Delivering e-Security Education through e-Learning

1 / 16
About This Presentation
Title:

Delivering e-Security Education through e-Learning

Description:

Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida Need of e-Security Education Information security is required at all levels ... – PowerPoint PPT presentation

Number of Views:81
Avg rating:3.0/5.0
Slides: 17
Provided by: elearnese

less

Transcript and Presenter's Notes

Title: Delivering e-Security Education through e-Learning


1
Delivering e-Security Education throughe-Learning
  • V.K.Sharma
  • Lakshmi Kalyani
  • CDAC, Noida

2
Need of e-Security Education
  • Information security is required at all levels
  • personal level,
  • corporate level,
  • state and country level.
  • In any company, the integrity of its systems and
    the data contained within, including issues of
    customer privacy should be looked after very
    closely at protecting its literal and electronic
    borders.

3
Market Survey
  • NASSCOM predicts requirement of 1,88,000
    e-Security professionals by the year 2008.
  • Lack of entry level courses and certifications in
    information security market.
  • Security compliance is must for all companies
    with IT backbone.
  • ITITES industry requires security experts.
  • Cross training people in security is an asset to
    any organization.
  • Information workers lack of basic security
    knowledge causes huge financial losses.
  • NASSCOM points out that IT Security Education is
    the need for the hour.

4
Information Security hacking market in India
  • Reported cases of nearly 15,000 cyber crimes in
    India in an year (Source NDTV Profit)
  • Fastest growing Internet user market
  • Among Top 10 countries in terms of cyber crimes
  • Cyber security business in India is currently
    worth US 1.5 billion
  • Cyber security business has a high growth rate of
    30 percent.
  • Number of hackers are three times the security
    professionals.

5
Challenges for e-security education through
e-learning mode
  • To impart the education in the traditional
    classroom mode or through e-Learning mode.
  • The type of e-security knowledge required to be
    provided.
  • To categorize the e-security information as per
    the requirement of different kinds of users.
  • To identify the users to whom the e-Security
    education is to be provided.
  • To design the syllabus according to different
    user perspectives.
  • To develop the contents in such a way so as to
    enable the learners to understand clearly the
    theoretical concepts, practical explanation, real
    time solutions etc.

6
Importance of e-Learning approach
  • e-Learning mode is most effective for users such
    as working professionals, students pursuing their
    studies etc ,such as
  • For imparting training with anytime, anywhere,
    any place methodology
  • For broader audience coverage
  • 24x7 information content availability
  • Click learn technique
  • For faster learning in cost effective way

7
Relevance of e-Learning methodology to the
e-security education
  • Greater need for training to the masses
  • Frequent up gradation of content for various
    categories of users
  • Minimum training budgets and learning cost
  • Distributed learner base makes classroom training
    difficult.

8
Current project Design Development of
e-learning contents for e-security solution
developers
  • A project of DIT, MCIT (Ministry of
    Communications Information
  • Technology)

9
e-learning Facilities available at CDAC
  • Resources available
  • H/W Fully capable database server, Content
    Server, Application Server.
  • S/W
  • Content authoring publishing tools
  • Multimedia tools,
  • Learning Management System.
  • Dedicated team One exclusively dedicated team
    for content development.

10
Highlights of the project
  • Categorization of e-security contents for three
    categories of users namely
  • (I) Postgraduate /Engg. Students
  • (II) System Administrators/Officers in charge of
  • e- security
  • (III) Scientists
  • Designed the curriculum of contents for the
    three categories of users.
  • Curriculum approved from eminent e-security
    experts and professors

11
Content Development Strengths at CDAC
12
Architecture for implementation- Deployment of
content
13
Use of the e-Learning contents on e-security
  • The developed e-Learning contents would provide
    various case studies with varying levels of
    complexity and security to enable the
    understanding of the development of e-security
    solutions.
  • The case studies would be categorized according
    to the target group of users and according to the
    complexity of the requirements. The case studies
    can also feature the existing tools, which can be
    modified and updated as per the user requirements.

14
Use of the e-Learning contents on e-security
  • The contents provide linkage of the case studies
    with the inherent algorithm and mathematical
    models
  • Case study Detailed explanation of the
    algorithm (crypto algo )

  • ?
  • Number systems
    mathematical models involved

  • ?
  • Implementation of the algorithm in a sample
    application using programming language

  • ?
  • Usage of the
    application as a e- security solution

15
Conclusion
  • The developed contents for students (first
    category of users ) would be available in a
    couple of months, for the use of public and
    masses.
  • The motive is to educate as many people as
    possible at their own pace, place and time ,
    which would be effectively possible through
    e-learning mode.
  • It is thus expected from various Engg. Colleges ,
    Educational institutions and Industries
    imparting training to obtain the registration for
    accessing the developed advanced e-security
    contents through e-learning mode.

16
Implementation
Student Registers
Student is assigned UserId and Password
Log into Content server at C-DAC Noida and attend
contact sessions
Personal Page
Content Server provided by C-DAC Noida
Practice sessions simulating lab sessions
Appears for review tests and Online tests
Solved Question Papers
Participates in bulletin board
Working models and Interactive Quiz
Write a Comment
User Comments (0)