Page 12 - Issue224
P. 12

ـه1442   يناثلا عيبر                                            Forum           12
                                                                     م2020  برمفون   224




                                                                                                  By
                                                                                            Dr. Iman Almomani
                                                                                               SEL Lab leader



          School Awareness Workshop



          Online Cybersecurity Awareness Workshop



          The Cybersecurity  club  at the female  Aala  Alkhyaer.  The  aim  of  the  Security
          side,  under  the supervision  of Security  Awareness  workshop was to  educate the
          Engineering  Lab  (SEL),  has  concluded  an   school’s  teachers  and  students  on risk
          online Cybersecurity Awareness Workshop
          at Al-Rowad  Private High  Schools  (female   awareness,  a  positive  attitude  to  security
          section) as part of the community service.   and privacy and becoming acquainted with
          The workshop  conducted on Saturday,  relevant subjects. Figure 1 shows the main
          24th  Oct,  by  our  Research  Engineer,  Ms.  topics covered in the workshop.

                                                                                          Figure 3 :Decrypting a cipher message using the Caesar Cipher algorithm challenge

                                                                                     To measure the level of understanding  and  compete  among  each  other.  Figure
                                                                                     of the covered topics, the students were  4  shows  some screenshots  of the
                                                                                     asked to play an online game. The game  competition and the results. Following the
                                                                                     was designed in a competition theme to  competition,  all  the  challenges  involved
                                                                                     encourage  the  students  to  participate  have been discussed with the students.










                      Figure 1 :The main topics covered in the workshop



          Furthermore,  the  workshop  focused  on  to improve the cybersecurity services and
          emphasizing  the  significant  efforts  of  solutions. Figure 2 shows the main points
          Kingdom of Saudi  Arabia  to establish  a  covered in  the workshop  regarding  the
          strong cybersecurity  infrastructure and  Saudi Cybersecurity.


                                                                                                       Figure 4 : Some screenshots of the competition

                                                                                                   The workshop was designed to target both students
                                                                                                      (%63) and teachers (%37) as shown in Figure







                                                                                           Figure 5: The overall distribution
                                                                                           of the workshop attendees







               Figure 2 :The main points covered in the workshop regarding the Saudi Cybersecurity

          The workshops consisted of an interactive  the  most  common  threats  in  the  field  of
          session  and  other  methods,  such  as  Cybersecurity.
          presentation,  video,  and  a  digital  game.    At  the  end  of  practical  section  of  the
          This  workshop  showed the  teachers and   workshop, the students were asked to solve
          students how it is easy to be attacked, to
          get  valuable  information  from  published   a challenge on decrypting a cipher message
          information on social media accounts, such   using the Caesar Cipher algorithm. Once the
          as their tweets, pictures on Instagram,   student solved the challenge, they received
          and  how they make themselves easy  “GREAT HACKER” message as displayed in
          targets  to  hackers.  Finally,  it  presented  Figure 3.
   7   8   9   10   11   12   13   14   15   16   17