{"id":376,"date":"2011-04-19T12:31:44","date_gmt":"2011-04-19T11:31:44","guid":{"rendered":"http:\/\/gayecho.com\/glic\/?p=376"},"modified":"2016-08-07T11:24:45","modified_gmt":"2016-08-07T10:24:45","slug":"report-for-the-workshop-%e2%80%9csecurity-on-the-internet%e2%80%9d","status":"publish","type":"post","link":"http:\/\/gayecho.com\/glic\/report-for-the-workshop-%e2%80%9csecurity-on-the-internet%e2%80%9d\/","title":{"rendered":"Report for the workshop \u201cSecurity on the Internet\u201d"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"http:\/\/gayecho.com\/glic\/wp-content\/uploads\/2011\/03\/security-in-a-box.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-371\" title=\"security-in-a-box\" src=\"http:\/\/gayecho.com\/glic\/wp-content\/uploads\/2011\/03\/security-in-a-box.jpg\" alt=\"\" width=\"640\" srcset=\"http:\/\/gayecho.com\/glic\/wp-content\/uploads\/2011\/03\/security-in-a-box.jpg 550w, http:\/\/gayecho.com\/glic\/wp-content\/uploads\/2011\/03\/security-in-a-box-300x113.jpg 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><\/p>\n<p><strong>Goals<\/strong><\/p>\n<p>The main goal of the workshop was to introduce participants to common attacks from Internet, how to achieve protection from those attacks, and the steps that need to be carried out in order to lower security risk on personal computer.<\/p>\n<p>Main audiences for workshop were users of single personal computer and small home or office networks (SOHO networks). In order to create more specialized workshop for the participants the online questioner was created. Based on the information provided in responses to the questioner, topics are chosen from which the workshop was created.<!--more--><\/p>\n<p><strong>Key concepts<\/strong><\/p>\n<p>Workshop was based on a 10 security rules, created in a way to be easily memorized.\u00a0 Covered topics were:<br \/>\n\u2022\u00a0\u00a0 \u00a0The concept of administrative privileges<br \/>\n\u2022\u00a0\u00a0 \u00a0User accounts and their passwords<br \/>\n\u2022\u00a0\u00a0 \u00a0Firewalls<br \/>\n\u2022\u00a0\u00a0 \u00a0Antimalware software<br \/>\n\u2022\u00a0\u00a0 \u00a0Security of Internet Browsers<br \/>\n\u2022\u00a0\u00a0 \u00a0Maintenance of operating system and application (updates, patches, hotfixes, etc.)<br \/>\n\u2022\u00a0\u00a0 \u00a0The concept of identity on the Internet and how to secure it<br \/>\n\u2022\u00a0\u00a0 \u00a0Wireless access to networks &#8211; how to secure it.<br \/>\n\u2022\u00a0\u00a0 \u00a0Tips and tricks on how to secure your daily webadmin tasks.<br \/>\n\u2022\u00a0\u00a0 \u00a0Tips how to stay healthy<\/p>\n<p><strong>Methodology<\/strong><\/p>\n<p>The workshop was divided into 4 sessions. The topics of the first 3 sessions were grouped around key concepts. Each of these sessions consisted of 4 parts:<\/p>\n<p>\u2022\u00a0\u00a0 \u00a0part 1 &#8211; input session &#8211; introducing the key concepts (e.g. administrative privileges, malware software, firewall, etc.) by using the overhead projector (OHP)<br \/>\n\u2022\u00a0\u00a0 \u00a0part 2 \u2013 providing step-by-step instructions on how to perform discussed tasks on participants&#8217; PC by using the OHP<br \/>\n\u2022\u00a0\u00a0 \u00a0part 3 \u2013 inviting questions and providing the answers, clarifying the concepts that might have remained unclear<br \/>\n\u2022\u00a0\u00a0 \u00a0part 4 \u2013 open discussion &#8211; facilitating the exchange of participants&#8217; experiences in various fields, referring them back to what was discussed in the theoretical part of the workshop<\/p>\n<p>The fourth session was devoted to participants\u2019 questions on the topics that were not covered in the workshop. The participants described the security problems they encountered in their every day use of computers, and the instructor elicited solutions by referring them back to the &#8217;10 rules&#8217; that were made available for the participants\u2019 attention at all times.<\/p>\n<p>Throughout the workshop, a lot of real-world examples were provided.<\/p>\n<p><strong>Observations on the group<\/strong><\/p>\n<p>The group was highly responsive and actively participated. Most participants were able to keep their attention span throughout the whole workshop. During the evaluation session, the participants stated that all terms and concepts were clear and that they were satisfied with the amount of information and knowledge they were provided with in the workshop.<\/p>\n<p>When asked if the instructor&#8217;s presentation could have been more effective, the participants stated they were satisfied with the way it was carried out and they said they would not change anything.<\/p>\n<p>The instructor\u2019s observation was that the workshop lacked interaction at times due to technical and the lack of equipment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Goals The main goal of the workshop was to introduce participants to common attacks from Internet, how to achieve protection from those attacks, and the steps that need to be carried out in order to lower security risk on personal computer. Main audiences for workshop were users of single personal computer and small home or &hellip; <\/p>\n<p class=\"link-more\"><a href=\"http:\/\/gayecho.com\/glic\/report-for-the-workshop-%e2%80%9csecurity-on-the-internet%e2%80%9d\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Report for the workshop \u201cSecurity on the Internet\u201d&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-376","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/posts\/376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/comments?post=376"}],"version-history":[{"count":7,"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/posts\/376\/revisions"}],"predecessor-version":[{"id":720,"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/posts\/376\/revisions\/720"}],"wp:attachment":[{"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/media?parent=376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/categories?post=376"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/gayecho.com\/glic\/wp-json\/wp\/v2\/tags?post=376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}