Cybersecurity Is Childsplay

A school in Estonia has started a pilot project to teach the basics of cybersecurity to teenagers.

In the spring of 2007, Estonia had a disagreement with Russia about plans to move a World War II Soviet war memorial within the capital city, Tallinn. The controversy resulted in two nights of mass riots.

At the same time, Estonia suffered a series of cyberattacks. The scale of these attacks was unprecedented. Targets included public- and private-sector organizations and institutions, including Estonian ministries, parliament, broadcasters, newspapers, and banks.

The attacks were sophisticated and well constructed, consisting of various strategies and methods, such as DDoS attacks, ping floods, botnets, spamming, and website defacements.

Since the 2007 attacks, Estonia's private and public sector, often working together, have heavily increased the security of the country's IT systems and built stronger authentication services, firewalls, and backup systems.
Under a new plan known as 'data embassies', duplicates of essential databases and services stored or run from secure data-centres on foreign soil.
        
These efforts and Estonia's growing expertise in that field have been noticed worldwide, and in 2008, NATO's Cooperative Cyber Defence Centre of Excellence, or CCDCOE, was established in Tallinn.
    
There have also been new initiatives in the education system. One school in the small town of Põltsamaa has started a pilot course on how to defend systems against cyberattacks.

As well as studying the conventional subjects, 16 boys and one girl are now also being taught the rudiments of cybersecurity and cryptography.
According to Tiia Mikson, deputy head-teacher at Põltsamaa Gymnasium, the pupils have been studying the first introductory course in cybersecurity called 'information society'.

"During this course our students have already visited NATO's Cyber Defence Centre in Tallinn, e-Estonia Showroom, and TRÜB, which is the company that produces Estonian ID cards. They've also attended a lecture given by the specialists of Information System Authority (RIA)," Mikson says, adding that the first course was developed in cooperation with RIA specialists.

"Soon we're going to have a lecture via Skype where our alumnus Erki Kert is going to talk from London about his company, Big Data Scoring, and about the collection and usage of big data."

The school is keen to apply new approaches and technologies in its curriculum. Other students are taking courses in the basics of programming, 3D modeling, robotics based on Arduino kits, cloud services, and technical drawing.

The school is working with its partners from the University of Tartu and voluntary national organization, the Estonian Defence League, in developing the next courses, which cover the basics of Internet security, digital security, cryptography, and an introduction to mechatronics.

According to Mikson, after successfully finishing those four courses, students should have a basic knowledge of cybersecurity. They should be able to spot the most frequently used types of attacks and know how to deal with them, how to protect devices, and understand cryptography, and the use of basic cryptography tools in everyday internet activities.

The pilot scheme grew out of collaboration with the Estonian Defence League, whose representatives approached the school at the beginning of 2015, suggesting an after-school activity program where students could get practical experience with technology, such as flying drones, as well as theory classes.

"The drones brought up the issue of safety, and then we started to talk about cybersecurity in general. After that, we came up with the idea of introducing the subject into our curriculum and started to look for partners," Mikson says.

In 2007, Estonia was the victim of a high profile campaign of state-sponsored online attacks. Now, years later, the country is promoting cybersecurity via a series of initiatives at home and abroad.
            
"Young people can be really clever when using the Internet, but they have to know how to act without endangering others and defend themselves when needed," she says.

"Also, we need specialists, in the case of a so-called cyber war. The earlier we teach this, the better specialists we'll have. Even if only a few of them are going to end up as cybersecurity specialists, it's still a big thing for us."

Siim Alatalu, international relations adviser at NATO's Cooperative Cyber Security Centre of Excellence, argues that it's imperative for a modern society to have an enhanced understanding and awareness of cyber in the broadest sense, both of the challenges as well as the solutions and the way forward.

"Within this project, we're only one of the many contributors, alongside several Estonian institutions. Yet we welcome the initiative by Põltsamaa Ühisgümnaasium that provides its future graduates with a good insight into a key topic, not only for Estonia" he says.

"Regardless of the students' future career plans, an enhanced awareness of cyber issues benefits anyone."

According to deputy head-teacher Mikson, a few students have already been inspired by the courses and are planning to continue studies at university level -- and some are even helping to introduce the cybersecurity program in other schools too.

Ein News: http://bit.ly/1QBFJrh

« Facebook Uses AI To Map People's Homes
Ex CIA Director: Keep America Safe, Embrace Drone Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The Josef Group (TJG)

The Josef Group (TJG)

The Josef Group Inc. is a certified woman-owned permanent staffing agency specializing in Information Technology, Engineering, and US Government "cleared" IT candidates.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

ZainTech

ZainTech

Zaintech is a regional digital & ICT solutions provider offering comprehensive digital solutions and services to enterprise and government customers in the MENA region.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.