Threat analysis - Information Mapping II
From Gender and Tech Resources
Revision as of 17:54, 6 August 2015 by Eva (Talk | contribs) (Created page with "{{Tutorial |Title of the tutorial=Information Mapping Part 2 |Duration (hours)=90m |Learning objectives=Attitudes Critical thinking about threats to sensitive information as...")
Title of the tutorial | Information Mapping Part 2 |
---|---|
Attributions | |
Kind of learning session | |
Tutorial category | |
Duration (hours) | 90m "m" can not be assigned to a declared number type with value 90.
|
Learning objectives | Attitudes
Critical thinking about threats to sensitive information as it is transferred digitally Knowledge Understanding of the how data travels electronically and the points at which it can be subjected to surveillance Adding important actors including internet service providers, online service providers etc. to the actor maps Basic threats to information in motion & framework for responses Skills Basic information mapping |
Prerequisites | x |
Methodology | x |
Number of facilitators involved | 1 |
Technical needs | Flipchart/Whiteboard, markers, envelopes, postcards/small sheets of paper, pens, cipher OR two small boxes with keys |
Theoretical and on line resources | Holistic Security Guide
Security in a Box https://securityinabox.org |