{"id":1563,"date":"2022-09-19T18:07:01","date_gmt":"2022-09-19T18:07:01","guid":{"rendered":"http:\/\/10.64.82.68\/ictinov-site\/?page_id=1563"},"modified":"2022-09-19T18:10:57","modified_gmt":"2022-09-19T18:10:57","slug":"mobile-cryptography-made-easy-course-university-of-malaya","status":"publish","type":"page","link":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/mobile-cryptography-made-easy-course-university-of-malaya\/","title":{"rendered":"Networks and Security course, University of Malaya"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" src=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/04\/pink-ribbon.jpg\" alt=\"\" class=\"wp-image-833\" width=\"882\" height=\"22\" srcset=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/04\/pink-ribbon.jpg 800w, http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/04\/pink-ribbon-300x8.jpg 300w, http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/04\/pink-ribbon-768x19.jpg 768w\" sizes=\"(max-width: 882px) 100vw, 882px\" \/><\/figure>\n\n\n\n<h4>Description of the course<\/h4>\n\n\n\n<p>The course provides a practical survey of network security applications and standards. It emphasizes applications that are widely used on the internet and for corporate networks. It further emphasizes standards, especially internet standards that have been widely deployed. The course takes placed virtually.<\/p>\n\n\n\n<h4>Description of the participants<\/h4>\n\n\n\n<p>The course targets students enrolled in the Master\u2019s of Data Science program. In semester 2 of the 2021 \u2013 2022 academic years 67 students attended the course, some of whom were enrolled full-time and some part-time in the Master\u2019s program as they work in parallel with their studies, mostly in the IT field. The course is an elective. The student body was multicultural, with individuals originating from China, Egypt, Bangladesh, Pakistan, Saudi Arabia, Indonesia and Malaysia. Most of the students were in their final year of studies, undertaking their project paper required for their graduation.<\/p>\n\n\n\n<h4>Description of gamified design thinking activities<\/h4>\n\n\n\n<p>Each student was assigned an individual or group project in cryptography with applications in network security. Active learning was the predominant pedagogical methodology deployed in the course.<\/p>\n\n\n\n<p>Students were encouraged to present their ideas and receive feedback in an interactive session. They further demonstrated their ideas by developing a multimedia prototype using a programming language of their choice.<\/p>\n\n\n\n<p>Activities took place in groups. Group members were jointly responsible for making the project a success. Through the project, students learned how to apply the cryptography techniques, including symmetric, asymmetric, hash and cypher block mode, and presented their findings.<\/p>\n\n\n\n<p>Students engaged in the following steps.<\/p>\n\n\n\n<p><strong>Step 1. Researching mathematical applications for cryptography.<\/strong><\/p>\n\n\n\n<p>During the 1<sup>st<\/sup> part of the educational process students used the Cryptool\u00ae application for interactive learning on cryptography. Cryptool\u00ae offers 2 interactive games named Number Shark. The purpose of the games was to for the students to understand the concept of prime number factorization of integer numbers, which is mainly used in public key cryptography. More specifically, students selected the size of a shell square. Starting with a minimum of 20 numbers, they gradually increased the size. The biggest shell size supported in the application is 9.999, however solving such a large puzzle would take years. Students were asked to take no more than 3 minutes to finish the 20 number selection. They played against the application and tried to beat the shark. If any of the selected numbers had any real factors, those factors would eaten by the shark. For numbers larger than 100, students typically formed groups of no more than 5 individuals. The game was very useful and enhanced familiarization with prime number selections in RSA and Diffie &amp; Helman public key cryptography. In addition to the Number Shark application, students used interactive tools such as Digital Signature Demonstration and Number Theory Interactive Learning.<\/p>\n\n\n\n<p><strong>Step 2. Researching the state of the art on network security applications.<\/strong><\/p>\n\n\n\n<p>During the 2<sup>nd<\/sup> part of the course students engaged in a group-based active learning project. Students were asked to select recent applications or techniques in network security. Most selected a multimedia application, such as Canva\u00ae or any other video editing software, to present their work. The activity encouraged students to creatively present and explain their findings, which contributed to their understanding of network security and to the improvement of their communication skills. Students were given instructions in tutorial sessions in which study questions were introduced. They presented the results of their work using slides and video presentations.<\/p>\n\n\n\n<p><strong>Step 3. Empathy and implementation.<\/strong><\/p>\n\n\n\n<p>Students worked on assignments, in which they used Cryptool\u00ae and Python\u00ae to solve problems assigned by the instructor. They worked in groups looking at real-life applications of cryptography. Educators encouraged students to apply empathy by asking them what they believe are the key challenges related to the application of cryptography for network security.<\/p>\n\n\n\n<p>Some of the projects proposed by students include:<\/p>\n\n\n\n<ul><li><strong>Cyberattack case studies<\/strong>.Case studies on recent cyber-attack in network security and their solutions.<\/li><li><strong>Social media security<\/strong>. Case studies on social media security challenges and suggested solutions.<\/li><li><strong>Applications of zero trust networks<\/strong>. Breaking down large networks into smaller ones that do not overlap to minimize the consequences of a corporate network security breach.<\/li><li><strong>Network security recent issues<\/strong>. Case studies on network security in the modern world and suggested solutions.<\/li><li><strong>Personal privacy in social networks<\/strong>. Case studies on personal data privacy and suggested solutions.<\/li><li><strong>Quantum cryptography and its applications<\/strong>. A review on of recent developments in the area.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" src=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-1.png\" alt=\"\" class=\"wp-image-1565\" width=\"260\" height=\"239\" srcset=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-1.png 401w, http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-1-300x275.png 300w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" src=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-2.png\" alt=\"\" class=\"wp-image-1566\" width=\"269\" height=\"247\" srcset=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-2.png 401w, http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-2-300x275.png 300w\" sizes=\"(max-width: 269px) 100vw, 269px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" src=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-3.png\" alt=\"\" class=\"wp-image-1567\" width=\"276\" height=\"253\" srcset=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-3.png 405w, http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-3-300x275.png 300w\" sizes=\"(max-width: 276px) 100vw, 276px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" src=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-4.png\" alt=\"\" class=\"wp-image-1569\" width=\"264\" height=\"242\" srcset=\"http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-4.png 415w, http:\/\/10.64.82.68\/ictinov-site\/wp-content\/uploads\/2022\/09\/mobile-crypto-screen-4-300x275.png 300w\" sizes=\"(max-width: 264px) 100vw, 264px\" \/><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Description of the course The course provides a practical survey of network security applications and standards. It emphasizes applications that<\/p>\n<p><a href=\"http:\/\/10.64.82.68\/ictinov-site\/index.php\/mobile-cryptography-made-easy-course-university-of-malaya\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\">Networks and Security course, University of Malaya<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/pages\/1563"}],"collection":[{"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/comments?post=1563"}],"version-history":[{"count":4,"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/pages\/1563\/revisions"}],"predecessor-version":[{"id":1571,"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/pages\/1563\/revisions\/1571"}],"wp:attachment":[{"href":"http:\/\/10.64.82.68\/ictinov-site\/index.php\/wp-json\/wp\/v2\/media?parent=1563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}