Dr E Kritzinger – UNISA SACSAW 2011. The Cyber Security Awareness Workbook.

21
Dr E Kritzinger – UNISA SACSAW 2011

Transcript of Dr E Kritzinger – UNISA SACSAW 2011. The Cyber Security Awareness Workbook.

Dr E Kritzinger – UNISASACSAW 2011

The Cyber Security Awareness Workbook

Introduction

Cyber Awareness

Government

Industry

Education

Home Users

SchoolsPolicy

Implementation

Organizers and quest speakers:From left: Dr K. Padayachee, Dr E. Kritzinger, Prof S.H. von Solms, Ms M. Loock, Dr M. Ramorola, Prof M. Setati, Prof E. Smith, Prof T. Pistorius, Colonel J. Hefer, Mr S. Potgieter and Prof R. von Solms.

Panel discussion:From left: Prof R. von Solms, Colonel J. Hefer, Ms S. Mocke, Mr S. Potgieter, Dr M. Ramorola and Prof S.H. von Solms.

Online available: http://www.unisa.ac.za/Default.asp?Cmd=ViewContent&ContentID=24842

Completed initiatives – Seminar: Cyber safety 2010

E-Guidelines for School – DOE (2011)

• E-Guidelines have been approved.• Available on the DOE Thutong website .• First step from the DOE to assist in the topic.• No other planned initiatives for cyber awareness• While before cyber awareness will be integrated into

the curriculum.• An interim initiative is needed until cyber awareness

is incorporated into the curriculum.

Problem Statement

Enhancing cyber awareness amongst children, parents & teachers to decrease cyber threats.

Aims

Develop and distribute relevant cyber awareness material to school children, parents & teachers within South Africa.

Reasons for Cyber awareness

• Increase in broadband to Africa• Increase in mobile phone – with web access• Increase in cyber incidences• Cyber divide• Technological divide

Reasons for Cyber awarenessIn a survey conducted by Harris Interactive(R) for MacAfee (2008) the following statistics were obtained: (http://www.mcafee.com)

• 63% of teenagers said they know how to hide what they are doing online form their parents,• 32% are able to clear the browser history,• 16% have created private e-mail and social networking profiles,• 52% have given out personal information to somebody they do not know online,• 20% have engaged in cyber bulling and• 9% have used the Internet to cheat at school.

Initiative for 2011 - Workbook

The workbook will:1. ... be in a hard copy format that will assist many

schools that have limited computer access (if any).2. ... provide cyber awareness information. 3. ... provide teachers/parents with guidance on how

to make children aware of cyber threats. 4. ... Provide activities for children.

Workbook (1)

Plan of action: Design “Cyber Awareness image”.Design, print and distribute workbook.Obtain sponsors.

Format: Hard copy

The implementation of c-safety within South Africa is unique due to the huge range of diversity amongst culture, language, religions, wealth classes, access to knowledge and technology and no centralised e-learning policies and resource .(Czerniewics, 2010. Available: http://mfeldstein.com/mobile-is-my-soul-cell-phones-in-south-afric/a)

Workbook (1)

• The workbook can be translated into many different languages and will help teachers, parents and children to understand the content more easily.

• Workbooks can easily copied in school with no access to computers and printers or limited funds.

• Used with other initiatives for example internet day. • Used for training of teachers.

Workbook (1) -Distribution

• The Independent Educator is circulated to approx. 37,000 teachers. This magazine also provides an opportunity to advertise on a web banner on their website. The website has an average of 1,500,000 visitors per month.

• Free 4 all is a magazine that is distributed to school children. Total distribution – 390 000 monthly. This magazine will be used to distribute a copy of the workbook to children.

Partners (2)

Centre of Software Engineering - UNISAFilm and Publication Board

National Research Foundation Microsoft (?)

Cyberethics Cybersafety Cyber security • Plagiarism • Copyright • Hacking • Fair use • File sharing • Eetiquette protocols • Posting incorrect information • Cyberbullying • Pirating• Online gambling • Gaming • Internet addiction

• Online predators • Objectionable content • Cyberstalking • Harassment • Pedophiles • Hate groups • Pornography • Unwanted communications • Online threats

• Hoaxes • Viruses • Malicious code • Junk email• Chain letters • Get-rich-quick schemes • Scams • Criminal hackers • Hacktivists • Malware • Trojans • Phishing • Theft of identity • Spoofing • Privacy

The NCSA advocates for cyber education programmes based onthree key pillars: (http://www.staysafeonline.org/in-the-classroom/three-key-pillars).

Workbook (2) - Topics

Workbook (2) - Example of a Topic

The teacher magazine, 2010

Workbook (3)- Lesson Plans

• In most cases teachers also do not understand the topics.

• Teachers do not have access to internet to download lesson plans.

• Teachers do not syllabus to work from.• Must provide teachers with guidance on how to

address these issues.

Workbook (3) – Example of a lesson plans

OverviewStudents explore a scenario in which a friendly relationship turns to a bullying one involving cell phones and computers.

ObjectivesAnalyze online behaviors that could be considered cyberbullying.Generate multiple solutions for dealing with a cyberbullying situation.Identify abbreviations and other textual clues to reduce cyberbullying.

IntroduceAsk: What are all the reasons and ways kids communicate with cell phones? (call friends, call parents for help, text message, take and send photos, go online, receive e-mails and instant messages)

Real life problem: Cyberbullying: Not a Pretty PictureJaleesa and Kim are friends at Jefferson Middle School. Kim tells Jaleesa that she doesn’t want to hang out with her any more. Jaleesa is angry and upset. She uploads a photo of Kim from her cell phone that was taken at a slumber party two weeks earlier. Jaleesa sends the photo to everyone on her buddy list with a message attached: “Kim is such a ****.”

Activities:• What is the problem?• Think about the problem• What is the solution• Take action.

Assess:The following items assess student mastery of the lesson objectives.Ask: What is cyberbullying? (It's when kids are intentionally and repeatedly mean to one another using cell phones or the Internet.) Ask: How can cyberbullying make kids feel? (It can make them feel angry, frustrated, sad, or afraid.) Ask: What kinds of abbreviations can kids use to prevent cyberbullying while text or instant messaging? (Answers will vary.)

Workbook (4) -ActivitiesAges:• Educators & Parents (caregivers)• Children: Aged 4 - 8 (Preschool – Grade 2)

Aged 8 - 11 (Grade 2 – Grade 5)

Aged 11-14 (Grade 5 – Grade 7)

Aged 14-18 (High school)

Activities:• Role play, discussions, real life scenarios, hands

on activity sheets.

Workbook (4) - Examples

The Teacher Magazine - 2010

Possible connected initiatives

Workbook

Publications

Cyber days

Syllabus Education

Training