SlideShare uma empresa Scribd logo
2014
Edu ision
 What is Cyber-Security (CS) Education?
 Why should we provide this Education?
 Who is the target audience ?
 Curriculum for Cyber-Security
 Limitations of a Cyber-Security Curriculum
 Conclusion
 Future Work
 Education
Learning that enables
 Cyber-Security
Protection computers, networks, programs and data
from unintended or unauthorized access, change or
destruction, i.e. enforcing Confidentiality, Integrity,
Access (C.I.A) for the Internet.
 Increase in Malicious Cyber-Attacks
 Increase in internet open access
 Proliferation in social media (instagram, facebook)
 Adoption of new technologies (e.g. web bitcoins)
 Awareness levels close to real time is low
 Increase in Cyber-Security penetration
 Need for Cyber-Security Forensics
 Primary School Education
 High School Education
 College /Tertiary Education
 Curriculum at primary level education
Geared towards mobile safety and online conduct
 High School Education
Deeper in browser forensics and online tracking
 College Level /Tertiary Education
Emphasis on understanding threat models, creating
mitigation strategies and building solutions.
 Power up and Power down computers
 Identifying secure and insecure web pages
 Social Engineering for the Internet
 Identifying basic malicious attacks (e.g. pop ups,
script kiddies etc.)
 Reading web page instructions and terms and
conditions for using such pages.
 Advance Computer Networking
 Advance Digital Forensics and Incident
Response for the Internet
 Legal Policy for the Internet
 Cryptography Techniques for the Web
 Online Financial Security
 Internet Auditing and Risk Management
 Internet Governance
 Security is an interdisciplinary field
(many skills to hone)
 Policy adoption on security education
 Human Talent Pool of Educational Security
Experts at all levels of curriculum
 Technology Adoption
 Cyber-Security transformation education
initiatives at all levels of the curriculum required
 Existing National ICT initiatives lack the adequate
pool expertise at all requisite levels of curricula.
 As Internet penetration increases - a global intiative
on Cyber-Security is imperative and the Jamaican
context requirement is no less.
 Tertiary Level training to inform tertiary level
training and lower level curricula is required.
 Cyber-Security transformation education
initiatives at all levels of the curriculum required
 National ICT security policy initiatives that speak to
skills based initiatives to provide short term,
medium term and long term Security Talent
Management Pools
 Tertiary Level training to inform tertiary and lower
level curricula
?
Thank You

Mais conteúdo relacionado

Mais procurados

Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
GAURAV. H .TANDON
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Malware ppt
Malware pptMalware ppt
Malware ppt
Faiz Khan
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
cyber security
cyber securitycyber security
cyber security
 

Destaque

What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity Policy
Ely Kahn
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Aurobindo Nayak
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Kyle Lai
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
National LECET
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
Dr. Amitabha Yadav
 
Teacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsTeacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and Apps
Shelly Sanchez Terrell
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์deepre
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์deepre
 
China K4
China K4China K4
China K4
Cathy Trenkler
 
Project 2000
Project 2000Project 2000
Project 2000lexsing
 
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieWat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieDigital creator Nederland
 
Food And Thought
Food And ThoughtFood And Thought
Food And Thoughtthandastuff
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
sasitorn
 
Video Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécritureVideo Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécriture
vogmae
 
Flyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious StudiesFlyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious Studies
Grial - University of Salamanca
 
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateCourse 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Imad Daou
 
Персональное обучение. Мастер-класс
Персональное обучение. Мастер-классПерсональное обучение. Мастер-класс
Персональное обучение. Мастер-класс
Dmitry Izmestiev
 
National Parks
National ParksNational Parks
National Parkstpuetz
 

Destaque (20)

What's Next in Cybersecurity Policy
What's Next in Cybersecurity PolicyWhat's Next in Cybersecurity Policy
What's Next in Cybersecurity Policy
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Teacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and AppsTeacher Zen with Google Tools and Apps
Teacher Zen with Google Tools and Apps
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์
 
คอมพิวเตอร์
คอมพิวเตอร์คอมพิวเตอร์
คอมพิวเตอร์
 
China K4
China K4China K4
China K4
 
Project 2000
Project 2000Project 2000
Project 2000
 
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info TekstversieWat Is Digital Creator Eigenlijk Vo Info Tekstversie
Wat Is Digital Creator Eigenlijk Vo Info Tekstversie
 
Food And Thought
Food And ThoughtFood And Thought
Food And Thought
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
 
Video Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécritureVideo Blogs and Softvideo (videoécriture
Video Blogs and Softvideo (videoécriture
 
Flyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious StudiesFlyer IERS - Intercultural Education through Religious Studies
Flyer IERS - Intercultural Education through Religious Studies
 
Course 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM TemplateCourse 1: Create and Prepare Ubuntu 12.04 VM Template
Course 1: Create and Prepare Ubuntu 12.04 VM Template
 
Персональное обучение. Мастер-класс
Персональное обучение. Мастер-классПерсональное обучение. Мастер-класс
Персональное обучение. Мастер-класс
 
Communication
CommunicationCommunication
Communication
 
National Parks
National ParksNational Parks
National Parks
 

Semelhante a Cyber-Security in Education

Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in kerala
achuamal415
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
SOCVault
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Assignment Help
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
advancedtrainingaus
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
meetsolanki44
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
Avantika University
 
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdfINFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
teampcsdf
 
Become a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business ChallengesBecome a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business Challenges
Mitedu
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
CCI Training Center
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
Skillogic Solutions
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
Skillogic Solutions
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
Skillogic Solutions
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
Skillogic Solutions
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
Skillogic Solutions
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
Skillogic Solutions
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
Skillogic Solutions
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
Skillogic Solutions
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
Skillogic Solutions
 

Semelhante a Cyber-Security in Education (20)

Introduce cyber seacurity course in kerala
Introduce cyber seacurity course in keralaIntroduce cyber seacurity course in kerala
Introduce cyber seacurity course in kerala
 
Importance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVaultImportance Of Cybersecurity In Education System | SOCVault
Importance Of Cybersecurity In Education System | SOCVault
 
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
Navigating Safely in Cyberspace_ A Guide to Internet Safety and Cybersecurity...
 
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
Stepping into the Digital Fortress- Exploring Cyber Security Courses and Ethi...
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdfINFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
INFORMATION OF CYBER SECURITY SECURITY AWARNESS.pdf
 
Become a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business ChallengesBecome a Master of Cybersecurity with Real World Business Challenges
Become a Master of Cybersecurity with Real World Business Challenges
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Skillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in ChennaiSkillogic Cyber security Certification Course in Chennai
Skillogic Cyber security Certification Course in Chennai
 
Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024Cyber Security Course in Chennai March 2024
Cyber Security Course in Chennai March 2024
 
Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024Cyber Security Course in Chennai April 2024
Cyber Security Course in Chennai April 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024Cyber Security Course in Pune February 2024
Cyber Security Course in Pune February 2024
 
Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024Cyber Security Course in Pune March 2024
Cyber Security Course in Pune March 2024
 
Cyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptxCyber Security Course in Chennai March.pptx
Cyber Security Course in Chennai March.pptx
 
Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024Cyber Security Course in Chennai January 2024
Cyber Security Course in Chennai January 2024
 
Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024Cyber Security Course in Chennai February 2024
Cyber Security Course in Chennai February 2024
 
Cyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptxCyber Security Course in Chennai February.pptx
Cyber Security Course in Chennai February.pptx
 
Cyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptxCyber Security Course in Pune March 2024.pptx
Cyber Security Course in Pune March 2024.pptx
 

Mais de Tyrone Grandison

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Tyrone Grandison
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
Tyrone Grandison
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
Tyrone Grandison
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
Tyrone Grandison
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Tyrone Grandison
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
Tyrone Grandison
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
Tyrone Grandison
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
Tyrone Grandison
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
Tyrone Grandison
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
Tyrone Grandison
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
Tyrone Grandison
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
Tyrone Grandison
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
Tyrone Grandison
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
Tyrone Grandison
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
Tyrone Grandison
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
Tyrone Grandison
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
Tyrone Grandison
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
Tyrone Grandison
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
Tyrone Grandison
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
Tyrone Grandison
 

Mais de Tyrone Grandison (20)

Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
Global Scientific Research as a Tool to Unlock and Engage Talent and Expand t...
 
Learning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global PandemicLearning From the COViD-19 Global Pandemic
Learning From the COViD-19 Global Pandemic
 
Systemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and AccessSystemic Barriers in Technology: Striving for Equity and Access
Systemic Barriers in Technology: Striving for Equity and Access
 
COVID and the Ederly
COVID and the EderlyCOVID and the Ederly
COVID and the Ederly
 
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?Are There Ethical Limits to What Science Can Achieve or Should Pursue?
Are There Ethical Limits to What Science Can Achieve or Should Pursue?
 
Using Data and Computing for the Greater Good
Using Data and Computing for the Greater GoodUsing Data and Computing for the Greater Good
Using Data and Computing for the Greater Good
 
How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...How to effectively collaborate with your IT Departments to Develop Secure IA ...
How to effectively collaborate with your IT Departments to Develop Secure IA ...
 
DOES innovation Lab Launch
DOES innovation Lab LaunchDOES innovation Lab Launch
DOES innovation Lab Launch
 
Creating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic PlanCreating Chandler's IT Strategic Plan
Creating Chandler's IT Strategic Plan
 
Inventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and FocusInventing with Purpose, Intention and Focus
Inventing with Purpose, Intention and Focus
 
Becoming a Nation of Innovation
Becoming a Nation of InnovationBecoming a Nation of Innovation
Becoming a Nation of Innovation
 
Running Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHMERunning Mixed Workloads on Kubernetes at IHME
Running Mixed Workloads on Kubernetes at IHME
 
The Power Of Open
The Power Of OpenThe Power Of Open
The Power Of Open
 
ISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data ServiceISPAB Presentation - The Commerce Data Service
ISPAB Presentation - The Commerce Data Service
 
Building APIs in Government for Social Good
Building APIs in Government for Social GoodBuilding APIs in Government for Social Good
Building APIs in Government for Social Good
 
Strategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT ModernizationStrategies and Tactics for Accelerating IT Modernization
Strategies and Tactics for Accelerating IT Modernization
 
The Creative Economy within the United States of America
The Creative Economy within the United States of AmericaThe Creative Economy within the United States of America
The Creative Economy within the United States of America
 
Enabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public CollaborationsEnabling Data-Driven Private-Public Collaborations
Enabling Data-Driven Private-Public Collaborations
 
Creating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With PurposeCreating a Data-Driven Government: Big Data With Purpose
Creating a Data-Driven Government: Big Data With Purpose
 
Security and Privacy in Healthcare
Security and Privacy in HealthcareSecurity and Privacy in Healthcare
Security and Privacy in Healthcare
 

Último

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Sourabh Kumar
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 

Último (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 

Cyber-Security in Education

  • 2.  What is Cyber-Security (CS) Education?  Why should we provide this Education?  Who is the target audience ?  Curriculum for Cyber-Security  Limitations of a Cyber-Security Curriculum  Conclusion  Future Work
  • 3.  Education Learning that enables  Cyber-Security Protection computers, networks, programs and data from unintended or unauthorized access, change or destruction, i.e. enforcing Confidentiality, Integrity, Access (C.I.A) for the Internet.
  • 4.  Increase in Malicious Cyber-Attacks  Increase in internet open access  Proliferation in social media (instagram, facebook)  Adoption of new technologies (e.g. web bitcoins)  Awareness levels close to real time is low  Increase in Cyber-Security penetration  Need for Cyber-Security Forensics
  • 5.  Primary School Education  High School Education  College /Tertiary Education
  • 6.  Curriculum at primary level education Geared towards mobile safety and online conduct  High School Education Deeper in browser forensics and online tracking  College Level /Tertiary Education Emphasis on understanding threat models, creating mitigation strategies and building solutions.
  • 7.  Power up and Power down computers  Identifying secure and insecure web pages  Social Engineering for the Internet  Identifying basic malicious attacks (e.g. pop ups, script kiddies etc.)  Reading web page instructions and terms and conditions for using such pages.
  • 8.  Advance Computer Networking  Advance Digital Forensics and Incident Response for the Internet  Legal Policy for the Internet  Cryptography Techniques for the Web  Online Financial Security  Internet Auditing and Risk Management  Internet Governance
  • 9.  Security is an interdisciplinary field (many skills to hone)  Policy adoption on security education  Human Talent Pool of Educational Security Experts at all levels of curriculum  Technology Adoption
  • 10.  Cyber-Security transformation education initiatives at all levels of the curriculum required  Existing National ICT initiatives lack the adequate pool expertise at all requisite levels of curricula.  As Internet penetration increases - a global intiative on Cyber-Security is imperative and the Jamaican context requirement is no less.  Tertiary Level training to inform tertiary level training and lower level curricula is required.
  • 11.  Cyber-Security transformation education initiatives at all levels of the curriculum required  National ICT security policy initiatives that speak to skills based initiatives to provide short term, medium term and long term Security Talent Management Pools  Tertiary Level training to inform tertiary and lower level curricula