• Keine Ergebnisse gefunden

CHANGING TECHNOLOGY REQUIRES CHANGES TO THE ITC SECURITY EDUCATION

N/A
N/A
Protected

Academic year: 2022

Aktie "CHANGING TECHNOLOGY REQUIRES CHANGES TO THE ITC SECURITY EDUCATION"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

CHANGING TECHNOLOGY REQUIRES CHANGES TO THE ITC SECURITY EDUCATION

Juhani Anttila, Jorma Kajava and Juha E. Miettinen

Sonera Corporation Helsinki FINLAND Juhani.Anttila@sonera.com

Jorma.Kajava@oulu.fi Juha.E Miettinen@sonera.com

Abstract:To understand the genious needs of information security edu- cation, we must first analyze the present situation of technology and changes beeing taking place. Security education is currently strongly re- lated to technical solutions in hardware, software and various kinds of protocols and relies heavily on encryption. People must be trained to take advantage of these solutions. Within the next two years, however, techni- cal solutions will be embedded into the basic structure of the next genera- tion of protocols, such as IPv6. This means that security will soon be transparent and requires no extra activities to be undertaken by end- users. As a result, security education in its classical formulation loses a lot of its relevance.

If security education is to keep up with the development, security edu- cation must take a step forward. Information systems, software, hard- ware and various combinations thereof have become highly complicated.

A prime example of such a system is the Internet. It is characteristic of complicated systems that changes in one component lead to correspond- ing changes in other components. If this trend continues, less and less time can be spent on actual system management.

Some researchers claim that information can be divided into two classes, namely, explicit (5%) and tacit information (95%). Explicit infor- mation consist of all printed and electronic material, while tacit informa- tion refers to all other forms of information that are stored chiefly in human brains.

Information security education is experiencing a paradigm shift from technical details to a focus on human aspects. In the future, information security awareness will increase in importance and a great part of this process will inevitably be based on tacit knowledge. In the organizational perspective this translates into stronger co-operation between organiza- tions and culture - and security education must lead the way.

20 Management of Universities

Referenzen

ÄHNLICHE DOKUMENTE

cent of either test distribution is associated with a positive premium for some post-school qualifications. The third paper focuses on sequences of post-school

The GPhC is now developing a plan to finalise the revised standards and reform the five years of initial education and training in light of the proposals and broad cross-profession

The Council on Foreign Relations (CFR) is an independent, nonpartisan membership organization, think tank, and publisher dedicated to being a resource for its members,

Der frühere Direktor des Berliner Wissenschafts- kollegs, Peter Wapnewski, betont zu Recht, dass auch Demokratien Eliten brauchen: Eine Elite, die sich nicht definiert durch

The negative age compositional effect, however, had already begun to attenuate the increase, meaning that crude female labor force participation rates would have been even

We therefore apply the same decomposition methodology as in the previous section to disentangle in a second step the change in age-specific labor force participation into the

It shows that robustness of solutions in security management can be achieved by developing new stochastic optimization tools for models with uncertain multi-dimensional

The communication protocols employed by desktop sharing or remote administration tools fall into two classes: First, protocols that need a direct connection between the accessed and