Title: Delivering e-Security Education through e-Learning
1Delivering e-Security Education throughe-Learning
- V.K.Sharma
- Lakshmi Kalyani
- CDAC, Noida
2Need of e-Security Education
- Information security is required at all levels
- personal level,
- corporate level,
- state and country level.
- In any company, the integrity of its systems and
the data contained within, including issues of
customer privacy should be looked after very
closely at protecting its literal and electronic
borders.
3Market Survey
- NASSCOM predicts requirement of 1,88,000
e-Security professionals by the year 2008. - Lack of entry level courses and certifications in
information security market. - Security compliance is must for all companies
with IT backbone. - ITITES industry requires security experts.
- Cross training people in security is an asset to
any organization. - Information workers lack of basic security
knowledge causes huge financial losses. - NASSCOM points out that IT Security Education is
the need for the hour.
4Information Security hacking market in India
- Reported cases of nearly 15,000 cyber crimes in
India in an year (Source NDTV Profit) - Fastest growing Internet user market
- Among Top 10 countries in terms of cyber crimes
- Cyber security business in India is currently
worth US 1.5 billion - Cyber security business has a high growth rate of
30 percent. - Number of hackers are three times the security
professionals.
5Challenges for e-security education through
e-learning mode
- To impart the education in the traditional
classroom mode or through e-Learning mode. - The type of e-security knowledge required to be
provided. - To categorize the e-security information as per
the requirement of different kinds of users. - To identify the users to whom the e-Security
education is to be provided. - To design the syllabus according to different
user perspectives. - To develop the contents in such a way so as to
enable the learners to understand clearly the
theoretical concepts, practical explanation, real
time solutions etc.
6Importance of e-Learning approach
- e-Learning mode is most effective for users such
as working professionals, students pursuing their
studies etc ,such as - For imparting training with anytime, anywhere,
any place methodology - For broader audience coverage
- 24x7 information content availability
- Click learn technique
- For faster learning in cost effective way
7Relevance of e-Learning methodology to the
e-security education
- Greater need for training to the masses
- Frequent up gradation of content for various
categories of users - Minimum training budgets and learning cost
- Distributed learner base makes classroom training
difficult.
8Current project Design Development of
e-learning contents for e-security solution
developers
- A project of DIT, MCIT (Ministry of
Communications Information - Technology)
9e-learning Facilities available at CDAC
- Resources available
- H/W Fully capable database server, Content
Server, Application Server. - S/W
- Content authoring publishing tools
- Multimedia tools,
- Learning Management System.
- Dedicated team One exclusively dedicated team
for content development.
10Highlights of the project
- Categorization of e-security contents for three
categories of users namely - (I) Postgraduate /Engg. Students
- (II) System Administrators/Officers in charge of
- e- security
- (III) Scientists
- Designed the curriculum of contents for the
three categories of users. - Curriculum approved from eminent e-security
experts and professors
11Content Development Strengths at CDAC
12Architecture for implementation- Deployment of
content
13Use of the e-Learning contents on e-security
- The developed e-Learning contents would provide
various case studies with varying levels of
complexity and security to enable the
understanding of the development of e-security
solutions. - The case studies would be categorized according
to the target group of users and according to the
complexity of the requirements. The case studies
can also feature the existing tools, which can be
modified and updated as per the user requirements.
14Use of the e-Learning contents on e-security
- The contents provide linkage of the case studies
with the inherent algorithm and mathematical
models - Case study Detailed explanation of the
algorithm (crypto algo ) -
? - Number systems
mathematical models involved -
? - Implementation of the algorithm in a sample
application using programming language -
? - Usage of the
application as a e- security solution
15Conclusion
- The developed contents for students (first
category of users ) would be available in a
couple of months, for the use of public and
masses. - The motive is to educate as many people as
possible at their own pace, place and time ,
which would be effectively possible through
e-learning mode. - It is thus expected from various Engg. Colleges ,
Educational institutions and Industries
imparting training to obtain the registration for
accessing the developed advanced e-security
contents through e-learning mode.
16Implementation
Student Registers
Student is assigned UserId and Password
Log into Content server at C-DAC Noida and attend
contact sessions
Personal Page
Content Server provided by C-DAC Noida
Practice sessions simulating lab sessions
Appears for review tests and Online tests
Solved Question Papers
Participates in bulletin board
Working models and Interactive Quiz