SlideShare a Scribd company logo
SECURITY, DEVICES AND EDUCATION
ELIO SAN CRISTÓBAL
DIEECTQAI (ELECTRICAL AND COMPUTER ENGINEERING DEPARTMENT)
UNED (SPANISH UNIVERSITY FOR DISTANCE EDUCATION)
INDEX
• Introduction
• Concepts of security
• Risk analysis
• Security policies
• Conclusions
INTRODUCTION
Education 1.0
Education 2.0
Education 3.0
Education 4.0
Teacher-centred system
Education
2.0
Communication and collaboration
Student-centred system
New technologies and
rethinking the education
INTRODUCTION
• Technology (Software and hardware) is changing the education.
INTRODUCTION
• All these devices can be part of educational process. Displaying or/and
serving content or services. .
Content management systems
Learning management systems
Remote laboratories
Pocket labs
INTRODUCTION
• Other services are used by teacher and students. These services can be
integrated or not by Learning management systems or other learning
applications
E-mail
Storage services
Forums, chats…
Web servers
INTRODUCTION
•  The exposure to attacks on educational devices and applications is much higher:
Physical file storages
PCs without connection
Connection everywhere
at any time
INTRODUCTION
Security	is	never	100%.	There	is	always	residual	risk
CONCEPTS OF SECURITY
• The fundamental principles of information are three:
Confidentiality  Integrity 
Availability 
CONCEPTS OF SECURITY
• Asset
• Vulnerability
• Threat
• Risk
Asset
Vulnerability: Default passwords
Threat: Access NOT authorized
Risk = Probability access not
authorized X impact of this access
RISK ANALYSIS
1.  Asset evaluation
•  Identification of assets
•  Description of each asset
•  Type (physical, application software, data, or end user services )
•  Asset valuation, Relationship among assets, …
RISK ANALYSIS
Asset evaluation à simple example
Login page courses (ID 15)
This is the login page of YYY. Version
2.5
Software asset
Personal information of students,
credentials à Personal student
information, Evaluation data, ……..
Server Machine (ID 2) à Hardware
web server (ID 3) à software
Database (ID 4) à software
………………..
RISK ANALYSIS
2.  Identifying and assessing the relevant threats to each asset
•  Eavesdropping
•  Unauthorized access to the information system
•  Compromising confidential information
•  Software errors
•  Social engineering
RISK ANALYSIS
Identifying and assessing threat
Threat: Damage the devices
Threat: Software errors
Threat: Unauthorized access
Threat: Compromising confidential information
RISK ANALYSIS
3.  Identifying and assessing of safeguards à Protecting asset from threats
•  The safeguards have a cost higher than the impact of the thread on the asset.
•  The safeguards is easy to implement and the cost is lower than the impact the threat on
the asset .
RISK ANALYSIS
4.  Risk estimation Risk Assessment Matrix
Probability
IMPACT
High
Medium
Low
Low Medium High
Low Low
Low
Medium
Medium
Medium
High
High High
RISK ANALYSIS
• Risk Assessment Matrix
Probability
IMPACT
High
Medium
Low
Low Medium High
Low Low
Low
Medium
Medium
Medium
High
High High
Threat: Damage the devices.
If the devices is located at
an Area where people can
access easily
Threat: Unauthorized access.
If there are strong passwords
mechanism and the
information of system is
public
SECURITY POLITICS
• Set of rules that all people who have access to any information and / or
technology of an organization must fulfill.
•  being able to be implemented
•  being understood by all the members of the organization or institution
•  being fulfilled by all the members of the organization or institution
•  should allow normal work
SECURITY POLITICS
• Some examples of security polices
•  Password policies
Strong passwords
Do not use default passwords
mechanisms to request a
password change
……
SECURITY POLITICS
• Update policies
•  Determining what software should be updated
•  Registering the updates
•  Setting up an alarm system to update the applications
SECURITY POLITICS
• Email policies
•  Installing antimalware and antispam systems
•  Analyzing of attached files
•  Checking links in the mails
CONCLUSIONS
• Technology and education go hand in hand
• From isolated system to set of educational applications which work together
• All these applications and networks communication have increased the attack
surface.
CONCLUSIONS
• Schools, Universities must be aware of the risks of opening their services
abroad and stablish safeguards
• Professors, Teachers, Tutors, students must make good use of technology
(Security policies)
CONCLUSIONS
• IEEE educational society is aware of the importance of safe educational
systems and is working on the standard for Secure and Trusted Learning
Systems
Thanks for you attention

More Related Content

What's hot

Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
Dr. Lasantha Ranwala
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
Vaibhav Khanna
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
hamzakareem2
 
Information security
Information securityInformation security
Information security
Praveen Minz
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologies
ERAUWebinars
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
Dr. Lasantha Ranwala
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
sayyed azam
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Rahmat Suhatman
 

What's hot (8)

Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Information and network security 3 security challenges
Information and network security 3 security challengesInformation and network security 3 security challenges
Information and network security 3 security challenges
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 
Information security
Information securityInformation security
Information security
 
Erau webinar-applied information technologies
Erau webinar-applied information technologiesErau webinar-applied information technologies
Erau webinar-applied information technologies
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

Similar to Security, Devices and Education

Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
ssuserf98dd4
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
elmuhammadmuhammad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
Kumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
it160320737038
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
Greenway Health
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application ppt
swahl123
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
Rimurutempest594985
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
Stephen Abram
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERINGIT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
ThumilvannanSambanda
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
kevlekalakala
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
shinydey
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
UK Defence Cyber School
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
Martin Lawrence
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
RashidSahito1
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
Shreeveni
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
Investorideas.com
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Concepts
primeteacher32
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
Misha Hanin
 

Similar to Security, Devices and Education (20)

Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Et5083 module 3 application ppt
Et5083 module 3 application pptEt5083 module 3 application ppt
Et5083 module 3 application ppt
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERINGIT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
IT8073 INFORMATION SECURITY FOR FINAL YEAR COMPUTER SCIENCE ENGINEERING
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]Exeter university ig manager presentation [1]
Exeter university ig manager presentation [1]
 
ISM-CS5750-01.pptx
ISM-CS5750-01.pptxISM-CS5750-01.pptx
ISM-CS5750-01.pptx
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
 
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
American Public University System (NASDAQ:APEI) - Dr. Clay Wilson is the Prog...
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Concepts
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 

More from Universidad Nacional de Educación a Distancia

Education and Remote Laboratories
Education and Remote LaboratoriesEducation and Remote Laboratories
Education and Remote Laboratories
Universidad Nacional de Educación a Distancia
 
IoT and Practical Laboratories
IoT and Practical LaboratoriesIoT and Practical Laboratories
IoT and Practical Laboratories
Universidad Nacional de Educación a Distancia
 
MOOC OERs 3.4 industry and open education
MOOC OERs 3.4 industry and open educationMOOC OERs 3.4 industry and open education
MOOC OERs 3.4 industry and open education
Universidad Nacional de Educación a Distancia
 
MOOC OERs 5.2. open design preregistration
MOOC OERs 5.2. open design preregistrationMOOC OERs 5.2. open design preregistration
MOOC OERs 5.2. open design preregistration
Universidad Nacional de Educación a Distancia
 
MOOC OERs 4.2 Creative Commons Licences in practice
MOOC OERs  4.2 Creative Commons Licences in practiceMOOC OERs  4.2 Creative Commons Licences in practice
MOOC OERs 4.2 Creative Commons Licences in practice
Universidad Nacional de Educación a Distancia
 
MOOC OERs 3.3 research and open access
MOOC OERs 3.3 research and open access MOOC OERs 3.3 research and open access
MOOC OERs 3.3 research and open access
Universidad Nacional de Educación a Distancia
 
MOOC OERs 3.2 teaching through open education
MOOC OERs 3.2 teaching through open education MOOC OERs 3.2 teaching through open education
MOOC OERs 3.2 teaching through open education
Universidad Nacional de Educación a Distancia
 
MOOC OERs 3.1 intro to Applications to Academia and Industry
MOOC OERs 3.1 intro to Applications to Academia and IndustryMOOC OERs 3.1 intro to Applications to Academia and Industry
MOOC OERs 3.1 intro to Applications to Academia and Industry
Universidad Nacional de Educación a Distancia
 
MOOC OERs. 1.4. Open courses (from OCW to MOOCs)
MOOC OERs. 1.4. Open courses (from OCW to MOOCs)MOOC OERs. 1.4. Open courses (from OCW to MOOCs)
MOOC OERs. 1.4. Open courses (from OCW to MOOCs)
Universidad Nacional de Educación a Distancia
 
MOOC OERs. 1.0 Introduction to Open Education & OERs
MOOC OERs. 1.0 Introduction to Open Education & OERsMOOC OERs. 1.0 Introduction to Open Education & OERs
MOOC OERs. 1.0 Introduction to Open Education & OERs
Universidad Nacional de Educación a Distancia
 
MOOC OERs. 1.3.1 Open Educational Resources
MOOC OERs. 1.3.1 Open Educational Resources MOOC OERs. 1.3.1 Open Educational Resources
MOOC OERs. 1.3.1 Open Educational Resources
Universidad Nacional de Educación a Distancia
 

More from Universidad Nacional de Educación a Distancia (20)

Education and Remote Laboratories
Education and Remote LaboratoriesEducation and Remote Laboratories
Education and Remote Laboratories
 
IoT and Practical Laboratories
IoT and Practical LaboratoriesIoT and Practical Laboratories
IoT and Practical Laboratories
 
MOOC OERs 3.4 industry and open education
MOOC OERs 3.4 industry and open educationMOOC OERs 3.4 industry and open education
MOOC OERs 3.4 industry and open education
 
MOOC OERs 5.5. open publication
MOOC OERs 5.5. open publicationMOOC OERs 5.5. open publication
MOOC OERs 5.5. open publication
 
MOOC OERs 5.4. open analyses
MOOC OERs 5.4. open analysesMOOC OERs 5.4. open analyses
MOOC OERs 5.4. open analyses
 
MOOC OERs 5.3. open data
MOOC OERs 5.3. open dataMOOC OERs 5.3. open data
MOOC OERs 5.3. open data
 
MOOC OERs 5.2. open design preregistration
MOOC OERs 5.2. open design preregistrationMOOC OERs 5.2. open design preregistration
MOOC OERs 5.2. open design preregistration
 
MOOC OERs 4.5 Conclusions
MOOC OERs  4.5 ConclusionsMOOC OERs  4.5 Conclusions
MOOC OERs 4.5 Conclusions
 
MOOC OERs 4.4 Other OERs
MOOC OERs 4.4 Other OERsMOOC OERs 4.4 Other OERs
MOOC OERs 4.4 Other OERs
 
MOOC OERs 4.3 OERs and media
MOOC OERs 4.3 OERs and mediaMOOC OERs 4.3 OERs and media
MOOC OERs 4.3 OERs and media
 
MOOC OERs 4.1 OERs in practice
MOOC OERs 4.1 OERs in practiceMOOC OERs 4.1 OERs in practice
MOOC OERs 4.1 OERs in practice
 
MOOC OERs 4.0 OERs in practice
MOOC OERs 4.0 OERs in practiceMOOC OERs 4.0 OERs in practice
MOOC OERs 4.0 OERs in practice
 
MOOC OERs 4.2 Creative Commons Licences in practice
MOOC OERs  4.2 Creative Commons Licences in practiceMOOC OERs  4.2 Creative Commons Licences in practice
MOOC OERs 4.2 Creative Commons Licences in practice
 
MOOC OERs 3.3 research and open access
MOOC OERs 3.3 research and open access MOOC OERs 3.3 research and open access
MOOC OERs 3.3 research and open access
 
MOOC OERs 3.2 teaching through open education
MOOC OERs 3.2 teaching through open education MOOC OERs 3.2 teaching through open education
MOOC OERs 3.2 teaching through open education
 
MOOC OERs 3.1 intro to Applications to Academia and Industry
MOOC OERs 3.1 intro to Applications to Academia and IndustryMOOC OERs 3.1 intro to Applications to Academia and Industry
MOOC OERs 3.1 intro to Applications to Academia and Industry
 
MOOC OERs. 1.4. Open courses (from OCW to MOOCs)
MOOC OERs. 1.4. Open courses (from OCW to MOOCs)MOOC OERs. 1.4. Open courses (from OCW to MOOCs)
MOOC OERs. 1.4. Open courses (from OCW to MOOCs)
 
MOOC OERs. 1.3.2 Licences OERs
MOOC OERs. 1.3.2 Licences OERsMOOC OERs. 1.3.2 Licences OERs
MOOC OERs. 1.3.2 Licences OERs
 
MOOC OERs. 1.0 Introduction to Open Education & OERs
MOOC OERs. 1.0 Introduction to Open Education & OERsMOOC OERs. 1.0 Introduction to Open Education & OERs
MOOC OERs. 1.0 Introduction to Open Education & OERs
 
MOOC OERs. 1.3.1 Open Educational Resources
MOOC OERs. 1.3.1 Open Educational Resources MOOC OERs. 1.3.1 Open Educational Resources
MOOC OERs. 1.3.1 Open Educational Resources
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Security, Devices and Education