Report for the workshop “Security on the Internet”


The main goal of the workshop was to introduce participants to common attacks from Internet, how to achieve protection from those attacks, and the steps that need to be carried out in order to lower security risk on personal computer.

Main audiences for workshop were users of single personal computer and small home or office networks (SOHO networks). In order to create more specialized workshop for the participants the online questioner was created. Based on the information provided in responses to the questioner, topics are chosen from which the workshop was created.

Key concepts

Workshop was based on a 10 security rules, created in a way to be easily memorized.  Covered topics were:
•    The concept of administrative privileges
•    User accounts and their passwords
•    Firewalls
•    Antimalware software
•    Security of Internet Browsers
•    Maintenance of operating system and application (updates, patches, hotfixes, etc.)
•    The concept of identity on the Internet and how to secure it
•    Wireless access to networks – how to secure it.
•    Tips and tricks on how to secure your daily webadmin tasks.
•    Tips how to stay healthy


The workshop was divided into 4 sessions. The topics of the first 3 sessions were grouped around key concepts. Each of these sessions consisted of 4 parts:

•    part 1 – input session – introducing the key concepts (e.g. administrative privileges, malware software, firewall, etc.) by using the overhead projector (OHP)
•    part 2 – providing step-by-step instructions on how to perform discussed tasks on participants’ PC by using the OHP
•    part 3 – inviting questions and providing the answers, clarifying the concepts that might have remained unclear
•    part 4 – open discussion – facilitating the exchange of participants’ experiences in various fields, referring them back to what was discussed in the theoretical part of the workshop

The fourth session was devoted to participants’ questions on the topics that were not covered in the workshop. The participants described the security problems they encountered in their every day use of computers, and the instructor elicited solutions by referring them back to the ’10 rules’ that were made available for the participants’ attention at all times.

Throughout the workshop, a lot of real-world examples were provided.

Observations on the group

The group was highly responsive and actively participated. Most participants were able to keep their attention span throughout the whole workshop. During the evaluation session, the participants stated that all terms and concepts were clear and that they were satisfied with the amount of information and knowledge they were provided with in the workshop.

When asked if the instructor’s presentation could have been more effective, the participants stated they were satisfied with the way it was carried out and they said they would not change anything.

The instructor’s observation was that the workshop lacked interaction at times due to technical and the lack of equipment.

Leave a Reply

Your email address will not be published. Required fields are marked *