Threat analysis - Information Mapping I
From Gender and Tech Resources
Revision as of 10:16, 29 July 2015 by Eva (Talk | contribs) (Created page with "{{Tutorial |Title of the tutorial=Information Mapping Part 1 |Duration (hours)=90m |Learning objectives=x |Prerequisites=x |Methodology=Methodology == Activity 1: Mapping I...")
| Title of the tutorial | Information Mapping Part 1 |
|---|---|
| Attributions | |
| Kind of learning session | |
| Tutorial category | |
| Duration (hours) | 90m "m" can not be assigned to a declared number type with value 90.
|
| Learning objectives | x |
| Prerequisites | x |
| Methodology | Methodology
Activity 1: Mapping Information At Rest (30 minutes)Explain to participants that we're going to conduct an information mapping activity to get a sense of where our important information actually is. |
| Number of facilitators involved | 1 |
| Technical needs | Flipchart, sticky notes, pens, markers, comic timing |
| Theoretical and on line resources | Holistic Security Guide
Security in a Box. https://securityinabox.org Level-up: https://level-up.cc |