Threat analysis - Information Mapping II

From Gender and Tech Resources

Revision as of 17:54, 6 August 2015 by Eva (Talk | contribs) (Created page with "{{Tutorial |Title of the tutorial=Information Mapping Part 2 |Duration (hours)=90m |Learning objectives=Attitudes Critical thinking about threats to sensitive information as...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Title of the tutorial Information Mapping Part 2
Attributions
Kind of learning session
Tutorial category
Duration (hours) 90m
"m" can not be assigned to a declared number type with value 90.
Learning objectives Attitudes

Critical thinking about threats to sensitive information as it is transferred digitally Knowledge Understanding of the how data travels electronically and the points at which it can be subjected to surveillance Adding important actors including internet service providers, online service providers etc. to the actor maps Basic threats to information in motion & framework for responses Skills Basic information mapping

Prerequisites x
Methodology x
Number of facilitators involved 1
Technical needs Flipchart/Whiteboard, markers, envelopes, postcards/small sheets of paper, pens, cipher OR two small boxes with keys
Theoretical and on line resources Holistic Security Guide

Security in a Box https://securityinabox.org