RSS

Ideas for a more secure Internet-part2/IT-Security Scouts

16 May
Ideas for a more secure Internet-part2/IT-Security Scouts
.
Learning IT-Security
.

.
sid2014-anim-banner
.
.
sharing icon
International Days of security, which already exist and are organized by the European Commission should be more focused on practice, awareness is not enough! BTW: although they do a very good job! There is a need to do more, such as:
.



“Security Help Point” and “Security Scout”

.

blueman
.
.
Knowing that there are a lot of computers already infected, we must help these people clean up their computers and show them how to protect …
.

Why not train people loving ICT to become a “Security Scout” and be present by appointment in a café (Pub) and/or other meeting places (school, youth center, multipurpose room, senior club, etc..) which will then have the label “Security Help Point“. This idea I sent to the Ministry of Economy of Luxembourg/CASES project (LU), which I am an official partner, and who found it very interesting, even they are currently developing a project with young people (not in cafés) based on this idea.
.
To ensure quality it is advisable to predefine strict admission criteria to become a “Security Scout“. Everyone must follow a well defined learning, which will be awarded the title of “Junior Security Scout” and “Senior Security Scout” with delivery of a certificate and a badge.


The “Junior Security Scout”

cartoonsquirrelmikesm1

.

.

The “Junior Security Scout” will be trained by a “Senior Security Scout” for the basic knowledge of computer security at home. The knowledge base will be defined as follows:

  • Knowledge about all forms of attacks (viruses, worms, rootkits, trojans, phishing, keyloggers,steganography, spam, hoaxes, rogue anti-malware, XSS, cross-site-scripting, drive-by-download..).
  • Be informed about new attacks.
  • Be informed about new scams (fake antivirus, fake emails, etc..)
  • Knowledge of software and tools for protection, commercial versions and/or free …
  • Knowing the laws regarding software piracy (in practice it’s scary how people use the “hacked“, and worse yet they find it “cool” [I fucked Microsoft, ha, ha, ha].
  • For information about the Laws he can use the “Security Master File“.

.


The role of these “IT-Security Scouts”

.

blueman10701

  • They will guide computer users to ensure safe use of the computer and the Internet.
  • They advise users.
  • For infringement of software, help users to become legitimate.
  • On request they can organize events information security …
  • They can participate in “Safety + IT-Security Days” and support the national team organization.
  • They help users clean up their computers and/or install protection tools.
  • They will help users choose tools to protect free and they will show users how to use it.
  • They relate their experiences in practice to the  “Senior Security Scouts“.
.
Every six months (insecurity is growing very fast …) the “Security Scout” must be evaluated to see that it still meets the quality criteria (be informed), to avoid that someone wants to argue for his title and he does not learn anything … It is imperative that these individuals have very good knowledge …
.

The “Senior Security Scout”

.
blueman20401The “Senior Security Scout” has the same responsibilities as the “Junior Security Scout” except he (she) has more knowledge, he (she) has years of experience in the field of security and it also has the right to exercise training function, e.g. he (she) can be contacted by the common (and others) to give evenings (days) for information on domestic security, and he (she) can also train the “Junior Security Scouts“.
.
.

Senior Security Scouts” report the practical experience to the Department so that they are aware of the current situation on the field.

.

It is also advisable to develop a help file containing documents and tutorials about IT-Security. This file “Security Master File” to be present in each “Security Help Point” to ensure the same quality at each location. That way, if there will be questions we can provide people with correct answers and always the same at any place (quality monitoring).

.


“Security Master File”

.
help-books-aj-svgajash01This folder should contain the following:
.
.
  • Safety data sheets developed by the Department or others having been recognized as being educational.
  • Guidelines for behavior on the Internet and use the computer for use without fear …
  • A list (not exhaustive) list of good links for legal downloads, trustworthy download sites…
  • A list of “FAQ” (Frequently Asked Questions), containing also the legal aspects.
  • A list of laws concerning ICT.
  • A list with links to security tools, free and commercial software…
.

Find information about international IT-Laws

.

help-books-aj-svgajash01

..

.

blueman20401Recommendations from the BIG Players on IT-Security, Cyber-security, Internet-Safety, privacy, Online-Safety:

.

as on Friday May 18, 2012: SaferOnlineTeam@MS @Safer_Online
Follow Friday – Follow @knolinfos to help stay up to day on Internet security and safety tips. ===> That’s my Twitter account

.

PS: SaferOnlineTeam@MS @Safer_Online is Microsoft’s official Twitter account for privacy and online safety guidance and information.

Redmond, WA, USA  http://www.microsoft.com/security

.

Stay tuned for next publication…

.

Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,