delivering e-security education through e-learning v.k.sharma lakshmi kalyani cdac, noida
TRANSCRIPT
Delivering e-Security Education through
e-Learning
V.K.Sharma
Lakshmi KalyaniCDAC, Noida
Need of e-Security Education
Information security is required at all levels personal level, corporate level, state and country level.
In any company, the integrity of its systems and the data contained within, including issues of customer privacy should be looked after very closely at protecting its literal and electronic borders.
Market Survey
NASSCOM predicts requirement of 1,88,000 e-Security professionals by the year 2008.
Lack of entry level courses and certifications in information security market.
Security compliance is must for all companies with IT backbone.
IT–ITES industry requires security experts. Cross training people in security is an asset to any
organization. Information workers lack of basic security knowledge
causes huge financial losses. NASSCOM points out that IT Security Education is
the need for the hour.
Information Security & hacking market in India
Reported cases of nearly 15,000 cyber crimes in India in an year (Source NDTV Profit);
Fastest growing Internet user market; Among Top 10 countries in terms of cyber crimes; Cyber security business in India is currently worth US
$1.5 billion; Cyber security business has a high growth rate of 30
percent. Number of hackers are three times the security
professionals.
Challenges for e-security education through e-learning mode
To impart the education in the traditional classroom mode or through e-Learning mode.
The type of e-security knowledge required to be provided. To categorize the e-security information as per the
requirement of different kinds of users. To identify the users to whom the e-Security education is
to be provided. To design the syllabus according to different user
perspectives. To develop the contents in such a way so as to enable the
learners to understand clearly the theoretical concepts, practical explanation, real time solutions etc.
Importance of e-Learning approach
e-Learning mode is most effective for users such as working professionals, students pursuing their studies etc ,such as
For imparting training with anytime, anywhere, any place methodology
For broader audience coverage 24x7 information content availability Click & learn technique For faster learning in cost effective way
Relevance of e-Learning methodology to the e-security education
Greater need for training to the masses
Frequent up gradation of content for various categories of users
Minimum training budgets and learning cost
Distributed learner base makes classroom training difficult.
Current project :Design & Development of e-learning contents for e-security solution developersA project of DIT, MCIT (Ministry of A project of DIT, MCIT (Ministry of
Communications & InformationCommunications & Information
Technology)Technology)
e-learning Facilities available at CDAC Resources available:
H/W: Fully capable database server, Content Server, & Application Server.
S/W: Content authoring & publishing tools Multimedia tools, Learning Management System.
Dedicated team: One exclusively dedicated team for content development.
Highlights of the project Categorization of e-security contents for three categories
of users namely:
(I) Postgraduate /Engg. Students
(II) System Administrators/Officers in charge of
e- security
(III) Scientists Designed the curriculum of contents for the three
categories of users. Curriculum approved from eminent e-security experts and
professors
Content Development Strengths at CDAC
Content Creation
Content Publishing
Content Verification
Content Hosting
Content Access
Architecture for implementation- Deployment of content
Use of the e-Learning contents on e-security The developed e-Learning contents would provide
various case studies with varying levels of complexity and security to enable the understanding of the development of e-security solutions.
The case studies would be categorized according to the target group of users and according to the complexity of the requirements. The case studies can also feature the existing tools, which can be modified and updated as per the user requirements.
Use of the e-Learning contents on e-security The contents provide linkage of the case studies with the
inherent algorithm and mathematical models
Case study : Detailed explanation of the algorithm (crypto algo )
↓ Number systems & mathematical
models involved ↓
Implementation of the algorithm in a sample application using programming language
↓ Usage of the application as a e-
security solution
Conclusion
The developed contents for students (first category of users ) would be available in a couple of months, for the use of public and masses.
The motive is to educate as many people as possible at their own pace, place and time , which would be effectively possible through e-learning mode.
It is thus expected from various Engg. Colleges , Educational institutions and Industries imparting training to obtain the registration for accessing the developed advanced e-security contents through e-learning mode.
Implementation
Content Server provided by C-DAC Noida
Student Registers
Appears for review tests and Online tests
Practice sessions simulating lab
sessions
Participates in bulletin board
Working models and Interactive Quiz
Student is assigned UserId and Password
Log into Content server at C-DAC Noida and attend contact sessions
Personal Page
Solved Question Papers