Holistic security - Communications Security

From Gender and Tech Resources

Revision as of 22:31, 19 July 2015 by Eva (Talk | contribs) (Created page with "{{Tutorial |Title of the tutorial=Communications Security: an introduction |Kind of learning session=Holistic |Tutorial category=Discussion |Duration (hours)=1h 20m |Learning...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Title of the tutorial Communications Security: an introduction
Attributions
Kind of learning session Holistic
Tutorial category Discussion
Duration (hours) 1h 20m
"h20m" can not be assigned to a declared number type with value 1.
Learning objectives Create understanding of how communications work and it's inherent insecurities in a non technical way. Provide a framework for approaching digital security and communications in general.
Prerequisites This session can be an introduction to several topics with some minor modifications on the content and focus. Some related sessions that this can be of use as an introduction could include:
  • mobile security
  • how the internet and mobiles work
Methodology [[Methodology::== Activity & Discussion (Option I): What is the Internet? (20 minutes) ==

Keyword identification activity. This activity starts off with a word-association game, similar to “What is Security”.

Step 1. Ask the participants to share words that come to their mind when they hear the word "Internet". Encourage participants not to 'hold back' but to respond as spontaneously as possible, without thinking

Step 2. the facilitator jots the words down on a flip-chart paper or a whiteboard.

Step 3. Highlight the words which arise from the group which are related to communications. The idea for the activity is to emphasize that most of the activities that we do on the Internet are largely about communications. There has to be some agreement with the participants that this is the case. If there are are other ideas you can proceed to have a discussion to provide further clarification and arrive at some agreement/s and consensus.

Activity & Discussion (Option II): The postal service. (30 minutes)

Step 1. Divide participants into three groups: two groups of human rights defenders/journalists who need to communicate with one another, and one group who are the 'postal service'.

Step 2. Tell participants that we are going back in time to before the internet. How did we communicate back then? With the postal service!

Step 3. Give the two groups of HRDs materials including: postcards, sheets of white and coloured paper, pens, sellotape, stickers, etc. Instruct each group that they have to send a message to the other group, and they have to use the postal service. They will need to write a message, and include the sender, recipient, etc. When the message is written, they can call the postal service to come and collect the letter and they will deliver it.

Step 4. While these two groups are writing, instruct the postal service group to gather as much data as possible about the messages.

Step 5. After the first round of communications is complete, allow one more, and remind the HRDs to look at the other materials to find ways of protecting their communication, if they feel it might be monitored.

Discussion: After a couple of rounds of communication, ask the postal service to report back on what information they gathered. How did they get this information? How did the HRDs attempt to protect it – what were the advantages and disadvantages of each method?]]

Number of facilitators involved 1
Technical needs Flipchart, whiteboard, postcards/paper, coloured paper, stickers, pens, markers
Theoretical and on line resources xx