Holistic security - Communications Security
From Gender and Tech Resources
Revision as of 22:31, 19 July 2015 by Eva (Talk | contribs) (Created page with "{{Tutorial |Title of the tutorial=Communications Security: an introduction |Kind of learning session=Holistic |Tutorial category=Discussion |Duration (hours)=1h 20m |Learning...")
Title of the tutorial | Communications Security: an introduction |
---|---|
Attributions | |
Kind of learning session | Holistic |
Tutorial category | Discussion |
Duration (hours) | 1h 20m "h20m" can not be assigned to a declared number type with value 1.
|
Learning objectives | Create understanding of how communications work and it's inherent insecurities in a non technical way. Provide a framework for approaching digital security and communications in general. |
Prerequisites | This session can be an introduction to several topics with some minor modifications on the content and focus. Some related sessions that this can be of use as an introduction could include:
|
Methodology | [[Methodology::== Activity & Discussion (Option I): What is the Internet? (20 minutes) ==
Keyword identification activity. This activity starts off with a word-association game, similar to “What is Security”. Step 1. Ask the participants to share words that come to their mind when they hear the word "Internet". Encourage participants not to 'hold back' but to respond as spontaneously as possible, without thinking Step 2. the facilitator jots the words down on a flip-chart paper or a whiteboard. Step 3. Highlight the words which arise from the group which are related to communications. The idea for the activity is to emphasize that most of the activities that we do on the Internet are largely about communications. There has to be some agreement with the participants that this is the case. If there are are other ideas you can proceed to have a discussion to provide further clarification and arrive at some agreement/s and consensus. Activity & Discussion (Option II): The postal service. (30 minutes)Step 1. Divide participants into three groups: two groups of human rights defenders/journalists who need to communicate with one another, and one group who are the 'postal service'. Step 2. Tell participants that we are going back in time to before the internet. How did we communicate back then? With the postal service! Step 3. Give the two groups of HRDs materials including: postcards, sheets of white and coloured paper, pens, sellotape, stickers, etc. Instruct each group that they have to send a message to the other group, and they have to use the postal service. They will need to write a message, and include the sender, recipient, etc. When the message is written, they can call the postal service to come and collect the letter and they will deliver it. Step 4. While these two groups are writing, instruct the postal service group to gather as much data as possible about the messages. Step 5. After the first round of communications is complete, allow one more, and remind the HRDs to look at the other materials to find ways of protecting their communication, if they feel it might be monitored. Discussion: After a couple of rounds of communication, ask the postal service to report back on what information they gathered. How did they get this information? How did the HRDs attempt to protect it – what were the advantages and disadvantages of each method?]] |
Number of facilitators involved | 1 |
Technical needs | Flipchart, whiteboard, postcards/paper, coloured paper, stickers, pens, markers |
Theoretical and on line resources | xx |