
Data centers are primarily the main targets of cybercriminals and security threats as they host various critical information and communication technology (ICT) services. Identifying the threats and managing the risks associated with data centers have become a major challenge as this will enable organizations to optimize their resources to focus on the most hazardous threats to prevent the potential risks and damages. The objective of this paper is to identify major ICT security threats to data centers in the Malaysian public sector and their causes. The data for this study was collected through interview sessions. A total of 33 respondents from various government organizations were interviewed. The results revealed that the technical threats, spyware, phishing, bluesnarfing threats, social engineering and virus, trojan, malware, ransomware, viral websites threats are the major categories of threats often encountered by the malaysian public sector organizations. The causes for these threats are lack of budget, competent personnel, and manpower for security tasks, user awareness; lack of compliances and monitoring; insufficient security policies and procedures as well as deliberate cyber attacks. The outcome of this study will give a greater degree of awareness and understanding to the ICT security officers, who are entrusted with data center security.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Digital education is the process of using digital technology in teaching and learning. Teachers are under pressure to use digital technologies in teaching students and prepare them for work in a globalized digital economy. Digital education prepares students for becoming digital citizens by making them acquire skills for navigating and existing in the digital world. This paper provides a brief introduction to digital education.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
Cybersecurity education for the next generationIBM Security
In a world of increasing information security threats, academic initiatives focused on cybersecurity are proliferating – yet, there is still the danger of falling short in addressing the long-term threat.
To avoid becoming too focused on near-term issues, academic programs must be more collaborative across their own institutions, with industry, government and among the global academic community.
Only by working in concert can we meet today’s demand while educating the next generation to create a more secure future.
Learn more about IBM Security: http://ibm.com/security
Recapitulating the development initiatives of a robust information security s...IOSR Journals
Abstract: Most current information security systems performance vary with the nature of the filed its being
operating. With an increased emphasizes on the adoption of security tools and technologies, the anomalies and
intrusion are mostly said defined to be detected on system's algorithm, when most systems have well defined
mechanism for rapid reaction and identification of intrusions. However, despite this support for anomaly
detection, this is usually limited and often require a full recompilation of the system to deploy a comprehensive
framework of security governance, strategies and practices employing the policies in implementation.
As a result, the absence of a robust security framework securing both the education and corporate
resources has heightened the tension for a strategic information security solutions which might ends with cost,
complexities and cumbersome to develop. This paper thereby presents an alternative comprehensive system
namely RITS-B which accommodates both the nature of education and organizations without a need to for a
further modification. Implication of the proposed approach at real time depicts its suitability in the arena of
concern.
Keywords: Information Security, Governance, Strategies, Practices, Regional Cultures and Believes.
E- LEARNING IN NIGERIA : CURRENT IMPLEMENTATIONS AND CHALLENGEScscpconf
E-learning is a concept which came to limelight about two decades ago in Nigeria. It has gone
through several metamorphoses since then ranging from open skepticism to acceptance. It was
accepted by most people because the percentage of Conventional Universities in Nigeria to the
number of candidates seeking admission into these Universities were getting small every year
and such Conventional Universities cannot cope with the pressure from the candidates. This is
the main reason why many people embraced E- learning as option and a welcome supplement to
normal university learning. This study is designed to evaluate the current implementation of Elearning
in Nigeria and the current challenges militating against the full implementation of Elearning
as an option in Nigeria.
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
This investigation delves into incorporating a hybridized memetic strategy within the framework of English
composition pedagogy, leveraging Internet Plus resources. The study aims to provide an in-depth analysis
of how this method influences students’ writing competence, their perceptions of writing, and their
enthusiasm for English acquisition. Employing an explanatory research design that combines qualitative
and quantitative methods, the study collects data through surveys, interviews, and observations of students’
writing performance before and after the intervention. Findings demonstrate a beneficial impact of
integrating the memetic approach alongside Internet Plus tools on the writing aptitude of English as a
Foreign Language (EFL) learners. Students reported increased engagement with writing, attributing it to
the use of Internet plus tools. They also expressed that the memetic approach facilitated a deeper
understanding of cultural and social contexts in writing. Furthermore, the findings highlight a significant
improvement in students’ writing skills following the intervention. This study provides significant insights
into the practical implementation of the memetic approach within English writing education, highlighting
the beneficial contribution of Internet Plus tools in enriching students' learning journeys.
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
Messages routing over a network is one of the most fundamental concept in communication which requires
simultaneous transmission of messages from a source to a destination. In terms of Real-Time Routing, it
refers to the addition of a timing constraint in which messages should be received within a specified time
delay. This study involves Scheduling, Algorithm Design and Graph Theory which are essential parts of
the Computer Science (CS) discipline. Our goal is to investigate an innovative and efficient way to present
these concepts in the context of CS Education. In this paper, we will explore the fundamental modelling of
routing real-time messages on networks. We study whether it is possible to have an optimal on-line
algorithm for the Arbitrary Directed Graph network topology. In addition, we will examine the message
routing’s algorithmic complexity by breaking down the complex mathematical proofs into concrete, visual
examples. Next, we explore the Unidirectional Ring topology in finding the transmission’s
“makespan”.Lastly, we propose the same network modelling through the technique of Kinesthetic Learning
Activity (KLA). We will analyse the data collected and present the results in a case study to evaluate the
effectiveness of the KLA approach compared to the traditional teaching method.
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
Software architecture is the structural solution that achieves the overall technical and operational
requirements for software developments. Software engineers applied software architectures for their
software system developments; however, they worry the basic benchmarks in order to select software
architecture styles, possible components, integration methods (connectors) and the exact application of
each style.
The objective of this research work was a comparative analysis of software architecture styles by its
weakness and benefits in order to select by the programmer during their design time. Finally, in this study,
the researcher has been identified architectural styles, weakness, and Strength and application areas with
its component, connector and Interface for the selected architectural styles.
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
A design of a sales system for professional services requires a comprehensive understanding of the
dynamics of sale cycles and how key knowledge for completing sales is managed. This research describes
a design model of a business development (sales) system for professional service firms based on the Saudi
Arabian commercial market, which takes into account the new advances in technology while preserving
unique or cultural practices that are an important part of the Saudi Arabian commercial market. The
design model has combined a number of key technologies, such as cloud computing and mobility, as an
integral part of the proposed system. An adaptive development process has also been used in implementing
the proposed design model.
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
Frank t-norms are parametric family of continuous Archimedean t-norms whose members are also strict
functions. Very often, this family of t-norms is also called the family of fundamental t-norms because of the
role it plays in several applications. In this paper, optimization of a linear objective function with fuzzy
relational inequality constraints is investigated. The feasible region is formed as the intersection of two
inequality fuzzy systems defined by frank family of t-norms is considered as fuzzy composition. First, the
resolution of the feasible solutions set is studied where the two fuzzy inequality systems are defined with
max-Frank composition. Second, some related basic and theoretical properties are derived. Then, a
necessary and sufficient condition and three other necessary conditions are presented to conceptualize the
feasibility of the problem. Subsequently, it is shown that a lower bound is always attainable for the optimal
objective value. Also, it is proved that the optimal solution of the problem is always resulted from the
unique maximum solution and a minimal solution of the feasible region. Finally, an algorithm is presented
to solve the problem and an example is described to illustrate the algorithm. Additionally, a method is
proposed to generate random feasible max-Frank fuzzy relational inequalities. By this method, we can
easily generate a feasible test problem and employ our algorithm to it.
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
Underwater detector network is one amongst the foremost difficult and fascinating analysis arenas that
open the door of pleasing plenty of researchers during this field of study. In several under water based
sensor applications, nodes are square measured and through this the energy is affected. Thus, the mobility
of each sensor nodes are measured through the water atmosphere from the water flow for sensor based
protocol formations. Researchers have developed many routing protocols. However, those lost their charm
with the time. This can be the demand of the age to supply associate degree upon energy-efficient and
ascendable strong routing protocol for under water actuator networks. During this work, the authors tend
to propose a customary routing protocol named level primarily based routing protocol (LBRP), reaching to
offer strong, ascendable and energy economical routing. LBRP conjointly guarantees the most effective use
of total energy consumption and ensures packet transmission which redirects as an additional reliability in
compare to different routing protocols. In this work, the authors have used the level of forwarding node,
residual energy and distance from the forwarding node to the causing node as a proof in multicasting
technique comparisons. Throughout this work, the authors have got a recognition result concerning about
86.35% on the average in node multicasting performances. Simulation has been experienced each in a
wheezy and quiet atmosphere which represents the endorsement of higher performance for the planned
protocol.
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
This research paper examined and re-evaluates the technological innovation, theory, structural dynamics
and evolution of Pill Camera(Capsule Endoscopy) technology in redirecting the response manner of small
bowel (intestine) examination in human. The Pill Camera (Endoscopy Capsule) is made up of sealed
biocompatible material to withstand acid, enzymes and other antibody chemicals in the stomach is a
technology that helps the medical practitioners especially the general physicians and the
gastroenterologists to examine and re-examine the intestine for possible bleeding or infection. Before the
advent of the Pill camera (Endoscopy Capsule) the colonoscopy was the local method used but research
showed that some parts (bowel) of the intestine can’t be reach by mere traditional method hence the need
for Pill Camera. Countless number of deaths from stomach disease such as polyps, inflammatory bowel
(Crohn”s diseases), Cancers, Ulcer, anaemia and tumours of small intestines which ordinary would have
been detected by sophisticated technology like Pill Camera has become norm in the developing nations.
Nevertheless, not only will this paper examine and re-evaluate the Pill Camera Innovation, theory,
Structural dynamics and evolution it unravelled and aimed to create awareness for both medical
practitioners and the public.
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
Path finding algorithm addresses problem of finding shortest path from source to destination avoiding
obstacles. There exist various search algorithms namely A*, Dijkstra's and ant colony optimization. Unlike
most path finding algorithms which require destination co-ordinates to compute path, the proposed
algorithm comprises of a new method which finds path using backtracking without requiring destination
co-ordinates. Moreover, in existing path finding algorithm, the number of iterations required to find path is
large. Hence, to overcome this, an algorithm is proposed which reduces number of iterations required to
traverse the path. The proposed algorithm is hybrid of backtracking and a new technique(modified 8-
neighbor approach). The proposed algorithm can become essential part in location based, network, gaming
applications. grid traversal, navigation, gaming applications, mobile robot and Artificial Intelligence.
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
The Major Occupation in India is the Agriculture; the people involved in the Agriculture belong to the poor
class and category. The people of the farming community are unaware of the new techniques and Agromachines, which would direct the world to greater heights in the field of agriculture. Though the farmers
work hard, they are cheated by agents in today’s market. This serves as a opportunity to solve
all the problems that farmers face in the current world. The eAgro crop marketing will serve as a better
way for the farmers to sell their products within the country with some mediocre knowledge about using
the website. This would provide information to the farmers about current market rate of agro-products,
their sale history and profits earned in a sale. This site will also help the farmers to know about the market
information and to view agricultural schemes of the Government provided to farmers.
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
It is well known that the tenacity is a proper measure for studying vulnerability and reliability in graphs.
Here, a modified edge-tenacity of a graph is introduced based on the classical definition of tenacity.
Properties and bounds for this measure are introduced; meanwhile edge-tenacity is calculated for cycle
graphs and also for complete graphs.
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
This Paper provides a brief description of the Genetic Algorithm (GA), the Simulated Annealing (SA)
Algorithm, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm and attempts to
explain the way as how the Proposed Genetic Algorithm (GA), the Proposed Simulated Annealing (SA)
Algorithm using GA, the Backtracking (BT) Algorithm and the Brute Force (BF) Search Algorithm can be
employed in finding the best solution of N Queens Problem and also, makes a comparison between these
four algorithms. It is entirely a review based work. The four algorithms were written as well as
implemented. From the Results, it was found that, the Proposed Genetic Algorithm (GA) performed better
than the Proposed Simulated Annealing (SA) Algorithm using GA, the Backtracking (BT) Algorithm and
the Brute Force (BF) Search Algorithm and it also provided better fitness value (solution) than the
Proposed Simulated Annealing Algorithm (SA) using GA, the Backtracking (BT) Algorithm and the Brute
Force (BF) Search Algorithm, for different N values. Also, it was noticed that, the Proposed GA took more
time to provide result than the Proposed SA using GA.
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
In recent years, the complex event processing technology has been used to process the VANET’s temporal
and spatial event streams. However, we usually cannot get the accurate data because the device sensing
accuracy limitations of the system. We only can get the uncertain data from the complex and limited
environment of the VANET. Because the VANET’s event streams are consist of the uncertain data, so they
are also uncertain. How effective to express and process these uncertain event streams has become the core
issue for the VANET system. To solve this problem, we propose a novel complex event query language
PSTeCEQL (probabilistic spatio-temporal constraint event query language). Firstly, we give the definition
of the possible world model of VANET’s uncertain event streams. Secondly, we propose an event query
language PSTeCEQL and give the syntax and the operational semantics of the language. Finally, we
illustrate the validity of the PSTeCEQL by an example.
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
Now a day enormous amount of data is getting explored through Internet of Things (IoT) as technologies
are advancing and people uses these technologies in day to day activities, this data is termed as Big Data
having its characteristics and challenges. Frequent Itemset Mining algorithms are aimed to disclose
frequent itemsets from transactional database but as the dataset size increases, it cannot be handled by
traditional frequent itemset mining. MapReduce programming model solves the problem of large datasets
but it has large communication cost which reduces execution efficiency. This proposed new pre-processed
k-means technique applied on BigFIM algorithm. ClustBigFIM uses hybrid approach, clustering using kmeans algorithm to generate Clusters from huge datasets and Apriori and Eclat to mine frequent itemsets
from generated clusters using MapReduce programming model. Results shown that execution efficiency of
ClustBigFIM algorithm is increased by applying k-means clustering algorithm before BigFIM algorithm as
one of the pre-processing technique.
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
Software testing is a testing which conducted a test to provide information to client about the quality of the
product under test. Software testing can also provide an objective, independent view of the software to
allow the business to appreciate and understand the risks of software implementation. In this paper we
focused on two main software testing –mutation testing and mutation testing. Mutation testing is a
procedural testing method, i.e. we use the structure of the code to guide the test program, A mutation is a
little change in a program. Such changes are applied to model low level defects that obtain in the process
of coding systems. Ideally mutations should model low-level defect creation. Mutation testing is a process
of testing in which code is modified then mutated code is tested against test suites. The mutations used in
source code are planned to include in common programming errors. A good unit test typically detects the
program mutations and fails automatically. Mutation testing is used on many different platforms, including
Java, C++, C# and Ruby. Regression testing is a type of software testing that seeks to uncover
new software bugs, or regressions, in existing functional and non-functional areas of a system after
changes such as enhancements, patches or configuration changes, have been made to them. When defects
are found during testing, the defect got fixed and that part of the software started working as needed. But
there may be a case that the defects that fixed have introduced or uncovered a different defect in the
software. The way to detect these unexpected bugs and to fix them used regression testing. The main focus
of regression testing is to verify that changes in the software or program have not made any adverse side
effects and that the software still meets its need. Regression tests are done when there are any changes
made on software, because of modified functions.
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
Advances in micro fabrication and communication techniques have led to unimaginable proliferation of
WSN applications. Research is focussed on reduction of setup operational energy costs. Bulk of operational
energy costs are linked to communication activities of WSN. Any progress towards energy efficiency has a
potential of huge savings globally. Therefore, every energy efficient step is an endeavour to cut costs and
‘Go Green’. In this paper, we have proposed a framework to reduce communication workload through: Innetwork compression and multiple query synthesis at the base-station and modification of query syntax
through introduction of Static Variables. These approaches are general approaches which can be used in
any WSN irrespective of application.
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
Accurate and realistic estimation is always considered to be a great challenge in software industry.
Software Cost Estimation (SCE) is the standard application used to manage software projects. Determining
the amount of estimation in the initial stages of the project depends on planning other activities of the
project. In fact, the estimation is confronted with a number of uncertainties and barriers’, yet assessing the
previous projects is essential to solve this problem. Several models have been developed for the analysis of
software projects. But the classical reference method is the COCOMO model, there are other methods
which are also applied such as Function Point (FP), Line of Code(LOC); meanwhile, the expert`s opinions
matter in this regard. In recent years, the growth and the combination of meta-heuristic algorithms with
high accuracy have brought about a great achievement in software engineering. Meta-heuristic algorithms
which can analyze data from multiple dimensions and identify the optimum solution between them are
analytical tools for the analysis of data. In this paper, we have used the Harmony Search (HS)algorithm for
SCE. The proposed model which is a collection of 60 standard projects from Dataset NASA60 has been
assessed.The experimental results show that HS algorithm is a good way for determining the weight
similarity measures factors of software effort, and reducing the error of MRE.
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
Mining biological data is an emergent area at the intersection between bioinformatics and data mining
(DM). The intelligent agent based model is a popular approach in constructing Distributed Data Mining
(DDM) systems to address scalable mining over large scale distributed data. The nature of associations
between different amino acids in proteins has also been a subject of great anxiety. There is a strong need to
develop new models and exploit and analyze the available distributed biological data sources. In this study,
we have designed and implemented a multi-agent system (MAS) called Agent enriched Quantitative
Association Rules Mining for Amino Acids in distributed Protein Data Banks (AeQARM-AAPDB). Such
globally strong association rules enhance understanding of protein composition and are desirable for
synthesis of artificial proteins. A real protein data bank is used to validate the system.
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer Science & Technology. Over the last decade, there has been an explosion in the field of computer science to solve various problems from mathematics to engineering. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of interest include, but are not limited to the following:
Because the technology is used largely in the last decades; cybercrimes have become a significant
international issue as a result of the huge damage that it causes to the business and even to the ordinary
users of technology. The main aims of this paper is to shed light on digital crimes and gives overview about
what a person who is related to computer science has to know about this new type of crimes. The paper has
three sections: Introduction to Digital Crime which gives fundamental information about digital crimes,
Digital Crime Investigation which presents different investigation models and the third section is about
Cybercrime Law.
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
In this paper, we analyze the evolution of a small-world network and its subsequent transformation to a
random network using the idea of link rewiring under the well-known Watts-Strogatz model for complex
networks. Every link u-v in the regular network is considered for rewiring with a certain probability and if
chosen for rewiring, the link u-v is removed from the network and the node u is connected to a randomly
chosen node w (other than nodes u and v). Our objective in this paper is to analyze the distribution of the
maximal clique size per node by varying the probability of link rewiring and the degree per node (number
of links incident on a node) in the initial regular network. For a given probability of rewiring and initial
number of links per node, we observe the distribution of the maximal clique per node to follow a Poisson
distribution. We also observe the maximal clique size per node in the small-world network to be very close
to that of the average value and close to that of the maximal clique size in a regular network. There is no
appreciable decrease in the maximal clique size per node when the network transforms from a regular
network to a small-world network. On the other hand, when the network transforms from a small-world
network to a random network, the average maximal clique size value decreases significantly
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS
1. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
DOI:10.5121/ijfcst.2015.5606 55
CAPTURE THE TALENT: SECONDARY SCHOOL
EDUCATION WITH CYBER SECURITY
COMPETITIONS
Hanif Mohaddes Deylami1, 2
, Mahsa Mohaghegh1
, Abdolhossein Sarrafzadeh1
Michael McCauley1
, Iman Tabatabaei Ardekani1
, Tamsin Kingston1
1
Department of Computing and Information Technology, Unitec Institute of Technology,
Private Bag 92025, Victoria Street West, Auckland 1142, New Zealand.
2
School of Computer Science, Faculty of Information Science and Technology,
Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Malaysia.
ABSTRACT
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
KEYWORDS
Cyber security education, Cyber space, Live security competition, Capture the flag.
1. INTRODUCTION
In recent years, cyber security has become a critical issue affecting many aspects of our lives. As
a result, many research centers, institutes, and universities have increased focus on security topics
within relevant courses. Most of these courses use standard educational tools such as notebooks,
PowerPoint slides, and academic articles to convey security concepts. Student performance is
usually evaluated by assignments, multiple choice tests, and exams. These are mostly paper-
based, with an emphasis on theoretical concepts. While some courses teach using a practical
approach, there are significant difficulties associated with this teaching method, and as such this
approach is not commonly used. To overcome these difficulties, cyber security competitions
could be used to support educational institutions by evaluating students’ prior knowledge of this
topic. One of the earliest efforts in this area took place in Feb 2004 [1] in San Antonio, Texas,
involving secondary school students, their teachers, IT professionals, and companies, and
government. The result of this was a real time cyber security competition not very different to a
competition that took place between students of US military academies. They provided a report,
which attempted to represent the concepts of a cyber security competition, elaborating the
2. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
56
framework and resources, and the related issues of hosting a cyber security competition. Overall
they presented the potential structure for such competitions, and became one of the first roadmaps
for secondary school-specific cyber security competitions.
The growth of computer security was rapid, and governments had little time to up skill to prepare
the basic structure for educating the next generation. Significant problems were faced even in
simply adding cyber security as a subject at secondary school level, given the lack of resources,
and the fact that teachers had limited time to learn relevant security principles [2]. Educational
institutes are faced with the need to fully develop cyber security as part of their educational
curriculum, and within this to decide between a theoretical approach, a practical approach, or a
balance between the two. Significant effort is required from both teachers and institutes in terms
of addressing a comprehensive set of practical security techniques without getting lost in the
details of each technology required. There must be a careful selection of the topics, and
particularly the way the topics are presented at secondary school level [3]. Focused training in
computer science as a subject for secondary school students began in 2011 in New Zealand [4],
after it was considered important that students be more than just users of computational
technology. As a result, several tertiary institutions in New Zealand have realized the need for
developing cyber security programs, and also cyber security competitions to close the skill gap
between educational environment and the industry. One of these is Unitec Institute of Technology
in Auckland, who have developed a number of programs at all levels of tertiary education [4] and
have made significant steps by being the first to organize a cyber security Capture the Flag (CTF)
competition exclusively for secondary school students, to challenge them with real-world
problems in cyber security, including hacking, pattern identification, and creative thinking. CTF
competitions (also called live security competitions) are practical competitions comprising attack
and defense components in a virtual environment, where multiple participants attempt to attack
the platform in various ways in order to collect points. A great deal of work goes into organizing
competitions like this.
The structure of this paper is as follows: Section 2 provides a brief background and history of the
development of Cyber Security Education in New Zealand, and discusses several examples of
school competitions in New Zealand, the Uk and the United States. Section 3 expands on Unitec’s
Cyber Security Competition being the first CTF security competition in New Zealand targeting
only secondary school students. This section also discusses different topics in cyber security such
as ethical web hacking, network forensics, and cryptography. Section 4 shows practical results
from data obtained during the live security competition held in Unitec Institute of Technology in
September 2015. Section 5 presents some conclusions, and outlines potential future work
regarding cyber security education in New Zealand secondary schools, based on Unitec’sCTF
competition results and data.
2. BACKGROUND AND HISTORY
Recently we have witnessed numerous technological innovations and developments, a number of
which have involved information technology (IT) infrastructure. Society is becoming increasingly
dependent on technology and its accompanying cyberspace, and as such there is significant need
for education in order to protect technology users. Unfortunately, although cyberspace provides
many benefits and advantages to its users, it has also exposed them to multiple dangers. It is
important that this raises awareness and equips participants with protection against such dangers
in an environment that the use of technology is increasing at a fast pace.
Traditionally, the younger generation has looked to their parents and teachers to educate them
about how to deal with risks and dangers. However in the case of technology-related danger,
parents and teachers are often less digitally-literate than the younger generation. As a result they
3. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
57
Figure 1. List of New Zealand Information security groups and events
Source: The information collected from different events and meetings related to the cyber security
in New Zealand. More information you can find in Acknowledgements and also Tabel 4.
are seldom equipped to teach them cyber safety and cyber security. This makes it necessary for
the government educational system to create and formalize information technology and cyber
security education.
2.1. Cyber Security Educationin New Zealand (NZ)
Cyber security is a complex matter, and any approach to solving the issues related to cyber
security involves physical, procedural and logical forms of protection against threats [5]. Cyber
security education is vital in preparing people to implement cyber security practices.
Traditionally, formal cyber security education programs have primarily targeted organisational
audiences. However recent government regulations and cyber awareness programs such as the
Department of Prime Minister and Cabinet’s connect smart program in NZ [6], the similar
programs in the UK [7], and the USA [8] have targeted businesses and the general public,
including younger generations.
In 2011 [6], New Zealand’s cyber security strategy recognized several key objectives, one of
which was to work with educators and institutes to meet the demand for graduates skilled in cyber
security (a response to which could be to arrange cyber security competitions). The current
strategy [6] will be reviewed in the end of 2015 to ensure that the government’s resources and
approach to cyber security are up to date. Figure 1 represents the most current government and
non-government based cyber security groups, events and meetings in NZ.
In February 2011 [9], computer science was added as a formal teaching standard, and as such
began to be taught at all secondary schools in NZ.New Zealand secondary schools are generally
divided into two categories: primary school level (years 1-8), and secondary school level (years 9-
4. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
58
General
Random non-technical challenges, Simple
Unix Challenges, Regular Expressions
Basic C and Python Code, Steganography
Ethical Web Hacking
HTTP Request Methods, HTTP Response
Firebug Add-on, Basic HTM Parameter
Tampering, Basic JavaScript, SQL
Injection, Burp Suite Proxy, Cross-Site
Scripting, WebGoat Challenges
Network Forensics
PCAP Files, Wireshark, Web Server Log
Analysis, Malware Analysis, Mastery of
Basic Unix Commands:CAT, CUT,
SORT, GREP, AWK, HEAD, TAIL
Cryptography
Decimal-Binary-Hex-ASCII, Base-64
Encoding/ Decoding, Encryption
Concepts, Transposition Cipher, Caesar
Cipher - Advanced/Mixed Ciphers
Figure 2.Infographic of concepts covered in Unitec’s 2015 Cyber Security Competition
13). The National Certificate of Educational Achievement (NCEA) is the main qualification for
secondary school students between years 11 to 13. It is a flexible certificate and can be achieved
through different pathways depending on a combination of standards that students pass
[9].Unfortunately, although cyber security is an interesting and relevant topic, it is seldom
addressed in current NZ secondary school environments. There are a number of issues which
contribute to its absence. Adequate facilities must be prepared, as well as up to date hardware
technology [10]. Teachers must be up skilled in this area, and courses must be designed and
balanced among the numerous other computer science subjects. As a result, cyber security is only
gradually being introduced to younger audiences in NZ secondary schools. The choice of
teaching approach and material is critical in these early stages of development, and is primarily
governed by two aspects: the age and level of the target students, and the projected growth of
cyber technology.
Many educational and private centers are developing programs aimed at highlighting the need to
develop cyber security subjects in New Zealand schools with the main focus being on years 11-13
although this is has not happened yet. One of the main centers working to promote cyber security
at this level is Unitec Institute of Technology in Auckland. Since 2013, Unitec has run several
professional development workshops for secondary school teachers, giving them the opportunity
to improve their knowledge and skills in particular areas of IT, including cyber security and cyber
space safety. Since 2011, Unitec has also filled skills gaps in various areas by developing a
number of programs at all levels of higher education, and have also collaborated with various
cyber security centers in Japan (NAIST and NICT) in an effort to form sustainable structures that
enable the recognition of young people who possess exceptional talent and interest [4].
Unitec’scyber security program, developed within the Centre for Computational Intelligence for
Cyber Security at Unitec, includes the Undergraduate degree pathway in Cyber Security,
Graduate Diploma pathway in Cyber Security, Master of Computing - Cyber Security
Endorsement, Doctor of Computing (professional doctorate), and the dual doctorate–offered by
Nara Institute of Science and Technology (Japan) and Unitec [4]. In 2015 they also offered New
Zealand’s first cyber security CTF competition exclusively for secondary school students at years
11-13, in order to raise awareness of cyber security issues within youth in NZ. Material and
concepts that were addressed in this competition included general creative thinking problems,
ethical web hacking, network forensics, encoding and cryptography (see Figure 2).
5. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
59
2.2. Existing Cyber Security Competitions for Secondary School Students
In recent years, cyber security competitions have become an increasingly significant topic in the
field of computing, since they cater well to the practical nature of cyber security problems. The
following table (see Table 1) lists three cyber security competitions held in New Zealand, the US
and UK for secondary school students.
Table1. Cyber Security Competitions for Secondary School Student
#
Competition
Name
Organiser Age Group Date Frequency
1
Cyber Security
Competition - CTF
Unitec Institute
of Technology,
New Zealand
Secondary
School Students
(Year 11-13)
12th-13th
Sep. 2015 Annual
2
Cyber Security
Awareness Week
(CSAW)- CTF
New York
University, USA
Secondary
School Students
12th-14th
Nov. 2015
Annual
3
Cyber Security
Challenge Schools
Programme
Cyber Security
Challenge UK
Primary and
Secondary
School Students
13th-15th
Nov. 2015
Annual
2.2.1. Cyber Security Competition - Unitec Institute of Technology, New Zealand(1)
After establishing the first cyber security research centre in New Zealand in 2012, Unitec Institute
of Technology has since gone on to develop courses in cyber security at Bachelors, Masters, and
Doctoral degree level, as well as forging strong research partnerships with top research institutes
overseas. Unitec has been successful in encouraging high school students to realize the significant
demand in cyber security and the growing need for skilled cyber security graduates. Unitec’s
‘Capture the Flag’ Competition is an opportunity for high school students to participate in a
competition that involves solving real-world problems in cyber security by hacking, identifying
patterns, and employing creative and critical thinking processes. It is the first competition of this
sort as it goes beyond programming (which most other competitions focus on) and was the first
competition focussed solely on secondary school students.
2.2.2. Cyber Security Awareness Week (CSAW) - New York University, USA(2)
The NYU School of Engineering has been a pioneer in developing cyber security programs,
launching its Master degree in cyber security in 1999, and offering numerous cyber security
courses and extracurricular opportunities for undergraduates.
Cyber Security Awareness Week (CSAW) is supported by the NYU School of Engineering’s
Information Systems and Internet Security Laboratory, The lab is a student run environment
with advice provided by hackers-in-residence and industry partners. The school’s Enterprise
Learning Unit, New York Information Security Meetup, and Peerlyst also provide support.
2.2.3. Cyber Security Challenge Schools Programme–UK Cyber Security Challenge(3)
Launched in 2010, the Cyber Security Challenge UK runs a national programme of competitions
designed to attract and inspire that untapped talent into the cyber security profession. Backed by
over 50 organisations from government, industry and academia, the challenge sets competitions
(1) Further information at: http://cybersecuritycompetition.unitec.ac.nz/
(2) Further information at: https://csaw.engineering.nyu.edu/
(3) Further information at: http://cybersecuritychallenge.org.uk/education/schools/
6. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
60
that test existing cyber security skills, runs cyber camps to help people develop new skills, and
provides information through networking events and its website to offer guidance on career
opportunities.
3. UNITEC’S CYBER SECURITY COMPETITION 2015 – CAPTURE THE FLAG
The significant and rapid growth in the utilization of the internet creates possibilities for cyber
criminals to hack and hijack information and data for financial profit and other illicit activity on
the black market. Cybercrime - malware and network intrusion, financial crime, and abuse – is
currently one of the fastest growing areas of crime, and one of the leading issues in cyberspace.
In September of 2015, Unitec’s Department of Computing organized and ran the first cyber
security competition in New Zealand that was targeted exclusively at secondary school students.
The primary goal of this competition is to promote interest in, and educate secondary students
about practical computer security. The competition was structured around defending and
attacking a web application server, with the target system consisting of a Linux, Apache, MySQL,
and PHP software stack.
3.1. Workshop in April 2015
In order to help prepare potential participants, and to aid in promoting the competition, the
Department of Computing opened a public call and invited all secondary school students to an
informal meeting in April2015. An overview of the competition was presented, with the format of
the CTF challenge, eligibility rules for participants, and the prizes for each winner.
These activities were of particular value to students who were planning to participate in the
competition, and also those who were considering computer security as a career path for the
future. Three specific topics were focused on in the workshop: ethical web hacking, network
forensics, and encoding and cryptography. Various activities including ethical web hacking were
provide. With network forensics, students were introduced to Wire Shark, basic log analysis
commands in Unix, web server log analysis, and PCAP files. The encoding and cryptography part
of the workshop explored basic concepts in encoding, encryption binary encoding examples, and
encryption cipher examples.
3.2. Topics Coveredin Unitec’s Cyber Security Competition
The four subsections below elaborate on the cyber security related topics which were covered in
Unitec’s Cyber Security Competition. Note that the enumeration below is not exhaustive. It
should rather be seen as a set of recommendations for cyber security competitions, and suggests a
general direction for the future of secondary school CTF competitions in New Zealand.
3.2.1. General Topics in Cyber Security
The use of competitions to practical cyber security concepts is recognised as an effective
educational means. However the design, implementation, and execution of a complex, large-scale
education system requires a substantial amount of effort. In cyber security courses, students
examine the fundamental vulnerabilities of various operating systems and software in personal
computers, and how to fix them. In addition to becoming familiar with firewalls and related
concepts they also learn and gain practical experience with worms and viruses, and how to detect
and remove them.
7. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
61
Unitec Institute of Technology has created a course which provides a basic overview of cyber
security management in a corporate setting. Students examine introductory topics such as
assurance principles, risk management issues, and organizational plans, along with the various
types of security tools available.
To facilitate the growth of the cyber security profession, Unitec Institute of Technology is
dedicated to introducing the cyber security material to secondary school students in NZ,
especially those who are interested in cyber security and computer subjects. From there,
secondary school students who are already interested in the field will have the opportunity to
further develop their cyber-skills, and learn about how they can practically apply these abilities in
the field. Through Unitec’s cyber security competition and the related workshop, students at
different interest and knowledge levels have direct experience to uniquely learn about cyber
security from a variety of perspectives. With this early understanding of the field, Unitecis
offering cyber security material as a part of computer science courses for secondary school
students in New Zealand.
3.2.2. Ethical Web Hacking
Ethical web hacking is the process of evaluating the security of a computer system by simulating
an attack by a malicious hacker. There are significant job opportunities for ethical hackers as
companies become increasingly aware of security risks.
Ethical web hacking has the potential to be a useful computer science subject for secondary
school students, as it enables them to use their existing knowledge of programming, databases,
networks and web development, and to teaches them to think like a hacker. Such experience
would provide them with a deep understanding of security issues, and could lead to excellent
employment opportunities in the future. With this subject being taught in such a way, students
would benefit from an active teaching group with a growing reputation, based on industry links
and knowledge transfer projects, delivered in a project based, entrepreneurial culture, and thus
provide them with a deep understanding of security issues and concerns.
Unitec is the only institute in New Zealand that offers different levels of cyber security in its
programs, and the graduate students from this institute are passionate about their subject area and
developing their knowledge. They aim to present a useful structure for New Zealand secondary
school students in order to develop the mindset of a hacker, and are determined to make a
contribution to improving security in the world of computing. This is the primary reason for their
initiative in running their CTF competition for secondary school students, and focusing on
important material such as HTTP request methods, HTTP response, Firefox Firebug add-on, basic
HTML, SQL injection, basic JavaScript, Burp Suite proxy, parameter tampering, WebGoat
challenges, and Cross-site scripting in an ethical web hacking environment.
3.2.3. Network Forensics
Network forensics is a topic that falls under digital forensics. It deals with the capture, recording,
and analysis of network events in order to discover the source of security attacks, legal evidence,
or other problem incidents [11]. Analysis of network traffic may include tasks reassembling of
files, searching for keywords, and parsing such things as emails or chat sessions [12, 13].
We suggest inclusion of topics such as network intrusion detection/prevention systems, wireless
traffic analysis, web server log analysis, malware analysis, network tunnelling, and a mastery of
basic Unix commands such as CAT, CUT, SORT, GREP, AWK, HEAD, and TAIL, for filtering
out information from log files, specifically web server logs in the curriculum. They strongly
8. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
62
suggest adding this topic as a formal option within computer science courses for secondary school
students in New Zealand, since they believe that a mastery of network forensics will teach
secondary school students how to follow attackers’ footprints and analyse evidence from a
network environment.
3.2.4. Cryptography
Transmitting messages is an important practical problem. Cryptography ensures that messages are
unreadable to anyone other than the intended recipient. Cryptography is basically writing in secret
code. In data and telecommunications, cryptography has specific security requirements, such as
authentication, privacy or confidentiality, message integrity, and non-repudiation of information.
There are two basic types of ciphers used: the symmetric key cipher, which uses the same key for
the same message, and the asymmetric key cipher, which uses different keys for encoding and
decoding the same message. Cryptography is another topic suggested by Unitec for inclusion
within computer science courses in New Zealand secondary schools. They have formed useful
framework to teach this topic in, and cover the basics of information theory so that students can
have an overview of message encoding before addressing various classical ciphers. They also
plan to create the following sub-topics in order to properly introduce secondary school students to
cryptography:
Unit 1: Introduction into Cryptography
Unit 2: Classical Cryptography
Unit 3: Block Ciphers
Unit 4: Hash Functions
Unit 5: The RSA Cryptosystem and Factoring Integers
Unit 6: Elliptic Curve Cryptography
Unit 7: Digital Signature and Entity Authentication
This course explains the inner workings of cryptographic primitives, and how to correctly use
them. Students will learn how to reason about the security of cryptographic constructions and
how to apply this knowledge to real-world applications. The course begins with a detailed
discussion of how two parties who have a shared secret key can communicate securely when a
powerful adversary eavesdrops and tampers with traffic. We will examine many deployed
protocols and analyze mistakes in existing systems. It’s also discusses public-key techniques that
let two or more parties generate a shared secret key. Throughout the course students will be
exposed to many exciting open problems in the field.
4. DATA ANALYSIS
During the competition, students were presented with a survey letter, which is containing four
main questions related to the lessons presented in the cyber security workshop and live
competition. These questions were asked before and after the competition activity to determine
whether there had been a change in the secondary school student’s knowledge and response. The
results showed a definite positive trend which confirmed that the learners had gained knowledge
relevant to fundamentals of cyber security. The results showed a definite positive trend which
confirmed that the participants had gained knowledge relevant to cyber security concepts (see
Table 2).
9. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
63
0
5
10
15
20
25
30
35
40
45
50
Question 1 Question 2 Question 3 Question 4
Before Competition
After Competition
Table 2. Aggregated learner survey results
The survey questions were intended to determine whether the students believed the cyber security
competition to be an effective teaching tool, and whether they believed they were more
knowledgeable of the topics covered in the competition after it was complete(see Figure 3).
Figure 3. The result of survey questions
The survey also asked three questions regarding the overall level of computer science taught in
participants’ schools, and their evaluation of the depth of their teachers’ knowledge of computer
science as a subject (see Table 3).Further research with a larger sample size should be undertaken
to further improve the accuracy of the results.
Table 3. Overall view of survey results
# Question
Owerall view (%)
Very
Low
Low Fair High
Very
High
1
How satisfied are you overall with the level of
computer science taught in your school?
0 20 46.66 20 13.34
2
At your school, how confident are you in your
teacher’s knowledge of computer science?
0 0 33.33 40 26.67
3
How important do you think it is to have cyber
security taught in secondary schools?
0 0 33.34 33.33 33.33
# Question
Knowledge before running the
competition (%)
Knowledge after running the
competition (%)
Low Fair High
Very
High
Low Fair High
Very
High
1
General information
about Cyber security
40 20 33.33 6.67 0 33.33 60 6.67
2 Ethical Web Hacking 46.66 26.66 13.33 13.33 0 40 40 20
3 Network Forensics 60 33.33 6.66 0 13.33 60 26.66 0
4 Cryptography 33.33 40 20 6.67 6.66 20 60 13.34
10. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
64
Survey results suggested that the learners had undergone small behavior changes that indicated an
increased awareness of the issues. Finally, the students all concluded that they believed
competitions to be an effective education tool for addressing the subject of cyber security.
5. CONCLUSION AND FUTURE WORK
Computer science education is necessary for our educational system, especially considering the
increase in digital activity by today’s youth. New Zealand is among those countries which have
taken steps in introducing computer science courses to the secondary school educational system
[14, 15]. The current design of computer science courses requires certain changes regarding the
structure of material considering two main issues. Firstly, computer science as a subject was
introduced over a very short time span from planning to implementation in New Zealand’s
educational system. The New Zealand government’s educational department was quick to
implement the subject and begin having it delivered in secondary schools. Unfortunately this did
not give sufficient time to prepare hardware equipment or ensure that teachers were adequately
equipped and prepared to address the new standards. The second issue necessitating change is the
fact that IT technology has been growing fast in the past decade, and continues to change at an
ever-increasing rate. Courses must be constantly assessed and updated to reflect emerging
technology and digital advance within cyber space.
This case study has shown how current computer science courses would be enhanced by adding
cyber security as a subject, and also how live competitions in cyber security are able to support
secondary school students to better understand the concepts of this topic. The Unitec CTF
competition was a great learning experience both for the students involved and for the organizers.
We believe that this exercise helped the secondary school students understand the intricacies of
practical computer security, highlighted their strengths and weaknesses in computer security
skills and generally increased their interest and desire to learn more about this area. It is therefore
the conclusion of these authors that cyber security as a subject, including the four main areas
discussed (fundamentals of cyber security, ethical web hacking, network forensics, and
cryptography),is a viable option for the education of the future generation, specifically secondary
school students.
We intend to recommend cyber security subjects to the New Zealand Ministry of Education, and
also continue this competition by encouraging creation of reading groups focused on practical
computer security, and by running similar CTF competitions in upcoming years, incorporating the
feedback from this year’s participants.
ACKNOWLEDGEMENTS
This research is outcome of a research collaboration opportunity funded by Unitec’s Department
of Computing, and also Research and Enterprise Office of Unitec Institute of Technology. The
authors would like to thank all supportive Unitec Cyber Security Capture The Flag (CTF) 2015
Competition team members, especially Dr.HinneHettema, and MostafaBiglari-Abhari. Moreover,
the first author would like to thank Dean Carter (Technical Director-Information Security, Beca,
New Zealand) for his great information about Cyber Security organizer, and related events in
New Zealand.
11. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
65
REFERENCES
[1]. Lance J. Hoffman, Daniel Ragsdale (2004). Exploring a National Cyber Security Exercise for
Colleges and Universities.The George Washington University Cyber Security and Policy Research
Institute (Report No. CSPRI-2004-08) and United States Military Academy Information Technology
and Operations Center (Report No. ITOC-TR-04001), August 24.
[2]. Bishop, M. (1997). The state of INFOSEC education in academic: Present and Future Direction. In
proceedings of National Colloquium on Information System Security Education, page 19-33. Keynote
address, Linthicum, MD.
[3]. Bishop, M. (1999). What Do We Mean By “Computer Security Education”?.In Proceedings of the
22nd National Information Systems Security Conference, Arlington, VA.
[4]. Leon Fourie, AbdolhosseinSarrafzadeh, Shaoning Pang, Tamsin Kingston, HinneHettema, Paul
Watters (2014).The Global Cyber Security Workforce - An Ongoing Human Capital Crisis. Global
Business and Technology Association Managing In AnIinterconnectedWorld: Pioneering Business
and Technology Excellence, ISBN: 1-932917-10-1.
[5]. Atkinson, S., Furnell, S., Phippen, A. (2009). Securing the next generation: enhancing esafety
awareness among young people. Computer Fraud & Security.
[6]. NZ Government.New Zealand‘s Cyber Security Strategy (2011). Retrieved from:
http://www.dpmc.govt.nz/sites/all/files/publications/nz-cyber-security-strategy-june-2011_0.pdf
[7]. The UK Cyber Security Strategy-Protecting and promoting the UK in a digital world (2011).
[8]. White House: The National Strategy to Secure Cyberspace (2003).
[9]. Tim Bell, Peter Andreae, Anthony Robins (2012).Computer Science in NZ High Schools: The First
Year ofthe New Standards. SIGCSE'12,Raleigh, North Carolina, USA, February 29 - March 3.
[10]. Fitzpatrick, A. (2012).Cyber security experts needed to meet growing demand, The Washington Post.
Retrieved from: http://www.washingtonpost.com/business/economy/cybersecurity-experts-needed-to-
meetgrowing-demand/2012/05/29/gJQAtev1yU_story.htm
[11]. Gary Palmer (2001). A Road Map for Digital Forensic Research, Report from DFRWS 2001, First
Digital Forensic Research Workshop, Utica, New York, Page(s) 27–30, August 7-8.
[12]. Erik Hjelmvik, Passive Network Security Analysis with NetworkMiner. Retrieved from:
http://www.forensicfocus.com/passive-network-security-analysis-networkminer
[13]. SimsonGarfinkel, Network Forensics: Tapping the Internet (2002).
http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html
[14]. Bell, T., Duncan, C., Jarman, S. and Newton, H. (2014).Presenting Computer Science Concepts to
High School Students.Olympiads in Informatics Journal 8: 3-19.
[15]. Bell, T., Andreae, P. and Robins, A (2004).A case study of the Introduction of Computer Science in
NZ schools. ACM Transactions on Computing Education (TOCE) 14(2): 10:1-10:31.
Table 4. The list of acronyms and abbreviations for Figure 1
# Acronym Definition of acronym # Acronym Definition of acronym
1 NZ InfoSec
New Zealand Information
Security
14 NZISF
New Zealand Information
Security Forum
2
Govermence
NZ
Govermence New Zealand 15 NZCS
New Zealand Computer
Society
3 NZNOG
New Zealand Network
Operators Group
16 NZ Govt New Zealand Government
4 TechEd Technology Education 17 Datacom Data Communications
5 Syscan
Symposium on Security for
Asia Network
18
Insomnia
Sec
Insomnia Security
6 AusCERT
Australian Computer
Emergency Response Team
19
NZ Gov
DIA
New Zealand Government
Department of Internal
Affairs
7 OWASP
Open Web Application
Security Project
20 NZ GCSB
New Zealand Government
Communications Security
Bureau
12. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.5, No.6, November 2015
66
8 CISSP
Certified Information
Systems Security
Professional
21
NZ Gov
NCSC
New Zealand Government
National Cyber Security
Centre
9 ISIG
Information Security Interest
Group
22
NZ Gov
Police
New Zealand Government
Police
10 NZITF New Zeland Investment Trust 23
NZ Gov
DPMC
New Zealand Government
Department of the Prime
Minister and Cabinet
11 NZIIP
New Zealand Institute of
Intelligence Professionals
24
ISA
Conclave
Internet Security and
Acceleration Conclave
12 RiskNZ Risk New Zealand 25 ISACA
Information Systems Audit
and Control Association
13 Internet NZ Internet New Zealand 26 KiwiCon KiwiConference