Digital Safety and Cyber Security Curriculum | IGF 2023 Launch / Award Event #71

12 Oct 2023 06:15h - 07:15h UTC

Event report

Speakers:
  • Dr. Ahmed Nour, The Head of Creators Union of Arab, Intellectual Property Expert, UAE
  • Dr. Nermin Selim, Secretary General, Intellectual Property Expert, UAE
  • Dr. Hala Adly Hussein, Secretary General of Women Affairs, Supply chain Expert, Egypt
  • Dr. Nabeih Abdelmajid, Professor in the Cyber Security, the owner of Security Circle Group & the Digital Safety and Cyber Security Curriculum, UAE & United Kingdom
  • Eng. Asaad Kazkaz, Communications Engineering Consultant, Syria & UAE
Moderators:
  • Mr. Shebl Albarazi

Table of contents

Disclaimer: It should be noted that the reporting, analysis and chatbot answers are generated automatically by DiploGPT from the official UN transcripts and, in case of just-in-time reporting, the audiovisual recordings on UN Web TV. The accuracy and completeness of the resources and results can therefore not be guaranteed.

Full session report

Audience

During a discussion on the ethics of cybersecurity, a student from Nepal studying for a master’s degree raised a question regarding the ethical concentration within the field. The specific focus of inquiry was on issues related to hacking and privacy. The student displayed a neutral sentiment, highlighting the need to consider ethical implications in cybersecurity.

Another individual also expressed concern about the ethical aspect of cybersecurity, displaying a positive sentiment. This person emphasized the importance of addressing the ethical dimension within the industry. Both speakers stressed that cybersecurity professionals should be mindful of the ethical considerations associated with hacking and privacy.

The discussion brought attention to the fact that ethical considerations in cybersecurity, particularly pertaining to hacking and privacy, are becoming increasingly important. It highlighted the need for cybersecurity professionals to operate within a framework that not only protects systems and data but also upholds ethical standards. By addressing these concerns, the industry can ensure that security measures are implemented in a responsible and ethical manner.

Overall, the discussion shed light on the growing recognition of the ethical dimension in cybersecurity and the need to address it within the industry. With cybersecurity playing an increasingly crucial role in our digital society, it is essential to prioritize ethical considerations alongside technical expertise to protect and safeguard individuals’ privacy and security.

Nabeih Abdel-Majid

There is a critical need for cybersecurity education, particularly for children and parents, as a significant percentage of students are using social media and the internet without proper knowledge of potential security risks. Many students believe that social media sites are safe and trustworthy, exposing them to potential dangers. This highlights the importance of educating children and parents about cybersecurity to protect their personal information and online presence.

A proposed curriculum has been developed that covers various aspects of cybersecurity, including social network security skills, file backup, password management, and web browsing skills. The curriculum is designed to be interactive and engaging, using videos and interactive screens to provide a comprehensive learning approach. It is not only targeted at children but also includes modules for educators and parents, emphasizing the need for a community-based approach to increase cybersecurity awareness and action.

Dr. Nabeih has been working on this curriculum for seven years, demonstrating his dedication and expertise in the field. Now, his aim is to share this curriculum with educational institutions to ensure that children and their parents receive proper cybersecurity education. The curriculum has been designed to safeguard children and maintain their self-confidence in the digital world.

Parents play a vital role in implementing this curriculum and protecting their children online. As such, they are encouraged to actively participate in the learning process and be aware of potential digital threats. Nabeih Abdel-Majid’s platform for the curriculum includes a survey for assessing the levels of knowledge and offers courses in multiple languages, catering to a wider audience.

However, there may be some challenges in implementing the curriculum. During the presentation, Nabeih faced trouble connecting to Wi-Fi, which highlights the need for reliable internet access to deliver cybersecurity education effectively. Additionally, structured learning sessions are necessary to ensure that students receive proper guidance and support throughout the learning process.

The curriculum also focuses on preserving privacy and emphasizes the importance of controlling personal data. It teaches students how to safeguard their personal accounts on platforms like WhatsApp and Google to prevent unauthorized access.

Furthermore, the curriculum includes review questions for the purpose of understanding rather than examination. This approach aims to reinforce learning and ensure that students fully comprehend the concepts taught.

A new learning program is being piloted, demonstrating a commitment to continuously improving the curriculum and its educational impact. It places a strong emphasis on cooperation between teachers, students, and program creators. The ultimate goal is to create a secure community where individuals are well-equipped with the necessary cybersecurity knowledge and skills.

The curriculum is targeted at children from grade 5 to grade 11, covering different levels suitable for each grade. Parents are recognized as crucial participants in the educational program and are required to attend group sessions along with their children. This collaborative approach ensures the involvement of parents in protecting their children online.

It is important to note that students can still find ways to circumvent digital restrictions despite cybersecurity measures being in place. Therefore, parents must actively watch their children and offer support and guidance against digital threats.

The project has received accreditation from KHD in Dubai and is seeking recommendations from the IGF to expand its implementation to different communities. This indicates the recognition and confidence in the curriculum’s effectiveness.

Overall, there is a clear need for cybersecurity education for children and parents. The proposed curriculum developed by Dr. Nabeih addresses this need comprehensively. With the involvement of parents and educators, a community-based approach can be adopted to increase cybersecurity awareness and action. Challenges such as reliable internet access and structured learning sessions need to be overcome to effectively implement the curriculum. The goal is to create a secure community, empower children with cybersecurity knowledge, and ensure their safety online.

Hala Adly Hussain

Blockchain technology is highly regarded for its ability to safeguard valuable data and assets from cyber criminals. It operates as a decentralised system that upholds principles of security, privacy, and trust. The architecture of blockchain allows for monitoring of ledgers, enabling the identification of any unusual or malicious activity. Furthermore, the implementation of smart contract security on the blockchain ensures that payment processes become more convenient and secure.

There are two prominent types of blockchain: public and private. Public blockchains, such as Bitcoin, operate on an open network, allowing anyone to participate in transactions. These transactions are validated using public key encryption, ensuring transparency and accountability. On the other hand, private blockchains offer more control, as entry to the network is restricted and heavily reliant on identity control through digital certificates.

In order to successfully implement blockchain technology, education and regulation play vital roles. It is necessary to conduct blockchain implementations while adhering to regulatory requirements. This ensures that the technology is utilised in a manner that aligns with legal and ethical standards. Additionally, it is crucial to educate individuals about the potential vulnerabilities of blockchain. By increasing awareness and knowledge, stakeholders can proactively mitigate risks and strengthen the security of the technology.

Moreover, Hala Adly Hussain demonstrates a keen interest in obtaining approval from the Ministry of Education in Jordan for their project. This highlights the significance of seeking validation and involvement from relevant authorities in the implementation of blockchain solutions within the education sector. By having regulatory bodies endorse projects, the credibility and potential impact of initiatives aiming to enhance the quality of education can be maximised.

In conclusion, blockchain technology possesses inherent capabilities that make it a powerful tool for protecting valuable data and assets from cyber threats. Its decentralised nature, coupled with principles of security, privacy, and trust, enhances the integrity and resilience of digital transactions. The availability of public and private blockchains offers flexibility and control over network participation. Education and regulation are instrumental in successful blockchain implementation, ensuring compliance with legal requirements and mitigating potential vulnerabilities. Collaboration with relevant authorities, such as the Ministry of Education, strengthens the credibility and impact of projects within targeted sectors. The power and potential that blockchain technology holds can be harnessed when combined with a comprehensive understanding of its intricacies and a commitment to ethical practices.

Moderator

During the discussion, the importance of integrating an AI Curriculum in education was highlighted. It was emphasized that teachers, parents, and children should all be educated in this curriculum. This is because AI is becoming increasingly prevalent in various fields, and it is essential for individuals to have a solid understanding of AI concepts and applications.

The AI Curriculum was seen as vital, and it was suggested that everyone should actively participate in it. By doing so, individuals can develop the necessary skills and knowledge to effectively utilize AI and stay updated with technological advancements. Moreover, integrating AI Curriculum in education can help bridge the gap between technological advancements and traditional teaching methods, leading to a better educational experience for students.

In addition to AI, the discussion also explored the integration of Blockchain technology into the cybersecurity curriculum. It was suggested that blockchain technology could enhance cybersecurity by countering the efficiency and effectiveness with which cyber criminals apply AI and machine learning in their cybercrimes. Blockchain, being a decentralized system built on principles of security, privacy, and trust, offers benefits such as real-time data delivery, cost-effectiveness, and strong encryption practices.

The importance of protecting children online while maintaining their self-confidence was also emphasized. The AI Curriculum aimed to equip educators, parents, and children with the necessary knowledge and tools to ensure their safety in the digital world. It was deemed crucial for parents to attend sessions and understand how to monitor their children’s online activities discreetly, thus ensuring their safety without compromising their privacy and trust.

Furthermore, a program to enhance community security was launched as a pilot test. This program aimed to support different communities and promote a secure environment through the collaboration of Dr. Ahmed Noura, Dr. Nermin, and other stakeholders. It was acknowledged that cooperation from all members of the community is essential in achieving a truly secure community.

The session also highlighted the significance of different roles with varying privileges in educational programs. By featuring roles such as students, managers, teachers, and site administrators, users can effectively monitor student progress and ensure a well-rounded educational experience.

The importance of monitoring and taking care of students was stressed. It was acknowledged that even in the digital age, where technological advancements can pose risks, it remains crucial to protect students from harm and extortion.

The session also delved into the aspects of privacy control, stopping hacking, and maintaining cybersecurity. Methods for controlling privacy on platforms such as iCloud and Android were discussed, as well as detecting if someone has hacked into personal devices using the camera or microphone. The importance of deleting files to ensure they are not retrievable by others was also highlighted.

Overall, the session concluded with the expression of hope for the implementation of the AI Curriculum in educational institutions. This implementation could effectively protect children and promote safe internet usage. The discussion underscored the need for continuous education and adaptability in the face of technological advancements. By equipping individuals with the necessary skills and knowledge, society can navigate the digital landscape securely and confidently.

Video

The analysis explores various arguments and topics related to cybersecurity, online learning, and digital security. One argument highlights the alarming possibility of devices being hacked without the user’s knowledge. This emphasises the need for taking necessary preventive measures. It is stated that many programmes have the ability to breach and sneak into your device, allowing them to start monitoring you without your knowledge. This raises concerns about privacy and the security of personal information.

Another argument discusses the alarming capability of hacking programmes to remotely control a device’s camera. This invasion of privacy poses significant risks and underscores the importance of safeguarding digital devices from potential breaches. The analysis further suggests implementing measures to ensure digital security and privacy, such as using internet-safe browsing and adopting strong personal digital security habits. The evidence provided includes the capability of hacking software to greatly affect a device if preventive measures are not taken.

Furthermore, the analysis highlights the importance of cybersecurity awareness, particularly in the education sector. It mentions that a teacher emphasises the significance of cybersecurity awareness in their classes. This observation reflects the growing recognition of the need to educate individuals about cybersecurity risks and the measures they can take to protect themselves.

In addition to cybersecurity, the analysis touches upon other topics as well. It mentions the creation of interactive screens and the use of QR codes for testing purposes. Creating interactive screens can enhance user engagement, while QR codes can provide a convenient and efficient way for testing.

The analysis also addresses online learning and its benefits. It highlights how online learning allows students to repeat sessions as much as needed and have personalised access to lessons from home through unique usernames and passwords. This flexibility enables students to learn at their own pace, which is a significant advantage of online learning.

Furthermore, it is noted that online learning sessions are structured and divided into different sub-sessions. This provides a systematic approach to learning and enables students to navigate through the content more effectively.

Regarding online privacy, the video suggests using the WhatsApp application and opening Google accounts through the browser to preserve user privacy in online learning environments. This highlights the importance of implementing measures to maintain privacy and protect personal information in the digital realm.

In conclusion, the analysis sheds light on several important aspects of cybersecurity, digital security, and online learning. It underscores the need for preventive measures to safeguard against hacking, the importance of cybersecurity awareness, and the benefits of online learning. It also highlights the significance of implementing measures to maintain online privacy and personal digital security. Overall, these insights provide valuable information for individuals and institutions in navigating the digital landscape safely and securely.

Session transcript

Moderator:
perhaps. If she can launch it again. Steemed attendees, allow me to welcome you on behalf of the creators union of Arab the consultative status of the economic and social Council of the United Nations, and we are delighted to have H.D.T.C. training center as our strategic partner, which has grandly contributed to spreading awareness about the importance of this curriculum among the A.I. revolution, assuring the need to educate teachers, parents, and most importantly, the children, who are the core of this curriculum. And we extend a welcome to all whom attending our session, even in person or online. Let me extend a welcome to our distinguished speakers in this session. In my right hand, Dr. Ahmed Noor, the president of the creators union of Arab the Arab media union, and on my left hand, Dr. Nabiha, a professor at the colleges of technological science in the United Arab Emirates, who is the intellectual property owner to the digital safety and cyber security circulated, which will be presented in our session today. And we welcome also our speaker from Egypt, Dr. Hala Adly Hussain, the secretary general of I’m pleased to welcome to the session the secretary-general of the Arab League, the secretary-general of the Union of Arab Women Leaders, the member of the state of Arab League. The session will address several key points. The mission of this curriculum is its implementation objectives and its impact on achieving safe Internet usage, and we will discuss the role of the supply chain in the development of the Internet. We will start with a brief outline of the agenda of this session. We will start with the welcoming word by Dr. Ahmed Noor, then the intervention of Dr. Hala Adel Hussain, who will be joining us online, and last but not least, we will share Dr. Nabeeh’s journey with the digital safety and cybersecurity curriculum. We will start with the welcoming word by Dr. not least, welcome to all. Thank you. Thank you, Dr. Ahmed. Now we’ll listen to intervention from Dr. Hala Adli-Hussain. I think she’s joining us online. Dr. Hala, are you here?

Hala Adly Hussain:
Yes, I’m with you. Yes, hello. Good morning. Good morning from Egypt. I don’t know.

Moderator:
Good morning. Here in Japan, we are afternoon. Okay. Please have the floor. Thank you.

Hala Adly Hussain:
Okay. Dear Dr. Ahmed Noor, President of the Creators Union of Arab Media Professionals, member of the United Nations, it’s only for me to be part of this valuable conference to discuss the importance of protecting and securing all the information in the name of digital safety and cyber security curriculum. My session today, I’m going to speak about the role of blockchain and how it will protect our valuable data and our business and our assets. The cyber criminals are increasing the frequency and sophistication of cyber attacks by pooling their knowledge and leveraging new technologies. The use of the artificial intelligence and machine learning help them to prepare a cyber crime more efficiently, causing more profound and widespread damage. So the traditional solutions alone are often insufficient to meet modern cyber security challenges. So we must explore other approaches for improving information security, including the blockchain technology. The blockchain technology, according to IBM, is a shared immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. So it is a system for tracking anything with value, securely, transparently, and cost-efficiency. The name of blockchains come from the fact that each transaction is recorded as a block of data, and this block might record one or more data types, such as the quantity, price, or location. These blocks become a chain as the assets move from one owner to the other owner, and the chain contains the details of each transaction, including their time and sequences. So a blockchain can be advantageous to any use case. The whole benefits from secure, transparent, decentralized network, including healthcare, supply chain management, copyrights, and reality, and reality protection, the IOT, Internet of Things, messaging, voting, charity, even the new innovation for drugs, as I am a pharmacist, so it’s very valuable for me to protect the innovation and the know-how from stealing. The blockchain has two types. One of them is the public type, which we all know is the Bitcoin, which remains the most prominent example of the public blockchain. As anyone can join the public blockchain, and can do so any anonymous. This blockchain ecosystem use Internet connected to computer or mobile to validate the transaction and to provide the agreed upon consensus. The consensus here is achieved via Bitcoin mining, using computer resources to solve the cryptographic puzzle to create the proof of work by which to validate each transaction. This is the public blockchain, does not have many identity and access control. So, authentication and verification are largely carried out through public key encryption. In contrast to a private blockchain, which is more important for our business, for our organization, for our data, the private blockchain relies heavily on identity control, mostly through digital certificates, using them to make the blockchain private, through membership and access privilege. Typically, a private blockchain only allows access to known entities and organizations. So the consensus here is achieved on a private blockchain by selective endorsement. Known users with privileged access and permission to verify transactions and maintain ledgers. Due to this tighter control, a private blockchain can be likely to satisfy an industrial regulatory compliance requirement. Also, as we said before, the innovation of the drugs, all the secure data, so that I think it’s more compatible or to be more benefits for the defense army. So it’s very important for them. So cybersecurity is built into blockchain technology because of its inherent nature of being a decentralized system built on principles of security, privacy, and trust. In addition to transparency and cost efficiency and enhanced security, it is fast. Data on blockchain network is delivered in real time, making it useful to anyone who wants to track assets and see transactions in time, such as payments, orders, accounts, or know-how to our drugs. In addition to transparency, it’s cost-effective. It’s important to note that viewing a transaction or transmission may be innocent but due to encryption and serialization process, each record can be slow to upload compared to typical data network. Blockchain have many advantages like decentralization, also collaborative consensus. As blockchain collaborate consensus, algorithm means that it can monitor the ledgers for unusual or malicious activity. Also, the strong encryption practice and the digital signature effectively using a public key infrastructure for validating configuration, modifications, authenticating devices, securing communication, and infrastructure of asymmetric cryptographic keys and digital signature is often core to blockchain technology, providing verification of data ownership and data integrity. The immutable records, nobody can modify a recording on blockchain ledgers. If a record contain an error, it can only be rectified by making another transaction or another block in which case post-transaction will be legible. Nobody can interfere with the data or change any data on the system. Also, the Internet of Things protection, with increasing the application in various industry, devices are often targeted by cybercriminals due to their inherent vulnerability. So blockchain provide additional protection for those using IoT devices. Also, preventing DDoS attacks, distributed denial of service attack aims to overload A server with requests, it requires a focal point to target typically an intellectual property address or a small group of IP addresses, however, a blockchain-based domain named system DNS can remove that single focal point, neutralizing the cyber threats. Also the data privacy is very important, while the transparency is a prime benefit of using blockchain. With everyone able to see immutable transactions, the blockchain network will allow only the trusted network to view the participant transactions. This can be achieved with minimal governance. Furthermore, blockchain leaks the traditional targets sought by cybercriminals, making it more challenging for them to achieve unauthorized access by targeting a privacy rule. Blockchain will protect our contracts as smart contract security. The smart contract security are sets of rules stored on the blockchain that trigger transactions when the conditions are met. This automation makes payment more convenient, blockchain remains secure because its components are tested for authentication, data security, access control, and business logic validation. From the advantages of blockchain, it’s just an implementation of any business system through risk assessment and subsequent management processes are required to ensure the data protection and safety of business systems. So it is very important in the risk assessment management. And regulatory-focused, heavily regulated industries aim to protect the public and critical infrastructure with clear guidelines. regarding the information security. And any blockchain implementation should be carried out with close eye on regulatory required. Also in the disaster recovery plan, it’s very important that the minimum security requirements for blockchain participant and organization implementing a blockchain solution require detailed policies on identifying verification and access management. This is a critical area for blockchain applications since it is potential source, prints and contributes to firm vulnerability. So from my point of view, blockchain has no single point of failure. Every chain is immutable, so no participant can break a link to insert a block. It’s almost impossible to tamper with one of these cryptographic chains because an agreed consensus mechanism validate the accuracy of every transaction in the chain. However, blockchain also face some limitation and risks such as scalability, interoperability, regulation, governance and education. So it’s very important to share with you as the doctor tackle this point to be a curriculum in the school. It’s very important just for all of our students and our parents to be aware of this. Thanks for your kind listening, Dr. Ahmed, Dr. Mian.

Moderator:
Thank you, Dr. Hala Adli-Hussain. The clarification about the role of blockchain to cybersecurity, it will play a very important role in this matter. I think it’s very important to concentrate of blockchain and using it to achieve the cybersecurity. Thank you, Dr. Hala. Now it’s time for our journey with Dr. Nabi Abdel-Majid, Digital Safety Curriculum Owner as IP, Intellectual Property. Get the floor, doctor.

Nabeih Abdel-Majid:
Thank you very much. Thank you for giving me this opportunity to speak about this curriculum here in one of the distinguished events. I would like first of all to thank Dr. Ahmed Nour, the creator of Union of Arab, and the Arab Media Union. Thank you very much for giving me this opportunity. Thank you for Dr. Nermeen also, the secretary manager of the creator Union of Arab. Creator Union of Arab. And I would like also to thank the Higher College of Technology United Arab Emirates. Thank you very much for all the support that you give me. Today, actually, we are talking about something really critical for everyone, because everyone has a child, and everyone has need to know what happening with my kids. So are they using the devices in a safe mode or not? So what I did first of all, I studied the culture of more than one country, like in the Middle East, the Saudi Arabia, and also I studied the culture of United Arab Emirates, and we have a lot of, I have been talked about the number that I saw. So let me go through all these numbers, this study, and just to show you why it’s very important to take care about our children, and what they do actually when they’re using the internet. Are they playing? Are they thought that they are out of the target of hackers? And then we’ll talk about the solution that I’m providing, the curriculum where the students can know exactly, can teach themselves, we can cooperate to rehabilitate the students in a way that they can know exactly what’s happening when they’re using the social media. So what motivates me actually, what I saw of rapid development of information technology and the existing of diversity, an easy way for information. You know now everyone can reach to whatever you need within a few seconds. So it’s so easy to be connected to the internet. Although we have, as we hear, we have more than 2.6 billion, they don’t have a connection, but I’m talking about the other part of the world that has a connection, that they have a connection, but actually they don’t know exactly how to use it in a safe mode. Most of the people. And you know, there has been a high amount among the students to use the social network. Everyone cannot live without the internet, without the connection. Okay, and unfortunately, I have to say that all of the communities, they don’t, most of the communities, let me say, they don’t rehabilitate themselves. They don’t teach themselves first before they go to start using the internet. So that motivates me actually to stop here and take care. Let me study what’s happening in the market. Let me study what’s happening in between the childs in the schools. And one of the most stricken results for the unconscious turnout is the many misguided security practices, as I told you. And the recent successes of these hackers in presenting users’ privacy and extortion. So let me tell you exactly, first of all, the study samples, and what numbers I have. and then what the solution. This is what I’m going to show you today. So the samples actually identify the turnaround degree of using social sites. So how many hours everyone is using the internet daily and identify the students’ goals of using these sites. And I’ll tell you what I found, actually, and then identify percentage of those who have been hacked between the students in the schools. And I want to show you what is the relation between the level of the knowledge and how you are secured, actually. Imagine these hours is not included the hours of studying. So when I asked the students how many hours you use the devices daily, most of them said that more than six hours daily. And the hours of studying using the tablet is not included. So if you add just the hours of studying in the school or at home for studying, it’s going to be more than 12 hours a day. And that’s actually stopped me. What’s happening during these 12 hours? Do we know that as parents what’s happening with our kids? Look at these numbers. I will not read all of this, but I need you to stop with me on what’s happening, actually. So more than 79% of male and female students have more than one account of these sites. I don’t know why. I was asking some of the students why you need to do this. They’re just playing. And around 90% of the students say that it is very difficult to stop using these sites. So it is type of addiction. So it is type of they don’t stop. And 15.2% of the students are choosing fake names when they’re using sites. And also fake gender. Say somebody told that I’m a woman and I’m a man. So why, when I was asking them, why you need to do this? They just play. and they don’t know exactly what that might affect them. So more than 23% indicated that the person information is not real, where it can stop me also. And around 35% of the students confirmed that they had established false relationship through all these sites. I know, definitely sure that you had a lot of cases similar to these cases. But actually what was stopped me sometime that more than 15% indicated that they are being subjected to extortion continuously. And I think most of them, you know, in the Middle East, we have a culture that the women have a special, you know, I mean, privacy. Of course, the privacy is a special for every word, but the extortion 15% means that every 100 student, female student there has been extorted. 15 student of them has been extorted. That’s a big number. It’s a big number, really. And I’m sure that many other hide at this because they shy to say this. And also 22.2 of the students reported that they have been exposed to penetration during their use of these sites. And also 34 of their password have been stolen. 15.2 of the students have stolen their files and their own pictures. So where we are, and that actually stopped me. Look at these numbers. I’m sorry to read because it’s a very important. I need to read all of these numbers because it’s really, I need to all to cooperate to stop what happening with our kids. So 58.8 of the students, they expressed their acceptance to any friendship requested through these sites. So they trust everyone. And this is actually something where it make me stopped. 38.9 believe that all information presented through all these sites. Yeah, it’s, it’s, it’s we can believe it. And around 70% of the students believe the social network sites are safe and trustworthy. See, these numbers actually stopped me. Okay, I can, I can tell you a lot of numbers in this studying. Okay, and these slides, I hope it’s going to be shared with the, the, the site of United Nation of the, sorry, IGF United Nation. So what about the parents now? And also the parents stopped me. Do you know what’s happening with your kids? Are the, can, can you work with the social media and devices as your, as your kids? And when I study this, I found a huge bound between both of them. So, and there is a parallel relation between your level of education and what actually, how can you help your kids against any cases of, of extortion? And this table can, can show you that if your level of education high, then your fare will be low and the opposite to try it. And this is how many, if you high, how many case you found with your kids and how many cases so you help them. So it’s, it’s around like 70% of the cases, parents can help their kids if they will educate it, how to use the social media. And, and that’s actually make me decide that to solve the problem that is not only for the kids, you should not target only the kids. Actually, you have to target a different part of the community. The first one is kids. The second one is parents and also the educators, okay, in the schools. So if, if we cooperate all of these parts of the community, then we definitely will help the world to be more secure and the people being sure that how we, we’re going to use this social media. So what we need actually, a curriculum, and this curriculum that I created with the fully support of Arabic Creator and HDTC and also high accuracy of technology. A curriculum which is connected with a platform with videos and interactive screens. So we teach the students step by step how we know that this website is fake or not. How we know that this is somebody opening my account or not. And also we targeting the parents to help them to watch their kids in order to know exactly is somebody trying to attack my kids, to extort my kids or not. So we create this curriculum in three different levels. We’re starting from introduction to information security, going to operating system. Why we have to update operating system. Personal account management skills. I have to increase your skills, okay, to build your skills in a way that you can secure yourself. And social network security skills. And then early intrusion detection. So there’s some signs I have to teach the students. If you saw this, then you ought to be attacked. Take care. And then web browsing skills. And then we move to preventing electronic extortion and then external control. This is all for the first level. Of course, more details we have, and I can share it with you. The second level, we’re talking about file backup. How we know that if I delete something, then it is deleted. And no one can retain it back. It’s type of privacy. And how I have a backup and a lot of details about the privacy and control application activities and hide my moving in the Internet so no one can track me. And the last one is how to control. The last level is how to control your account iCloud or Android or any other cloud. So we start by iCloud. Management skills. Because I do believe that. The systems, the tools, has a lot of features, but actually the people doesn’t know all of these. We know how to use this mobile. We know how to start calling somebody, but how to hide my call, how to hide myself, how to be sure that no one observing me, this is the challenge actually to build the knowledge for the community. So these three levels, actually in order to what? We need a comprehensive program from basic to advanced in order to move up all the community and we need to develop a leader in cybersecurity experts. I’m dreaming in one day that we have a student before you go to the university, you secured enough. I know that no one can say that I’m secure 100%, but what we’re trying to do is to decrease the number of hits. So in a way that’s, it’s not easy for the others, for attacker, okay, for criminals to attack the kids. And let’s combine together, starting from fury to read world application and simulation. So what I’m looking for is not, it’s not only me, it’s not only United, sorry, creator United of Herb. It’s a cooperative for our community and that’s why we choose this event, okay? To announce about or to launch this curriculum in order to help all the community. We are trying to help different community in order to be secure by cooperative with all elements of the community. So let’s talk about SDSC, about this introduction about it. I need, I’m happy to show you how we build this curriculum and how it’s easy for the students, okay? Because it’s not only just education, it’s a career, okay, improvements. And it’s a good opportunity to bridge the global skill application. It’s a call for everyone to be at a front of cybersecurity training. So I do believe that the world has a lot of technologies. The only thing we need is to know how to use this technology. And these resources, it will be shared also, the study of different cultures. We call the curriculum SDSC, Student Digital Safety Certification. And by the way, we have a lot of certificates in the same area, like a school, safety schools, and a lot of curriculum. But actually, why it’s not working, okay. Do we have internet? Do we have a connection? Yeah, okay. So this is the curriculum, the website where you can find the Student Digital Safety Certification. And first of all, before we go through the curriculum, we have to start by survey. And actually, we build a three type of surveys. The first survey is for the parents, and the second one for students, and the third one for the educator themself. I think we have a problem with the speed of the interconnected connectivity. What’s wrong here? If you can help me to connect, sorry. So can we choose this one for example? Unfortunately, we are in a place that we should. Excuse me, there’s a problem in connection. There’s no internet connection here? Oh. Okay. Nevermind.

Moderator:
You can explain it, doctor, at the steps of, uh.

Nabeih Abdel-Majid:
Well, I’m very excited to show you the curriculum and videos and interactive screens. Let them discover it on the site. Let me try it. Yeah. Yes. Yes. I’ll try to do this. Yes. Um. Which one is? This one? Um. Which one is? This one? Yes. We are here to make infrastructure for this all. Okay. Okay. Okay.

Moderator:
We are here to discover and visit our site, doctor.

Nabeih Abdel-Majid:
No, you know, this culture is like my kids, you know. Yes, I know. I need to show everyone what I have.

Moderator:
I know.

Nabeih Abdel-Majid:
I’m trying to connect, yeah. Um. Cannot connect to this one. Dr. Nabi, working in this curriculum for seven years ago. Yes. And we get this chance to launch it to all educational institutions to get benefit from this curriculum. Because it’s very important to save our kids and the role of parents. They know how to use this curriculum to protect their kids without let them losing their self-confidence.

Moderator:
This is a very important point that we concentrate on.

Nabeih Abdel-Majid:
I’m sorry, we thought that the Wi-Fi will get online, so sorry. Who is Dinesh here? Can you help us please? Are you Dinesh? Yeah. Can we use your internet? Sure. Your password? I can’t see your name, but your password is here. Well, this is a good example that you should not use this person’s password. Okay, I got it. Connected? Connected? I think so. Let me see. No. Can you request something? Request? Okay. I think there is a connection. How do you get it first? There is no connection. There is no connection. I’m not going to connect. I’m not going to connect. Dinesh? Dinesh? How can I reconnect? Where is he? Where is he? Where is he now? Are you Dinesh? Yeah. Your password? Your password is in here? Yes. Okay. Your password? Your password is in here. Okay. Connected? Connected. Yes. I can’t get that. Can you read? Can you read? Mm-hmm. Can you read? Should be connected. Can I use the PC? It’s working here now. Sorry for this stop now we will start again okay okay I don’t know where was the problem this is the survey we stopped here that we start by giving a survey for everyone like your parents and students and teachers so if your parents we need to check your level or students or a security level I’m sorry in teacher so if you just click on the in the survey and you need just to fill the information and when you finish the the survey because we have a lot of questions okay it’s a multiple choice question and then you will receive an analyzed email that you this is your strong point and this is your weakest point right in actually you go to LMS LMS is where our curriculum and allow me to get access by sorry sorry okay this is our platform as you see here we can we can have more than one course in different languages we have Arabic and English now so what is your your device is it Android or iOS because you know the Android have a different screens okay and I different than iOS so if you busy or device iOS then click on iOS and then start the different the different curriculum here. This is the first level, as I told you, we start from introduction into the internet-safe browsing. And each one of them has a lot of assignments, like a group of assignment and exams. Okay, so you can see here, it’s a complete school, so assignment and assignment two. I need to show you, because the time is consuming, how one of them is working. So if you go to find who’s spying your device, for example, the video will start telling you introduction about the session, and start recording. Where’s the sound? There’s no sound. So it’s sound telling you, yeah. I don’t know, I don’t think. So this is sound? Yeah, it’s okay, it’s okay. Can I, can I, can I, it’s touch screen, sorry.

Video :
Did you know, dear student, that it is possible for your device to be hacked without you even realizing it, and without any change? Did you know, dear student, that it is possible for your device to be hacked without you even realizing it, and without any change in the performance of the device? Yes, this is real. Let’s consider what this means. Many programs have the ability to breach and sneak into your device, and then start monitoring you without your knowledge. These are called hacking programs. Let’s consider various examples of how hacking software can affect your device, if, of course, you do not take the necessary steps to prevent it.

Nabeih Abdel-Majid:
This is all one of the decisions, and teacher can stop whatever he needs to stop, can retain back and go forward, so it’s easy to use for other students. Allow me to take just two minutes from your time, and then we’ll proceed the different parts of the class.

Video :
Let’s start with the first example. What if these hacking programs remotely controlled your device’s camera? This means that a hacking program that infiltrated your device without your knowledge has managed to activate your device’s camera. Thus, the hacker who runs this program will be able to look at you and monitor you all the time, without your knowledge. The attacker is controlling your device’s camera, and may be able to see who is sitting with you as well. Do you agree with this?

Nabeih Abdel-Majid:
And so on. This is the first part of theoretical, I mean, media, okay?

Video :
And then the next, the next step when you finish, the next step, you start exercises, so it’s interactive screens. By WhatsApp program. Using the following two steps. The student has to click start, okay? Go to the WhatsApp web or desktop option in the WhatsApp settings menu. As shown in the following screen.

Nabeih Abdel-Majid:
So step by step we teach the students what to do in order to implement this idea and that idea.

Video :
Go to the web.whatsapp.com website using your laptop.

Nabeih Abdel-Majid:
Okay, click create, it’s not only video, interactive screen as I told you.

Video :
And scan the QR code as shown in the following screens. Go back to WhatsApp web or desktop and see the result of the test. The screen shown indicates that there is no tracking through WhatsApp.

Nabeih Abdel-Majid:
Okay, student can repeat it as much as he needs. At home also he has username and password and he can get access to the website and teach himself. Okay, and also we have next training in the same session. So we have different sessions and we have sub-sessions inside each one of them. Okay, so for the next you will start exercise number two. I need to go to the third part of the class where we have conclusion. So after the sub-sessions inside the session, then we go to conclusion and then we go to some sort of questions for the students.

Video :
Preserve our privacy by making sure that no one is using our personal accounts. The first way is by using the WhatsApp application. And the second is by opening the Google account through the browser. Make sure you can do them properly. Then move on to the next section. Wishing you all the best.

Nabeih Abdel-Majid:
Okay, student next and then we have like sort of three to four questions for each session. Just to be sure between faculty or teacher and student that you were with me or not. And let’s let’s answer this question and let’s review some of this question together. It’s not exam, it’s just reviewing.

Video :
Please answer the following questions.

Nabeih Abdel-Majid:
Yes, start and then start discuss between teacher and this make a real. interactive, or active, let me see, let me say, sorry, active class in the class, sorry. Yeah, so if you just answer, that will tell you wrong or correct. Okay?

Video :
Wrong.

Nabeih Abdel-Majid:
Let me have one right, please.

Video :
Correct answer.

Nabeih Abdel-Majid:
Okay, and then, and then. Please review this lesson, and try again. Yeah, because your score is, and you can review the quiz also. Discuss between the faculty and the teacher. You have to, the faculty, sorry, teacher and the students, you have to answer this one and why. And actually, allow me to tell you that we just implement this program as a pilot. Okay, a test, because we’re planning to launch here. Okay, in this event, by supporting of Dr. Ahmed Noura and Dr. Nermin. So, we launch it for a different community. Next. So, you say exactly where you fold. Okay. In next. Please review this lesson. If you stop it, you return back to the curriculum. Allow me also to tell you that we have a lot of rubbers, a lot of rubbers. Okay, and different privilege for student, different than manager, different than teacher. In a way that you can observe, you can monitor your kids, your students, where he was, or she was, and where he or she is exactly now. So, the survey, we start by survey, and we end by survey also. And we have a lot of rubbers. You can find it here, site administrator. Okay, and you can go to different and different options. Okay. So, we have rubbers here, and it’s also customizing rubbers. So, we gave you opportunity or an ability to create your own rubbers. I do believe, finally, let me say, I do believe. that if we cooperate, all of us, we can help the community to be secure. And this is our message, actually. We need to cooperate, all of us. It’s not only teacher, it’s not only the one who create this program. It’s an effort has to be taken by all different parts of community. So let’s start from this distinguished place to cooperate, because I have five kids. Everyone have kids, okay? And we need to be secure. So let’s cooperate together in order to reach the level of secure community. This is my message, and this is the message of creator of, creator union of Arab, and also the ACT, where I also supported from, and also HDTC. Thank you for everyone. Thank you for attending my session. And it’s yours. Thank you very much.

Moderator:
Thank you, Dr. Nabi. It’s amazing and outstanding, really, program. But I want to ask just how old are the kids that this curriculum targeted? Well, we targeted from grade five. So it’s here. They can use it starting from grade five? Grade five to grade 11.

Nabeih Abdel-Majid:
Yes. Because we have different levels of the. Okay, I think all persons in room, what the role of parents of the kids in this curriculum? Oh, thank you very much for this question, because the parents is one of the main, the main stone, let me say. Yes. Yeah, we have group of sessions also with the same curriculum. So whenever you participate in this program, okay, your parents has to attend like group of sessions just to show them how you, I don’t say, I don’t want to say observe or monitor. But just take care of your kids how you know exactly what happening with you

Moderator:
They should observe and monitor but without knowing of their kids to be safe because we are in open Environment of digital and there is a lot of risks

Nabeih Abdel-Majid:
Yes. Yes, but what I what I need to say that the students can do whatever they need Yes, sure. Even if you close all the doors, they will definitely find another door But actually the best thing is to think how to be Just just watch them watch them. Take care of them. It’s right to help them against any extortion if it’s happens This is my message.

Moderator:
Yes. Thank you. Dr. Nabiha. I think we have let then five minutes if anyone in the room have a question, please Get the floor in the middle of the room

Hala Adly Hussain:
Dr. Nermin, Dr. Ahmed Thank you doctor for this valuable session because it’s very very valuable for me because I’m targeting the education in our project So if this is approved by the education the Ministry of education in Jordan or still not approved

Nabeih Abdel-Majid:
No, we we are accredited from KHD in Dubai so It is it is it is accredited. Yes That’s why we are looking looking for the recommendation from the IGF here to be implemented in a different places in a different community

Hala Adly Hussain:
It’s just implemented in our in Emirates. Dr. Hanna. Dr. Hanna. We have to hope to share this

Moderator:
Curriculum for all over the world. So we are make this point a start for all the students all schools The goals of this session one of the goals of this session dr. Hanna to share this curriculum or with a large number of educational

Hala Adly Hussain:
I think you have to put it in the Arab League. Oh, yeah. Sure. Sure meeting the next meeting. Yes, sure

Moderator:
We are already Talking about this point with the Arab leg you Thank you for this intervention, Dr. Hala. It will be very useful, so thank you, thank you, doctor. Thank you, Dr. Hala. Thank you very much, thank you. Anyone have a question? Okay, I think no one have any question. Yes, please.

Audience:
Thank you for this opportunity. My name is Rohit Prasad, I am from Nepal. And right now I am a student, master degree. So my question is like, what are the ethical concentration in cyber security, especially regarding hacking and privacy? Thank you.

Nabeih Abdel-Majid:
Yeah, thank you very much. I think most of the session is about how to stop hacking the privacy. In the, how to know exactly if somebody attack my PC by watching my cam, my mic, and also how if I delete some of the files, being sure that no one retain it back and take my privacy. This is another session. If somebody attack my iCloud, for example, how would I know? And then how I stop them? Okay, this is another session we have in this curriculum. And also, where exactly you can control the specification of a lot of options in iCloud and Android. Okay, and then let’s teach the students also a lot of sessions in the curriculum, how to control, what is this and what is that, and how would I use this one and that one and control my privacy using my account? Yes, a lot and a lot of, basically, this curriculum build on this. Yes, thank you for your question.

Moderator:
Thank you very much for your question. Thank you, I think we are here because this is a revolution of all kind of technology. And we have a long-term works to achieve what you say. And I hope that we will be able to have a discussion about the cyber security in all categories of usage and users of Internet and the environmental world. So thank you very much for all attendees online and in person. And I hope thank you, Dr. Nabih, for this outstanding presentation. Thank you, Dr. Ahmad Noor, for your expertise for this initiative. Thank you, Dr. Hala, for joining us in your presentation. And thank you to all of you for your participation in this initiative. I hope that this initiative will be implemented by the largest number of educational institutions to protect our children and draw a new map for the safe use of the Internet. Thank you for you all. See you next IGF in Riyadh. Thank you. Thank you, Dr. Ahmad. Thank you, Dr. Nabih. Thank you, Dr. Hala. Thank you, Dr. Hala. Thank you, Dr. Hala.

Hala Adly Hussain

Speech speed

128 words per minute

Speech length

1505 words

Speech time

708 secs

Nabeih Abdel-Majid

Speech speed

157 words per minute

Speech length

4530 words

Speech time

1734 secs

Audience

Speech speed

155 words per minute

Speech length

50 words

Speech time

19 secs

Moderator

Speech speed

180 words per minute

Speech length

982 words

Speech time

327 secs

Video

Speech speed

151 words per minute

Speech length

398 words

Speech time

158 secs