IGF 2021 – Day 4 – WS #240 Education 4.0: Who is looking at cybersecurity?

The following are the outputs of the captioning taken during an IGF virtual intervention. Although it is largely accurate, in some cases it may be incomplete or inaccurate due to inaudible passages or transcription errors. It is posted as an aid, but should not be treated as an authoritative record.




>> Hi, Eric.

>> ERIC SOWAH BADGER:  Okay.  So I guess you can hear me.

>> (?) (echo).

>> ERIC SOWAH BADGER:  Hello?  I can hear the background.

>> Yeah.  (echo)

>> That's okay.  (Multiple speakers at once)

>> Welcome, everybody.  Welcome to our session education 4.0, who is look at cybersecurity.  Well, at this session, we will talk the issue of cybersecurity given the context of the pandemic and the transition from traditional education to online education.  It addresses challenges for privacy and safety, for children and yawl who are the most impacted by online education and platforms and the roles of each stakeholder in improve will the trust of digital education and spaces for the purpose of expanding teaching and learning to the Internet.

So we will tackle the policy question of good privacy in cybersecurity practices and international mechanisms that could be useful to increase trust in online education.  So I think we'll address the issues taken by the ditch stakeholders including the government, Civil Society, Technical Community and Private Sector to address this issue by creating a civil environment for education.  We need to consider the fact that on cups are especially exposed and vulnerable in this context.

So today, I have some special guests.  Emmanuel Niakwei mingle and we have Eric Badger who is a specialist working at the CCC Bank.  On my right, we have Somafia and a Manager from the University and he's also the director of the cyber security the experts association of Nigeria.  On my left, we have Sergio Horase.  I don't know if our last speaker is online.  There is Nidhi.  Nidhi is at the national university in Delhi focused both with the directors of the UT.

I will start asking questions of the panelists.  What do you think are the threats and what are impacts for students?  What have you done so far by different stakeholders are have this first been beneficial.  I want to turn it over to Savyo.

>> SAVYO VINCIUS de MORAIS:  So I have an 11‑year‑old.  He sort of lives with me in the beginning of the pandemic.  We had to rush way to her to consider to continue spending even flow I am a specialist and I hadn't done a ‑‑ it is important to remember that most of all parents weren't right besides their children during the day because they were working.  So children had ‑‑ so kids had to figure out how to connect and communicate online without any assistant during the day.  So, they were immediately exposed to all sorts of issues.  They could be harassed by other children or adults.  In a lot of characters the children had their devices even though they cannot access in their applications.  So yeah.  I paid close attention to students.  I saw concentrating of educational resources in few companies like Microsoft, Google, Meta.  And even perspective, I think this move measurement and why that?  These are resources to protect their a sets.  Therefore, these children data, but when some schools do use the datas, but they decided to use their Facebook.  And this is exposed. 

So I think the biggest issue we have now is about the information that we are not able to control from these children because when they are using educational systems, the platforms are designed to keep this information safe and when some schools do Connect more people, they try to amplify the ways of sending these can't tend to the children.  And this ‑‑ these children exposed to systems that were not designed to them.

So I see the difference stakeholders in diverse in taking different approaches in the cyber security, community to check if the systems are safe and correct issues.  I think also a lot of companies that can well is meeting platforms and all of a sudden, it started to be used in a lot of schools, a lot of work places and they weren't ready to handle this much of responsibility.  So even though they're great platforms, we had a lot of cases of Zoom bombing and digital harassment.  So yes.  I think we need to get together to really show them to schools and to the parents that what are the advantages and disadvantages of using certain colleges.

>> Thank you, you touch on some important points.  So now I will head on to Eric, who is online.  Eric, the floor is yours.  You have 7 minutes.

>> ERIC SOWAH BADGER:  Thank you very much.  So I will look at this from the attacks.  That's my fear.  So first of all, the transition from traditional and education that infrastructure you have one line.  It is failure to a attacks.  I'm talking about seller.  Network infrastructure are taking grounds and industries.  So the reason I'm saying this is in my life, I have come in across and content a lot of fishing methods and almost I get along with that and from meeting from school and have domains.  Doesn't matter where it is coming from.  But in a ‑‑ it is not coming from the schools.  It is compromising the school's network and they are using that background.  So another frustrating thing is on ‑‑ we had IT support and institutions having their own done and institutions on having their own network, which is intranet and their own environment.  But now transitioning on to online, these institutions did not have come ‑‑ maybe because of time or how important the issue came back and they did not have that much to look at the vines and push out the infrastructure.  Before the line or the intranet on to the Internet.  So that ‑‑ as (?) another threat is schools and intellectual and having receipt tests and just exploiting the systems to get process to sensitive (?) because of these vulnerable.  We want to move these things on the Internet.  And (?) attack, but they are common.  Some common go ago document and then I will be able to answered questions and database and have succeed to infrastructure and you have Internet.

So this also came with moving from the tradition to online.  We're talking about ‑‑ let's see newbies, people who are new to hacking.  Because we're able to get access to websites, they start to use as a method to cause attention.  And then also the last threat I talk about is what our first one will talk about, Zoom bombing.  This is no ‑‑ I say it is no threat of schools done.  When this happened or when we moved straight from tradition to online, yes.  A lot of people were moving Russian, kind to lead them and we have all issues because it is not taking security into play.  Do I not bring attention, but even higher places are (?) with credentials.  Bee have Zoom ID and the password with G be ‑‑ this is an attack.  So, again, this is a threat.

Now, the thing that I have done so far the law has (?) and a lot are not able to make it from the platform.  Again, we moved online up until now.  I know a lot of security reaches Ben into that, and that is always been done.  It's a witness Zoom.  So, no school creating awareness and other platforms, Microsoft, and Facebook.  I got social media platforms where executives have witnessed on these attacks, and also schools have also been ‑‑ I'm waiting for a lot of institutions to know how to move the gadgets from the traditional on to online to safe places.  A lot of people are attacking the apps.  So organizations are also building a lot of more security because of our education.  This is what I would like to see.  Thank you.

>> Thank you, Eric.  Very interesting points about Zoom bombings and awareness that people will mention.  You mentioned a lot of things.  Now, we are reading to Somalia here.  So Somalia, please.  You have 7 minutes.  The thank you.

>> SAMAILA ATSEN BAKO:  So the first issue that's caused is exposing the truth about this situation of things.  The sense that a lot of people have little to 0 knowledge on digital security.  So when you introduce people to cyberspace and ask them to interrupt the educational sector, you are basically creating easy targets for your attackers.  People are not able to do the basics that would adhere secure them when they're online.  When it's this, you look at the teachers as well and parent.  They don't have a security issue.  I've seen cases.  I've seen schools where they will have for your lessons.  So how do you expect us to them?  People meet.  Or to use e‑mail and use e‑mail sure the.  Now let's do this lack of security and talk about online learning and online education.

So some of the threats that come out of obviously your situation and 10ly what we call ransom ware.  That is the ‑‑ they have to team up again to talk about the infrastructure.  The other case is female hijacking.  A couple of the schools have e‑mails ‑‑ like email accounts being hijacked and use uses.  We know that hoses a big skit in the game threat of thing.  There are other ones where you talk about gentleman will, an active.  We have financial fraud and social media and sexual exploitation with all kinds of issues.  So on the stakeholders, again, I think there's been improved effort on both parts of the government and the Private Sector.  The private parter for the NGO, it's one of our key pillars to swing awareness.  So in (?) on the threats.

On the other worse ones to mention is securer also education and ‑‑ it has different sectors including education sector.  So that's a plus on the side of the government.  So moving forward, you hope the document is implemented hopefully so that we can yield and enjoy the benefits.  So there are others.  Thank you.

>> Thank you, Samaila.  You touch an important point not only the students, but the teacher, different Google Meet.  How about the ransom, and we are hitting awareness a lot.  That maybe the way.  Now I am heading to Nidhi.  So Nidhi, you have the floor.

>> NIDHI SINGH:  I think my colleagues had I think we have the privacy online right now especially for children.  So I think that's a task for you to go from last year which talks about how a mock increase in threats which would disguise the eLearning platforms which just increased as the opinion stem going so this we did conducting and assessments and attendance and the more people rely on this, the more of the log in set.  We have educations like audio video text.  One of the things is depending on the platform, but more is say you look at the privacy policy of things like webex, going or Microsoft.  All of them we're in a video called conference.  So this is clearly one of the bigger sings that affects children.  If you're using this for platform, there's the 54 term for children to stay up and be used.  More importantly.  Even though you had lawing and face, you have the shell rights and contention that say the private is to be connected.  We've not while she's to fight the pandemic and they haven't really updated in a way where the data can effectively function as the skill right now.  So there's been a lot of reports when once everything is done and you have the new platforms, like that went wasn't a lot and people can supply chain where they scan billions of stories in the chat messages and see what the schooling for thought is.  So I didn't knowledge privacy of students and children is affected on neither baud the other the one king.  I dong they have tried to address this.  This makes sense they will explain to people about malware and you have to stump on be about also explaining to people how using that data works and how that can be exist.  I also laws in place which I specifically get the words.  If you look at this, the children's online privacy protection, I got them.  That is specifically geared towards children safety.  It applies to children 14 and under.  So it doesn't quite capture all the kids who will be affected by, I think, these online interventions.  And then I think another thing that we have to discuss and I will talk about this is while you do have 8 tech platforms, there has been a lot of resources and everybody can Joan the super‑‑ they will be conducted on Facebook or What's App clearly because of the kinds of options.  I think this is also something that probably tell thank you.

>> Thank you, Nidhi.  There have been reporting, so you also mentioned about the digital (?) something again the awareness about all and the lack of resources.  I agree with you because not every school is prepared to afford cybersecurity teams or groups prepared to upfront the incident.  And also I think there was bring your own device, which is very complicated to let to manage, and all.

First part is Savyo, so Savyo, the floor is ours.  You have 7 or 8 minutes.

>> SAVYO VINCIUS de MORAIS:  Thank you.  So, ah, first note here is that I work sis admin at the federal institute of education and science.  We have courses and doctoral.  We have a wide range of students.  I'm not only talking about my institution, but older institutions as a federal network of education institutes including the universities and older institutes from older states.  I could get some experience and executions from other universities.  So from the formal there are some things that we.  I think in the shock term today or tomorrow or the lesser.  We had to make a ‑‑ so as we mentioned, most high schools migrated to going scholar, Google made for classes, Zoom for classes and so on.  And we have to do this migration fast considering those examples.  We know that we have some privacy issues that must be on the execution for the next years.  This is not like a thing that when the pandemic got over.  So it will be different from now, but we still have to debate about that and some of the institutions decided for deploying old systems.  They already have some administrative systems for bureaucracy and so on.  But for having the classes, they deploy, for example, the big blue button for video calls and most part of the teams are not ‑‑ they do not have expertise with this new platform.  This brings many, many issues.  Some other ones like contracted this host in the channel network looking for the privacy of the students and whole institution.  So this is a first part and now I'm looking for plans not only this part of deployment and looking for social platforms and make capacity building for the team choosing this type or contracting 30 minutes emphasis for this.  Okay.  I got ‑‑ I lost the time.  But I'll keep going.

>> You have two or three more minutes.

>> SAVYO VINCIUS de MORAIS:  Okay.  I am contacting certain parts and so on and keeping the areas update.  One real thing.  Having in fact the cyber security policies some not only the sector in the IT or the computer with certain teams, but having the policy in the paper and they document for the students and everyone.  So I think that the income step that we need to move on to assure a secure education 4.0 is working in a policy in cybersecurity policies for every institute.

>> Very interesting, Savyo, from your point of view.  You raised more attention to the logistics like you have to configure the platforms.  They speed some expertise to do that.  It's not an assess task.  So deploying your systems can be a solution, I see.  Contracting some parties will be something and this issue of the policy for students or have something written about making organisms or control or what is good to do.  Now, a second past of these workshop.  I will raise a question and we will have another round with the speakers.  So the question is:  What are the remaining challenges for guaranteeing cyber security and practice in their online education?  How can the youth be more involved in policy making.

>> The first part of the pandemic, all work places and all schools were like take whatever you need, but please give me a working system.  So we passed through this and now we are looking like wait.  What have you done?  What information we delivered to these companies.  Why are there issues and risks exposing our students?  School colleges should be a safe place for people to learn.  People there should believe much just safe.  They need to feel safety to want his, to express so the first step we should do is to create the safe environment to guarantee that everybody will feel welcome there.  We saw a lot of suffering in these past months.  People should have the confidence that this information, the flaws that people show when they are learning will be able to express themselves.  And these cybersecurity aspect I think brings your own device policy is like a must because we are teaching children and.  The students in general how to use technology too.  So can practice in our lives.  We use to do school, to educate, everything.  They need to know this learning place to know how to Connect with these systems.  So it's important that they know how to use their own cell phones and how to use their private settings and what are the consequences of installing I don't know.  Any we need to have some control of it.  I believe actually when talking about children, these could not be and attended as it is now.  Maybe the schools should have some control.  Yeah.  I think that's it.

>> Yes.  When you are talking about the control, how do you see this can be measured?  How the educators which ops the truancy starts or do you have a D.

>> This is actually a very, very difficult question.  Children have to ‑‑ children need privacy too.  We are exposing them to places and apps, devices that have almost none control like my sister now has a What's App.  So yeah.  Who are ‑‑ who is she talking to?  A student in the school and even more difficult because we don't have like thousand hundreds of thousands of students Connecting every time and sending pictures, sending messages, sharing their discoveries of the world.  And yeah.  I don't know how to do it.  It's difficult.  It bugs my mind because at the same time, you want them to develop themselves.  We have like the Internet at their pockets all day.  Yes?

>> It is always a very difficult question about the law enforcement when you think about this.  So I am pointing to Eric.  Eric, you have 5 minutes for this question.

>> ERIC SOWAH BADGER:  All right.  Thank you.  So I'll start this.  I IT is not security meaning IT department is not (?) department.  So one thing that is especially school mentions that do invest in cybersecurity, the same way they are investing in IT, the good names, having IT department and being on school premises, they should invest in cybersecurity because right now, IT department ‑‑ what I ‑‑ IT department would fix the systems, put systems place, they make sure these things are started and these things are safe on the internet.  So schools in India and network and their own service should probably have a sock in the environment.  Who is going to provide your network on the internet?  Who is watching?  IT will not be able to watch them.  They are the people who implemented it.  They look so schools should also start investing into socks, start investing into ideas and IP will watch over the network.  This is where most of the attacks come from.  My colleague from Nigeria did mention ransom ware to institutions and all of these attacks comes from bigger centers.  Even applications doesn't have (?) or place works that have been put there for people to do analysis.  Next thing you hear is they have restored and back up.  How we talk about how the compromise happened.  It won't happen again, but if we have systems in place, unit services in place, the schools develop what would be subjected to before it was online and all of this helps.  So these are some of the things that I think should be put in place.  Now when it comes to students or the youth being involved in policy making, I will see that yes.  A lot of even these students and even engaging or landing more when it comes to res queue to become something for the youth or something for the younger ones, yes.  Older generations will be there, but the youth are even doing more sophisticated things when it comes to the Internet.  The younger ones, I have a system.  I have a system.  Who is 17 and some days it amazes me.  Who taught you this?  I read it online or I saw it on the YouTube channel.  I read this online.  Young people are ‑‑ DHS and SSL grabs it.  Everyone is writing scripts to get passwords from public Wi‑Fies.  These are the things that some of the youth are engaging in.  These are some of the knowledges that is acquired.  Now, what I would do with the knowledge they are acquiring is if we have (?) where they can bring the contributions on board.  I will bring the contribution to solve some of these challenges and problems.  It will amaze you some of the inputs the kids are going ‑‑ the younger once like us are going to bring on board that would help solve a lot of situations and issues.  Thank you.

>> Thank you, Eric.  You touched many points.  I think with schools they lead for really bad travel for students, staff and schools also.  The youth are aware of that and you say they could also help in terms or at least criticize the first factor and they're using while hats and black hats so they can help with the things.  So now I'm going to listen to Llona.

>> ILLONA STADNIK:  I appreciate the things that Eric said.  We're obviously in a similar situation in Nigeria.  So regarding the many challenges, I think as we all know in the tech industry, anything gadgets or any tool that is about 3 to 5 years old is almost obsolete.  Meaning this tech space is very fast paced.  So because of this innovation, a lot of theme get behind.  We talked about how a lot of people had to migrate their students online for learning.  But we have a lot of schools that didn't do that.  They don't have the computers or networks.  So a lot of students were left behind.  They stopped learning during the pandemic.  We see there are different places and communities.  So that's a big issue.  That's a big challenge for me.  And this ties to the issue of finances as well.  A lot of countries or schools do not have the finance or the money that is required to buy this infrastructure and even hire the IT units as well.  Yes.  Infrastructure deficits.  One cost is way higher than some other countries.  This disparity in different locations posed challenges.  We talk about guaranteeing online privacy is kind of impossible.  The way to grant that is make the Internet representative and there is nothing like unrepresented security.  There is always going to be issues and threats.  Some can be internal coming from your own students and not necessarily outside to attack you.  It is coming and maybe parents can take a picture of their kid and the pick has a school showing.  Notice they want to kid nap the child.  So these are issues to consider and it makes it more difficult to guarantee under privacy and security of online learners.  Like I said in my previous statement, one key thingy to do, one thing we cannot stop doing is (?).  We must keep enlightening people.  If threats ever changing, we're talking about phishing attacks.  In the phishing e‑mails, they're modifying and improving and adding somewhere around to it.  They give by downloads as well.  Other schemes are being used and they merge with phish and other things.  As these schemes keep changing, they will likely teach us and enlightening ourselves with the security professionals as well.  That will help.

Now on the angle of youth being involved in policy making, I think it's important to be part of a security, maybe in your school.  You have a security community or a policy community join.  Even outside the school, you can join a society and you can try to attend evens like IGF.  I believe IGF gives us a good platform to discuss things that would take us forward in this regard.  And the internet belongs to us and the sense that we're the ones who are alive or growing up ins tech revolution, if I may use that phrase.  If we do not get involved.  Who is going to do it for us?  Who is going to take us to the income level.  So I think the youths have a key role to play.  We can do this by attending for like IGF or joining a community organizing.  Look at our events, but also discuss the issues and see how we can influence.  Thank you.

>> Thank you, Samaila.  Introducing new digital gaps and disparities because there are a lot among the different countries.  The resources thing is one of the most important thing also because this can lead to morbid inabilities if he's not attended and this new threat.  Other words like (?) and phishing and I think it's something very important also.  I think it's already happening.  We have seen a lot of you to be more involved in the security symposiums or heatings in the IGTF.  Very nice.  I will move to Nidhi.  The floor is ours.  You have five minutes.

>> NIDHI SINGH:  Thank you, Nicholas.  I think my colleagues have addressed the issues of cybersecurity and cyber attacks and that is something that needs to be considered.  But I would like to focus on the challenges to privacy that you have.  There are a lot of challenges to privacy arise from this social and online education.  I think one of the ones I would like to focus on is sentencing.  So one of the most (?) elements is the informed consent of an individual.  And that means informed consent needs to be informed con70 somebody takes all eye‑opening and you assume that content with the person.  There are a lot of challenges specifically in terms of taking the content.  One of which was just highlighted by both Nicholas and Somalia and that is things like social economic device.  It would not have the option of using some else.  You have to use whatever is ‑‑ we would not have the sort of resources to afford something else.  So you are sort of stuck accepting whatever it would be, whatever device or platform is given to you.  Another thing is a digital literacy.  So you are not certain of what is happening till you accept the terms and conditions.  Even when there are perfections in place, a lot of the times that just means that people say instead of children giving consent, you need to take consent from the payments.  So that's still molecule feed consent.  I think before people ‑‑ sorry I'm back on this.  They plain when that loops or get data.  They can make the decision for themselves.  There have to be some changes that take place in order for this to happen.  The other aspect of this would be to say peep collecting the data should be more transparent that fair collecting from children, from schools and make available like the sort of ways that are been fitting from it.  That is also so you can text it.  You need to insure that corporations are not losing this data or in a way that would affect them.

Speaking of, how do you think youth would be involved?  We talked about, this but being part of the stakeholder processes like the youth sake or joining like say organizations that do work around this, they are good starting steps.  Another way is that you could build a network from other ‑‑ like from around the world.  You can have a few more diverse perspectives and have more and what is happening.  You will have say wholesome plan.  Thank you.

>> Nicolas:  Yes.  Thank you, Nidhi.  Thank you, Savyo, you have five or six minutes to respond to this one.

>> Thank you very much.


Before starting, choose comments and we also have to talk about reliable, ladies.  I'm using my phone through this.  And the second side comment is I was not going to touch this point, but thank you, Eric, for saying that the people who are managing systems, that can't have decisions about security.  Because we are trying to make things work and security make things and maybe comes.  Thank you for pointing this out.  But I think audio speakers had important things out.  So I have now ‑‑ you put me in a troubled point.  Hang out, but I have one issue for you too.  So this is actually a call to action to work.  To use the youth community to get in touch with the students collectives like in high school, and the university, you talk about them, about the need for security, the need for privacy and to give them some material for asking in the institutions for the cybersecurity policies.  I think this is the main point.  There are many, many documents talking about that.  Maybe not exactly about the cybersecurity team in the education, but most part of the cyber execute of issues not only cyber computer, but Stuart in the general timeline for firefighters, for a plane and for many things.  The principal are the same.  And this is the base for everything.  Specifically from the cybersecurity point of view, I think us as the youth community we can take those documents and each one in his own country reach out this academic communities collective that have ‑‑ that represent the voice of the students in the university and the school high school, primary school.  So we can reach them, talk with them about and some for us to have.

>> So this idea about capacity building and for the academia and also trying to represent the youths in the spaces also is always very important, but we know that school networks are easy targets for cyber criminals, right?  What schools can do to show up differences, to limit the damage really is my question now.  You are free to speak.

>> Okay.  Thank you.  One experience that I can share is about my university.  In Brazil, we have a federation of public universities.  So there are a bunch of systems that are integrated between these universities and this approach could be good solution to the cybersecurity lack of ‑‑ specific cybersecurity teams in schools because cybersecurity needs maintenance.  It has I high cost.  When we talk about securing the websites, the networking from these schools is a good approach.  It could be forming and creating and use the schools federations to try to implement a same system with coordinated cybersecurity approach.  I would like to remember too that users, me included, we'll always choose the simplest approach to make the system work.  This is not a problem actually, but your way to deal with this and make insecure ‑‑ I don't know.  Insecure methods and use of technology to make this awareness.  If you know there is a problem on sending sensitive data on a public channel or something like that, if you understand the problem, you will be able ‑‑ you will choose to do it the right way.  So, I think it's also a matter of bringing awareness and showing that security issues are not something to bottler you.  It is something that you need to do because you need to protect yourself.  These kind of mentality change is really needed when we are talking about cybersecurity.  So when talking about cybersecurity in schools, it's even more important because people are learning is there.  Yes.  That's it.

>> Nicholas:  Thank you.  Do the speakers want to raise more points about this issue?

>> ERIC SOWAH BADGER:  That is something that I am doing, I am trying to encourage here.  What I'm doing now is I'm forming a lot of residents because now looking at looking at cybersecurity here in Ghana, most of the youth wants to engage themselves in hacking and hacking and I look at it in this perspective.  If you live them to live on their own and it would be difficult for you to guide them or difficult for you to be able to ‑‑ what word should I use.  To be able to govern teams when it comes to issues into hacking and stuff.  Most of them will not even know or have the idea what the consequences are that is counting someone's network.  So there is this one thing that I am mostly encouraging and they form Clouds in most of these arrests because there was another places where the students (?) in certain participant behavior.  If you form the clouds in the investors, you end up not teaching these kids the right way and even getting the side effect of what the consequences in doing some of these acts, what if it brings, it can bring and then also now, if somebody ‑‑ with these young ones, someone who is teaching them or getting them (?) for then, you would be able to guide them and then tell them what to do and what not.  When you speak, they will listen.  Who much ‑‑ we don't do this and we don't do that.  Don't attack the system.  Don't do that.  They left on their own, but if place were to see you to be somebody who is teaching on these things, you'd be able to coping them and push them into blackhats or something.  Move them into the enterprise (?) beneficial.  So this is also some meeting I would like to add on.

>> Nicholas:  I think also doing this part for the university and try to do some adding I think is very ethical.  They will feel like they are not protected.  There are many things that could be done in that sense, I think ‑‑ I don't know if any of the other speakers wants to raise a point.

>> It's just to interview small classes of workshops while you're conducting online schools.  Discuss the basics of cyber hygiene.  A lot of the students have been told that they haven't done an easy thought on how the online system works.  They just have in children's school who can tell children what this means especially for the younger children so that we are aware of online.  That can be one of the smaller steps that people can start.

>> Nicholas:  Excellent.  This idea, you raise a very interesting idea to bring some wok shops to the schools and talk about cyber sharing.  I think as we receive it sometimes, at least in my school when I was a child, I received some groups of people talking about environmental things or we're receiving where you need to brush your teeth.  So this idea allows things are very good for the students to be aware of what are the adventures.  But if not, they will be in the context of all this when it is happening.  We didn't know about that.  So I think it's a good approach.  I have Samaila and we also want some comments.  Samaila?

>> SAMAILA ATSEN BAKO:  I strongly agree.  Show them what is right.  Something that's also or rather a God will of helping them remember this hyper tips, if it's a school that has access to e‑mail accounts, you can send them monthly newsletters and have to make it short.  Kids have a short expansion span.  You can have posts tests in your classroom and remember to lock your screen.  So that's basic tips and the classrooms are in the school.  They're seen it.  This can be implemented in the schools.

During my undergraduate studies, we had a cost called ITC11.  It was a cause of Microsoft.  It was composed for all students regardless of your program.  So if schools otherwise that, it's not just a service used new in the school, it is easier home and maybe when you graduate where you use it today and work in an environment.  It is a skill.  We could also organize the same footed steps students can learn and that way you are prepared for bolt your life, school life and life after school.

>> Nicholas:  Wow.  Very, very interesting points.  So now we are going for our third part of the meeting that will be some discussions.  So we invite all to attend these.  One on one if you want to go to microphone and make some questions.  Do we have some hands?  We have one question here.  You can go to the mic here at the conference.  State your name and your organization.

>> (?) Nigeria.  My first one, is there a will (?) in the school system so the contents are monitored is my question.  The second one is the man I spoke about, I kind of is rose theme from west Africa.  We talked about putting in place.  Thank you.

>> Nicholas.  Nice.  Who wants to address this one?

>> I wanted you to go.  He's talking about IP future end for websites.  You can just slain that.

>> Actually, I am a (?).  The main issue about this kind of future is most of the sites thankfully now use this encryption.  And some cell phones meaning the economy mode for data uses our VPN certain treatment of data before.  This is sand.  So this diminishes a lot of content, but yeah.  I agree with you.  (?) some approaches to it and children, okay.  They are going to connected to the school Internet.  If the school enter98 blocks (?) and the report wants to open it, it will switch to the mobile and we will return to the state.  If I do control it in the net wok, in the school network, it will be better than do nothing, but I think that in a lot of cases, this actually want the effect that we wanted too.

Another thing is that these ‑‑ this approach must be done.  The families must understand that they need to check the cell phone to understand what their bleeds are to what other thins are doing on their cell phone.  If you implement the right boundaries in the devices, you will diminish a lot of risk and exposure of these (?) and their data too.

>> Nicholas:  Thank you.  Somalia?  What is important is about the kits having principles or having the knowledge of what is right and wrong.  At the level of the parents, it would be true they're going to then move better than do certain things.  There will be adults and security policies.  We do not follow them.  We do not follow the policies that we advocate for.  Nowadays, the main thing is if you don't know what is right or wrong, it might not be as strict as I wonder.  Parents have a huge role to play because they cannot just leave the kids.  And that's why the parents need to (?) because they want to know how they can teach.  I think this is an issue for parents to get involved in.  They must be able to trust you to share experiences with you and let you know what they are doing so they don't have to hide.  I think the issue and ideas, Eric, you want to comment on ideas?

>> ERIC SOWAH BADGER:  Sure.  IBS (?) the cashing system.  These are two device that monitor network or the systems from malicious activities.  We have a lot of ideas.  For example, what is that?  Money test and the network.  Money test, what are they doing on the network?  You have a cost strike on your end point and desktops or laptops or machines.  You're going to have ‑‑ let's see an overview over every system that is in your network.  So if yawl are network of let's say a whole community and you have let us say ideas in place for the whole community, you may want to sit in the data is this or at SOC and have an overview of everything that is going on and when it was done, if a file was copied from a system, if there is something that is going on, somebody has spoken and that is not supposed to be open.  So, this is what an it's a detachment system that detects network activities and malicious or not, it is going on a network.  It's like you having an eye over your network environment anywhere you are.  I don't know if I explained it much clearer.  Thank you.

>> Nicholas:  We have a question that's very related to what we talked.  I will just read it and maybe you can address as we have some extra minutes.  Frank said for me as an educator, the main issue is the control of the content.  Research takes you for some content not usable for children.  Should enterprise like Google monitor effective with the contents.  How shall they do that?  Yes.  You have a question?  Okay.  Go to the mic.  Yes?  And every person in the Zoom also, if you want to raise your hands, you can also participate orally.

>> Hi, everybody.  This is Omar (?) for the record.  I would like to add some words.  I know it's about users sharing Internet for (?).  Using the technology for the kids is a sword with two edges.  They have positive and negative effects.  My question to the speakers is:  Is it times to encourage the industry to make, you know, intervention in this.  Companies like Google and YouTube and Facebook, et cetera.  I believe this is the right time to encourage them to make their part, to make their homework regarding that because aware, campaigns and using the traditional policy cybersecurity in schools, primary schools and education would plot be enough to prevent, you know, preinvestment this industry.  I believe encouraging the agreements with the community to prevent the so cybersecurity issues.  Thank you.

>> Nicholas:  Okay.  The floor is yours.

>> We know that there are children using our system, but they shouldn't.  So we will not do anything because they are circumventing ‑‑ they are not on ‑‑ they're not valid users.  Oh, they lied and incest the fake data.  When we find these children, we will kick them out, but this isn't a radical solution I myself, I think I created an Oracle a thousand years before my rated age.  And yes.  These companies need to know their products are being used and need to prepare themselves to that.  In that sense, Google actually already does control in their devices.  I configured cell phone for my sister.  It was a little bit painful and took a lot of time, but I could manage to select what apps she was going to use.  I was able to use what websites should be blocked or which one of them were exceptions to her.  But yet this was a greatest to do it.  So maybe it should be more simple, I think, because we know that everybody who has used the systems and we must be prepared to that.  Excellent.  As we're 8 minutes for the end of this session, I could read more one question we have here in the chat and then we go for the final remarks of this.  So I have a question here from Eileen.  She said hi, everyone.  Not sure this of the mentioned before, but I really like the concept of education and fliers.  There are security practices.  Do you have any suggestions at which age it would be done whether you consider children that could be fully aware on secure Internet usage.  Thank you.

>> So who wants to address this one?

>> Could address the question., a line is ‑‑ there is no real age that (?) children.  So the university the age is accepting is 18.  Did you depending on the country, sometimes the U.S. has the capacity to 16, 18 and more.  It is really possible to have one age where you can say above this age, all the children are completely hesitant of their actions online.  This depends on a lot of his like the country or culture you have grown up in, how much access.  If you have seen easy is to this, if you had been (?) still wouldn't have this idea.  I think that could probably be something that you launched but I think in terms if it is just education, it might be better to start this earlier.  It is probably where you start the elements instead of waiting for high school shall be forgotten maybe.  Yeah.

>> Nicholas:  Thank you.  Samaila.

>> SAMAILA ATSEN BAKO:  So on check think the behavior, you must have processed this through your policy and to take and the technology interventions has security measures and control.  I think we're working ‑‑ I think (?) will have to customize it.  Once you put five or six solds, their knowledge is confident.  And I know the big 10 naming have screen time IOS devices.  It has been made and generally speaking, of any system.  You might be seeing afterthoughts and it must be treated as an option.  We have ‑‑

>> I think at this point actually, we must start at the same time as our mom says.  Don't talk to strangers by the streets or look at both sights of the streets when you are crossing.  So this is not security.  The Internet is in our lives.  So it has to be the same progressions of knowledge and aware, when we learn to care about our own life.  This is not that they're to the point, but it is maybe a reference towards policies for breaking (?) for kids.

>> Nicholas:  Now I will rapidly move to the closing remarks.  I will start here.

>> I would like to thank you all for being here this debate about cybersecurity in education is essential.  The minds are there.  We need to form people that are able to understand technology and know what are the risks and things that they should or shouldn't do in the internet on the only like to protect from the outside, but also prepare the person to these unprotected work there will be.  Thank you again.

>> Nicholas:  Thank you.  Moving to Eric.

>> ERIC SOWAH BADGER:  Cybersecurities for all is everyone's obligation interest everyone's concern.  So in the closing remarks, (?) on policies that is the process, the technologies.  Ooze we get the technology in mace and we have the people creating awareness, we have some directions and we should ‑‑ it is not moving now.  So we need to adjust.  We need to also adjust ourselves to this new change and then confirm to it and just follow the quality and the directions and I thank everyone that worked hard.  Thank you.

>> Yes.  I agree with you this is a very complex thing for how the future of this will be.  I will read the comment in the chat.  Angela has another comment.  This is an issue that does not have a straight absolutely.  It should be a multi‑player 1.  It should be a partnership between service providers.  It takes a village.  We all agree on that.

And now I am going rapidly to Nidhi for the closing remarks and then Savyo and we are finished.

>> NIDHI SINGH:  Thank you, Nicholas.  I wanted to reiterate that everyone has a right to privacy and especially influence more vulnerable roles like children.  It's important the site is properly educated as so many come online.  So it's important that we have our safe guards in place to check the privacy and safe guard their data and protect them to adverse (?).

>> Nicholas:  Thank you, Nidhi.  Savyo, you are closing the session.

>> If you are wearing the hat of one school or university, please invest in capacity building for your team, for your IT and your security team, give the right roles to the right persons, separate the IT team as mentioned from the security team.  Make some investments in creating cybersecurity policy and your cyber computer (?) in the university and schools.  If you're a student, ease your voice and ask for security and privacy.  Thank you very much for being present and (?).

>> Nicholas:  Thank you, everyone.  It was a very interesting session.