1 / 18

Information Security Education and Awareness: Start with a Story

Information Security Education and Awareness: Start with a Story. 31 May – 2 June 2011, Budapest, Hungary 2011 Workshop on Cyber Security and Global Affairs. Alexandra Savelieva , Sergey Avdoshin , PhD National Research University “ Higher School of Economics”.

elom
Download Presentation

Information Security Education and Awareness: Start with a Story

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security Education and Awareness: Start with a Story 31 May – 2 June 2011, Budapest, Hungary 2011 WorkshoponCyberSecurityandGlobalAffairs Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics”

  2. Information security education problem Decisions Decisions Decisions Academia vs. Real World 2011 Workshop on Cyber Security and Global Affairs

  3. Case study method Case studies are stories with educational message (Source: Clyde Freeman Herreid, “Start with a story”) Purpose: teaching students work individually/as a team to Analyse information, Process it in a systematic way Outline key problems Generate and evaluate alternative solutions Select optimal solution and prepare for actions Application: Sociology Economics Law Management 2011 Workshop on Cyber Security and Global Affairs

  4. Problems with application of case study method in teaching information security 2011 Workshop on Cyber Security and Global Affairs

  5. Problems with application of case study method in teaching information security 2011 Workshop on Cyber Security and Global Affairs

  6. Where to get the idea for a story? 2011 Workshop on Cyber Security and Global Affairs

  7. Structure of case study 2011 Workshop on Cyber Security and Global Affairs

  8. Case study creation process . 2011 Workshop on Cyber Security and Global Affairs

  9. Problems with application of case study method in teaching information security 2011 Workshop on Cyber Security and Global Affairs

  10. Evaluation criteria for student’s work 2011 Workshop on Cyber Security and Global Affairs

  11. Case studies by key words 2011 Workshop on Cyber Security and Global Affairs

  12. There is a way to make information security course: interactive and entertaining facilitating development of analytical skills encouraging active use of theoretical knowledge close to real-world situation adaptive to students’ level and background admitting both teamwork and independent work with minimal requirements to laboratory equipment 2011 Workshop on Cyber Security and Global Affairs

  13. Advantages of case study method application Focus on practical aspects of information security in the real world High level of students’ interest and involvement Understanding of organizational decisions and corporate culture impact on information security Demonstration of risk management principles application in the context of information protection Practical classes with minimum requirements to equipment Multifaceted approach to information security – from the perspective of user, technical specialist, CFO, architect, tom-manager 2011 Workshop on Cyber Security and Global Affairs

  14. Approbation Software Engineering Department of National Research University “Higher School of Economics” “Information security management” (MSc programme, 2nd year) “Methods of information protection” (BSc programme, 4th year). Training Labs'2010 conference Format: interactive case study training “Risk management in the world of digital dependencies” Course “Microsofttechnologies and products in information protection”, supported by a grant from Microsoft (students’ rating of the course – 4,83 out of 5 effective 19.12.2010) Microsoft faculty resource center, https://www.facultyresourcecenter.com/curriculum/pfv.aspx?ID=8476&Login Internet university for information technologies, http://www.intuit.ru/department/security/mssec/ 2011 Workshop on Cyber Security and Global Affairs

  15. Conclusion 2011 Workshop on Cyber Security and Global Affairs

  16. Information Security Education and Awareness: Start with a Story 31 May – 2 June 2011 2011 WorkshoponCyberSecurityandGlobalAffairs Alexandra Savelieva, Sergey Avdoshin, PhD National Research University “Higher School of Economics”

  17. Demo Video case: Switching to a Secure Frequency

  18. Case study • Title: • Switchingto a securefrequency • Actors: • Commander Tong • Admiral • Key areas: • Human factors • Information risk management • Consequences of information system failure • Information availability • User Interface Design and Usability • Adequate level of information protection • Secure channels for data transmission 2011 Workshop on Cyber Security and Global Affairs

More Related