Archive for November 2014
University computer science courses are failing to make clear the need to develop skills in cybersecurity, leaving the UK with a shortage of experts
This is according to a paper published jointly last week by the Council of Professors and Heads of Computing and (ISC)2, the International Information Systems Security Certification Consortium.
“Twenty years ago very few courses paid any significant attention to security, and the situation has started to change, albeit slowly,” says “Perspectives: Integrating Cybersecurity into Computer Science Curricula”.
This is despite “a growing voice from industry that cybersecurity knowledge should be core to the disciplines of computing and information technology”, meaning such skills should therefore be “a key element of the computing and computer science curriculum, particularly at the undergraduate level”.
Currently most institutions offer computer science courses in which there is one module or unit – approximately 5 per cent of the total credits – dedicated to cybersecurity in a three-year degree, the paper claims.
It also notes that graduates find it difficult to enter the cybersecurity industry because “the supervisory cost of placements is very high for companies to take on many graduates of any kind in cybersecurity roles”.
“Academia must look at its curricula and accreditation requirements,” said Liz Bacon, president of the Chartered Institute for IT, adding it was also incumbent on industry to accept more trainees and placement students.
She said that more sandwich placements needed to be made available, and that lecturers could not single-handedly boost interest in cybersecurity among students, and that “talks from external speakers” and “war stories” from industry were more likely to excite students.
“It is not enough to integrate technical cybersecurity subjects into computing degrees as cybersecurity is an increasingly a diverse discipline, requiring a mix of business savvy, soft skills and technical skills for varied roles,” added Adrian Davis, managing director (Europe, the Middle East and America) of (ISC)2.
“Universities have a real opportunity to include and make explicit reference to cybersecurity topics within many degrees.”
In August, the first GCHQ-certified master’s courses were unveiled, with Edinburgh Napier University, Lancaster University, the University of Oxford and Royal Holloway, University of London, among those accredited.
Saturday, 29 November 2014
Posted by Unknown
Making Malware cleanup easier
You'll find a recommendation to install software to detect and clean up malware in almost any security guide. Although a single product isn't sufficient to defend against all modern security threats, the general recommendation persists because the technology remains effective in blocking categories of known threats and cleaning up malware infections if they find their way onto your computer. Since resolving a malware problem is a little bit different each time, we're committed to working with our partners to give people on Facebook the help they need in keeping their information secure.
Our goal is to make it easier for people to find and use the right technology to better protect their devices. We've worked with F-Secure and Trend Micro to incorporate free anti-malware software downloads directly into our existing abuse detection and prevention systems. These are the same systems that help us block malicious links and bad sites from among the trillions of clicks that take place every day on Facebook.
How to Unlock Pattern Locks on Android Devices
Nowadays many android phone users use the inbuilt “pattern locks” as a security to their phones. But the main problem with it is that, if you forget the pattern you used and you try out many wrong attempts, it gets locked permanently. So, just follow these simple steps to unlock pattern locks on your android device and use it again free of cost.
Unlock using Google Account :
1) Switch off the phone.
Monday, 10 November 2014
Posted by Unknown