1 / 1

MySecureCyberspace Web Portal

Andrew Biggadike, Leonardo Boulton, Adam Cecchetti, Benoit Durandeux, Ugo Enyioha, Vishakha Gupta, Barry Hon, Boris Jabes, Ankur Jindal, Bruce Kao, Gregor Kronenberger, Patrick Lanigan, Will Lawrence, Jed Mitten, Terry Zhu, Dena Haritos Tsamitis, Anna Maria Berta, John Dolan. Motivation.

Télécharger la présentation

MySecureCyberspace Web Portal

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Andrew Biggadike, Leonardo Boulton, Adam Cecchetti, Benoit Durandeux, Ugo Enyioha, Vishakha Gupta, Barry Hon, Boris Jabes, Ankur Jindal, Bruce Kao, Gregor Kronenberger, Patrick Lanigan, Will Lawrence, Jed Mitten, Terry Zhu, Dena Haritos Tsamitis, Anna Maria Berta, John Dolan Motivation Approach • Support national cybersecurity strategy • Meet home Internet users’ need for threat awareness and protective measures • Address scattered and too-technical nature of much cybersecurity information on the Web • Make CMU, INI, and CyLab expertise widely available to general users • Provide web-based focal point for home computer security • Tailor home computer security information to user needs and circumstances • Partner with key computer security information providers • Use innovative human-computer interaction paradigms MySecureCyberspace Web Portal • A user seeking computer security information selects the category and environment, and can toggle between basic and advanced levels, depending on needs and technical background. • The three-axis figure below depicts this content organization. Each piece of content in this space contains: • a description, • a list of links to threats, • a discussion of ethical, legal, and privacy issues, • useful and reference links. • Each threat link gives details on individual threats, including associated protective measures (Practices, Settings, and Tools). Different types of content: Besides the content organized according to the 3 axes, the portal provides: • Encyclopedia of technical vocabulary and concepts • RSS feeds to provide fresh news from trusted entities (Microsoft, Trend Micro, CERT…) • Customized alerts for mobile devices • Use Cases that describe some common situations • A game for children to reinforce principles of safe and responsible online behaviors

More Related