A Cyber- Security Portal for Southern Africa Dr. Johan van Niekerk & Prof. Rossouw von Solms.

Slides:



Advertisements
Similar presentations
A centre of expertise in digital information managementwww.ukoln.ac.uk Approaches To E-Learning: Developing An E-Learning Strategy Brian Kelly UKOLN University.
Advertisements

AFRICAN VIRTUAL CLINIC PRESENTATION PRESENTED BY: ADELEYE TIMOTHY Extending the frontiers of health.
SMILE – home of: A collaborative approach in awareness raising François Thill Brussels, 12th June 2012.
Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.
EDEN 2007 Naples, Italy LIFELONG LEARNING TEACHERS’ NEEDS IN VIRTUAL LEARNING ENVIRONMENTS Josep Maria Boneu 1, Maria Galofré 2, Julià Minguillón 2 1 Centre.
Toolbox Mirror -Overview Effective Distributed Learning.
0ictQATAR October 13, 2008 Qatar’s ICT Statistical Information Areas Tariq Gulrez.
2009 Library Technology Plans Analysis and Summary by eiNetwork May 2009.
International Institute for Educational Planning ICDE SCOP 2007: Heerlen, Netherlands: Open Educational Resources and Education For All An International.
For education and learning Learning Environments/ ICT in Education
1 Ben Woelk RIT Information Security Office Advancing Digital Self Defense Establishing a Culture of Security Awareness at the Rochester Institute of Technology.
OPEN AND DISTANCE LEARNING IN TVET COLLEGES WORKSHOP TO EXPLORE THE POSSIBILITIES OF OPEN AND DISTANCE LEARNING IN TVET COLLEGES 10 MARCH 2015.
Information and Communication Technologies in the field of general education in Armenia NATIONAL CENTER OF EDUCATIONAL TECHNOLOGIES.
Sarah Breton CSC December 13, Societal Topics Weeks 7 & 8  Internet Regulation : Internet regulation is restricting specific aspects of.
4th Southern Institute for Health Informatics (SIHI) Conference, University of Portsmouth, March 26th 2002 Forum-Telemedicine as key factor for a succesful.
Work Package 3 SEE cluster policy learning platform.
Web 2.0 for Government Knowledge Management Everyone benefits by sharing knowledge March 24, 2010 Emerging Technologies Work Group Rich Zaziski, CEO FYI.
Microsoft Confidential Building Reusable InfoPath forms for US Government Jonny Chambers WW Lead – SSN Program Microsoft Corp.
Social Media Tools Project Group #2: Shanaveia Banks, Katie Callahan, James Hamilton, Hannah Hocutt, Danielle Ivy, Tracey Kendrick.
Digital Literacy Workgroup of the Minnesota Learning Commons Mary Ann Van Cura, Workgroup Chair State Library Services, Minnesota Department of Education.
National Secondary School Computer Fund (NSSCF)
Dr. Gankam Tambo Erick United Nations University - Institute for Environment and Human Security (UNU-EHS) e/merge 2012 Open to Change Framework for virtual.
Generational gaps in internet use in Portugal at home and at school: implications for media literacy Cristina Ponte & Daniel Cardoso FCSH/Universidade.
Safer Internet Forum 2007, TANJA ŠTERK, project coordinator SAFE-SI: SLOVENIAN AWARENESS NODE IDENTIFYING THE ACTORS AND ACTIONS.
Dr E Kritzinger – UNISA SACSAW Cyber Awareness Implementation Plan (CAIP) for schools.
SUSTAINABILITY OFFICERS PROJECT MANAGEMENT TOOLKIT- ORGANIZATIONAL TIPS FOR LONG-TERM SANITY Mieko A. Ozeki The University of Vermont.
Improving Participation in Adult Education Web 2.0 tools for strengthening competencies of adult education providers.
E. business knowledge transfer for SMEs – experience from Lithuania Prof. Rimantas Gatautis, KTU
Kim Andreasson Managing Director DAKA advisory AB Bahrain International eGovernment Forum Kingdom of Bahrain 8-10 April 2013 Measuring E-Government.
Success factors that govern the compilation of indicators An efficient model for change PART 3.
ICT PSP Infoday Brussels Call 2011 – Theme 2 Digital Content ICT-PSP Call Theme 2: Digital Content Federico Milani, Marc Röder Infso E6/eContent.
Maria Lucia Uribe Torres Director Arigatou International Geneva K okoro A virtual global community to develop intercultural and interfaith learning and.
CHILD FOCUS Belgian Safer Internet Centre How to raise awareness among children, young people and their educators? Example of practice Nadège BASTIENEN.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
- Data Management System - Sioux Lookout District Principals Gathering October 21, 2009.
TOPIC Explain what the digital divide is and how it impacts the impoverished? Presentation by Zama and Nosipho – Online Journalism 2015.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
1 Efficient, Transparent and Strategic Management Presented by: Prof. Venansius Baryamureeba Acting Vice Chancellor, Makerere University, Kampala, UGANDA.
European Virtual Laboratory of Mathematics Daniela Velichová Department of Mathematics Mechanical Engineering Faculty Slovak University of Technology.
KMS Products By Justin Saunders. Overview This presentation will discuss the following: –A list of KMS products selected for review –The typical components.
School of Computing. The Information Security Awareness Research Group.
Cyber habits of school children Rossouw von Solms Institute for ICT Advancement.
Social Media Exploring Social Media to Enhance Interactive Communication and e-Learning for Students in Higher Education Billy Rector, Chief Information.
Web Applications for the Teaching Profession: BCN Bulevard Education Intranet and the School Activities Programme Tampere, may 2005.
A Cyber Security Curriculum for Southern African Schools By Mariska de Lange and Prof Rossouw von Solms.
Hosted by SACCCS work on public engagement Gallagher Convention Centre, Midrand, South Africa 28 October 2011 Sharon Mashau – Assistant Manager: Public.
Personalising learning Robin Ball, Manager – Learning Services, Becta Richard Allen, Consultant, Learning Services, Becta BETT 08 Friday, 11 January 2008.
1990 was my first encounter with First Class. A dial-up BBS system that I couldn’t afford but knew was the way of the future. I wanted to connect teachers,
UNC Deans Council The North Carolina K-12 Digital Learning Transition Glenn Kleiman Friday Institute for Educational Innovation NC State University College.
2009 An Overview of programmes. Overview Current country programmes – Ghana, Rwanda Transitioned country programmes – Namibia Potential new country programmes.
ACODE Australasian Council on Open, Distance and E-Learning 1 E Literacy – teaching and learning issues.
INSPIRE Training and Capacity Building Giorgio Saio (GISIG) Eionet NRC Environmental Information Systems (EIS) Meeting, Copenhagen (DK), November.
Technology-enhanced Learning: EU research and its role in current and future ICT based learning environments Pat Manson Head of Unit Technology Enhanced.
Implementation of Insurance Core Principles and FSAP Evaluations The Portuguese FSAP experience Gabriel Bernardino Instituto de Seguros de Portugal.
INSME – International Network for SMEs Tailored Services 1 st Meeting of the INSME Promoting Committee Milan, 7 th – 8 th July 2003.
University Centre for Career Development and Counselling of Students of University of Niš.
1 Open Discovery Space Overview Argiris Tzikopoulos, Ellinogermaniki Agogi Open Discovery Space [CIP-ICT-PSP ][elearning] A socially-powered and.
Name - Date Technology-enhanced Learning: tomorrow’s school and beyond Pat Manson Head of Unit Technology Enhanced Learning Directorate General.
BUS 352 Week 1 Quiz Check this A+ tutorial guideline at For more classes visit
What is: Information & Communications Technology
Swiss TPH Education & Training
THE HIDDEN CHALLENGE OF AFRICA'S DEVELOPMENT:
Educational Resources Center
THP² Europe is specialized in the development and implementation of all available digitized test and measuring equipment, as well as high-end, digitized.
CYBERTHON Use-cases.
ICT Market Follow up in Morocco Market Observatory/ANRT MOROCCO
How Frog can add value to Google Suite
5th PASET Forum Kigali, Rwanda| May 22, 2019
Presentation transcript:

A Cyber- Security Portal for Southern Africa Dr. Johan van Niekerk & Prof. Rossouw von Solms

Agenda  Background  Why a Portal?  Overview Information security governance toolbox E-learning portal Awareness Game E-learning for children Resource Portal  Future work

Background  The Internet Brought many advantages Used both at home and in organizations Not only used by the rich or educated  Internet Usage in South Africa 8.6% of entire population (World Bank, 2010) 83% of low-income urban black youths (Kreutzer, 2009) All sectors of the population -Young/old, poor/rich, educated/uneducated, rural/urban Many platforms -PC, Mobile phones, Mxit, etc

Background  Internet also brought many RISKS  Organizations address these risks through “Information Security” Typically controls are selected from a standard like ISO/IEC Three categories of controls -Physical -Technical -Operation Physical & Technical Controls depend on Operational controls Thus all controls depend on humans

Background  Organizations Information Security Awareness, Training & Education Smaller organizations might lack resources  Home Users Currently no Cyber Security Education  Society as a whole needs to develop a Cyber Security culture Children are usually taught about physical security or financial security by their parents Current parents are possibly even less equipped than their children to be secure online Last year alone 4400 cases of identity theft were reported to the SAFPS (More than R200 million in fraud)

Why a Portal? There is a need for Cyber-Security education for all Southern Africans A “one size fits all” approach won’t work for everyone

A Cyber Security Portal  We are developing a Cyber Security Portal (Institute for ICT Advancement at the Nelson Mandela Metropolitan University)  This portal consists of several sub-projects A web-based information security governance toolbox A pedagogically sound e-learning portal for basic information security education A web-based game to raise awareness about information security in organizations An e-learning portal catering for the specific needs of children and teenagers An information security resource portal

Information security governance toolbox  Information security governance Expensive Requires staff & other resources  An information security policy requires Expertise to create Compliance  Smaller organizations may lack resources and/or knowledge

Information security governance toolbox  We’re creating a Web-based Toolset Automatic policy generation Compliance measurement Digital “dashboard” Low Cost  Based on a framework & existing desktop toolset developed over several years Redevelopment of PC Based “consulting tool” to “self service” web based tool

A pedagogically sound e-learning portal  Current information security education lacks pedagogical basis (Puhakainen, 2006)  No current program targets home users Social networking Internet banking Etc  Moodle 2.0 Portal Free access to basic education Brain compatible learning principles Activities planned according to learning taxonomies

A web-based awareness game  Information Security often not seen as a core business component  Employees lack motivation to learn about security  Address motivational issues by making security awareness “fun”  Game design based on sound educational gaming research Employees compete in virtual “race” over 2 weeks Daily clues Use of Google Maps and other tools to simulate race Leaderships boards & Daily + Weekly prizes  Framework to be tested towards end of 2011 Can be customized for other organizations

E-learning portal for children  Children have specific Cyber Security needs Social Networking Mxit, etc  Parents lack knowledge  Portal will provide Games Age relevant Cyber Security material  For Parents Information brochures Parental control tools

Information security resource portal  Research papers  Information Security Standards  Informational brochures  Contact information for research collaboration  Links to “other” cyber security research projects

Aims of the portal The aim of this portal is to be a single point of access for all free, or low-cost, cyber & information security related resources in Southern Africa

Questions / Comments ?