Information security education for students in Japan

Similar documents
Basic Plan on Measures for Providing Safe and Secure Internet Use for Young People

Information Security Outreach and Awareness Program. July 8, 2011 Established by the Information Security Policy Council

Cyber Security in Japan (v.2)

Paper presented at the 9th AGILE Conference on Geographic Information Science, Visegrád, Hungary, 2006

JAPAN CONTENTS Background Information on the National Curriculum Standards in Japan

FUJITSU Education Solution K-12 School Business Support Services for Elementary and Junior High Schools

Guidelines for smart phones, tablets and other mobile devices

Information Security Human Resource Development Program

SHS Annual Information Security Training

Career Education in Korea

Cyber Security Awareness. Internet Safety Intro.

Trends and Tactics in Cyber- Terrorism

How To Handle Your Phone Information Safely

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

The Ministry of Information & Communication Technology MICT

How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.

ACCEPTABLE/ RESPONSIBLE USE POLICY IIBE

Roger s Cyber Security and Compliance Mini-Guide

2011 NCSA / McAfee Internet Home Users Survey

YOUR PRESENTERS TODAY S WORLD. Maryly Skallos Technology Coordinator St. Thomas the Apostle School mskallos@stthomasgr.org

Acceptable Use of Electronic Networked Resources & Internet Safety

Coventry Public Schools Digital Technology Acceptable Use & Internet Safety Policy

Atlantis Charter School

Verification Report. (Summary)

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

Course Overview and Outline

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Christian Academy of Knoxville Technology Responsible Use Agreement

Internet threats: steps to security for your small business

The Revisions of the Courses of Study for Elementary and Secondary Schools

Diocese of Orlando / Office of Catholic Schools Student Technology Responsible Use Policy

i-safe CURRICULUM SCOPE Elementary Grades K - 5

Teaching Digital Citizenship

How To Ensure Your School Is Safe Online

Human Resources Development in the Field of Cyber Security

National Cyber Crime Unit

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

Cyber Safety Education in High Schools

Ministry of Education & Human Resources Development Korea Education & Research Information Service

GREENWICH PUBLIC SCHOOLS Greenwich, Connecticut

Policy No: 2-B8. Originally Released: Date for Review: 2016

Malware & Botnets. Botnets

Youth Online Behavior

Social Media Guidelines Resource

Tertiary Education in Japan: How it Looks Globally

How To Protect The Time System From Being Hacked

Fujitsu s Approach to Cloud-related Information Security

How To Protect Information Security In Japanese Government Computers

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

4 Steps to Effective Mobile Application Security

Electronic Communications Guidance for School Staff 2013/2014

Treutlen County School System Soperton, GA. Three-Year Technology Plan July 1, 2014-June 30, 2017

Countermeasures against Spyware

Bellevue University Cybersecurity Programs & Courses

Countermeasures against Bots

Top 10 Tips to Keep Your Small Business Safe

The Effect of Learning Programming with Autonomous Robots for Elementary School Students

SURVEY OF SCHOOLS: ICT IN EDUCATION COUNTRY PROFILE: ICELAND

Rogers Insurance Client Presentation

Code of Virginia, 1950, as amended, Sections , :1, , , and

Cyber Security Best Practices

How-To Guide: Cyber Security. Content Provided by

Patrick Gray Principal Security Strategist DATA SECURITY CHALLENGES IN THE ALL TOO PUBLIC AND NOT SO PRIVATE SECTORS

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1

Science teacher education in Japan: Implications for developing countries

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

Bring your Own Device Information and Policy 2015

Aiming at the establishment of a new Japanese-style Doctor of Education Program: Attempts of Aichi University of Education and Shizuoka University

Information Security Measures for ASP/SaaS - From the Report from the Study Group on ASP/SaaS Information Security Measures -

INFRAGARD.ORG. Portland FBI. Unclassified 1

Presentation Objectives

The Negative Effects of Social Media on Children and Young Adults

Emerging Trends in Malware - Antivirus and Beyond

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Computer Facilities and External Networks Acceptable Use by Students

Computer Crime & Security Survey

Cybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Acceptable Media Use and Bring Your Own Device (BYOD) Policy

National Center for Teachers Development (NCTD) Purpose

ICT Security Policy for Schools

2012 Endpoint Security Best Practices Survey

Learning Opportunities in Japan

Small businesses: What you need to know about cyber security

Fujitsu Group s Information Security

The Four-Step Guide to Understanding Cyber Risk

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

ITAR Compliance Best Practices Guide

Survey on the Internet Security Awareness

Global IT Security Risks: 2012

NEBO SCHOOL DISTRICT BOARD OF EDUCATION POLICIES AND PROCEDURES

Montana Tech Escalation Procedures for. Security Incidents

Global Corporate IT Security Risks: 2013

Students Acceptable Use Policy for Electronic Resources Rules Summary

district Legal Networking

Transcription:

Information security education for students in Japan Introduction This article aims to introduce the current situation of elementary and secondary school education on information security in Japan, as well as to provide a brief introduction to the environment surrounding Japanese students. Courses of Study have been stipulated as the general standard for the curriculum to ensure that Japanese children receive the same level of education wherever they are in Japan. These Courses of Study are stipulated by a law called the School Education Act under the jurisdiction of the Ministry of Education, Culture, Sports, Science and Technology (MEXT). The Courses of Study provide the purpose and the general content of all subjects that students study according to their stage of development in school, and range from kindergarten to upper secondary schools. The current Course of Study was presented by the MEXT in 958 and has been revised every 0 years. The most recent revisions were in 008 for kindergartens, elementary schools, and lower schools, and in 009 for upper secondary schools and schools for Special Needs Education. This revision was stipulated in the Central Council for Education s report on Improving Courses of Study for Kindergartens, Elementary Schools, Lower and Upper Secondary Schools, and Schools for Special Needs Education, which was based on the revision of the School Education Act.. Current state of information and communication technology (ICT) use by Japanese students -. Increase of information security threat According to Figure, which shows infection rates by country/region in 0, Japan has been one of the relatively healthier countries in the world. However, the environment surrounding ICT in Japan has been changing day by day, and information security threat has increased too. It can be said that about 47 million viruses have been detected so far; nearly 8 million new malware were found in the second quarter of 0. Figure Infection rate by country/region

The number of young people who have their own mobile phone has been on the rise in Japan. Of the 47.4% of young people in elementary school to upper secondary school, 4.% of elementary school students and 46.% of lower secondary school students have their own mobile phone, the Cabinet Office has reported. Even though less than half of the students have their own mobile phones, malware that targets mobile phones or smart devices continues to spread. Other than the problem previously mentioned, as the cyber security threat associated with social media dissemination like Facebook and Twitter rises, it will become increasingly difficult to protect against such threats. -. Use of ICT by the younger generation The number of Internet users in Japan reached 96.5 million at the end of 0, an increase of 40,000 users from the end of 00, and the Internet population penetration rate was 79.5%. In addition, Figure X shows that the Internet population penetration rate between the ages of to 9, corresponding to students of lower and upper secondary school in Japan, reached almost 00% (97.%), and the rate for ages 6 to, corresponding to elementary school students, is even about 70%. Students are coming into contact with ICT equipment at an increasingly early age. The percentage of young people who started using a personal computer in elementary school is 8.7%, with 0.8% starting to use them in junior high school. According to the Cabinet Office survey, the percentages of Internet use in the United States for ages 6 to and 4 to 7 are about 7.06% and 84.8% respectively, while in Korea the percentages of use are about 86% for ages to 9, and 99.9% for teenagers. 0 thousand people % Figure Transition in the number of Internet users and the population penetration rate

Figure Transitions in age groups of Internet users and the population penetration rate. Awareness of information security According to the statistics of the Ministry of Internal Affairs and Communications, those who reported anxiety due to using the Internet, who were worried and feeling a little uneasy, accounted for about half (48.7%). In detail, 7.% were concerned about virus infection, 59.% were uncertain how far security measures should be taken, and 6.4% were unable to specifically understand threats to security. These results show that anxiety about information security is still high among Japanese people. Figure 4 Matters of concern among households that use the Internet (multiple answers permitted) As described above, Japanese people suffer from anxiety about information security, but about 90% (88.%) of Japanese people are planning to introduce some sort of information security measures. However, as of now, in terms of countermeasures, such as a concrete plan on what needs doing to eliminate concerns about information security, has been left to each individual. This is not limited to adults; currently, the presence or absence of the implementation of information security measures, and guidelines on how to use the Internet, is left to even children of elementary and junior high school age to figure out.

Figure 5 Implementation of information security measures among households (multiple answers permitted). Information security education in the school curriculum The importance of computer education in Japan was first emphasized in 985, with related Ministry notices issued in 988 and 989. The Course of Study based on the 989 notice, Basic information was first established in the Lower Secondary school curriculum as an optional subject. After that, Information and Computers became a compulsory subject under the Course of Study subject Technology and home economics based on the notification of 998, and the subject Information was introduced in upper secondary school as a common subject. With the enforcement of Basic Law on the Formation of an Advanced Information and Telecommunications Network Society (IT Basic Law) in 00, e-japan Strategy, New IT Reform Strategy and i-japan Strategy 05 were developed as national ICT strategies. Under the 998 notification regarding the subject Technology and home economics, the course Information and Computers aims to introduce students to the basic knowledge and technologies for the appropriate use of ICT, make students understand the relationship between ICT and their life and information ethics, and develop the ability and attitude to utilize information tools on their own initiative. Lower secondary school students have to learn the following content: ) roles that ICT play in daily/school life and industries (characteristics of information technology devices like computers and information networks, the relationship between daily life and computers, the impact of computerization on society and daily/school life, information ethics, etc.); ) basic frameworks, functions and operations of computers (to know basic frameworks and functions of computers and be able to operate them etc.); ) computer use (to know actual usage and process information by means of software, etc.); and 4) information and telecommunications networks (to know ways to deliver and utilize information, to collect, evaluate, treat and transmit information etc.). Students also have the option of taking a course in either 5) utilizing multimedia through the use of computers, or 6) 4

measuring and regulating computer programs depending on their interests. These curriculums cover all information education in schools, but as for information security education, education regarding information ethics is part of mainstream education. Information ethics education has to be learnt systematically from elementary school to upper secondary school. Following the situation, MEXT presented model curriculums regarding information ethics education in 007. This model includes objectives and learning of each school stage and grade, and classifies them into five categories: ) ethics of information-based society, ) understanding and compliance of laws, ) knowledge for safety, 4) information security, and 5) construction of a public network society. The following table shows how the information security curriculum is organized. Stage Grade (age 7) (age 8) Elementary School 4 5 (age 9) (age 0) (age ) Know the basics of information security needed for daily life Understand the importance of authentication, and use it appropriately Do not give your passwords to anyone Do not leave your laptop unsupervised. 6 (age ) Able to use ICT that is not accessed illegally Understand that a person has to keep one s password to oneself Learn how to keep personal information from being leaked Implement measures to keep information secure Learn how to prevent information from being crushed and leaked. Learn about computer viruses Do not give your laptop to others Learn the risks of downloading anything from the Internet. Stage Lower Secondary School Upper Secondary School Grade (age ) (age 4) (age 5) (age 6) (age 7) (age 8) Acquire fundamental and basic knowledge of information security Acquire fundamental knowledge of Acquire basic knowledge of information security, then act information security appropriately Learn how private information that is leaked out could be used for bad ends Learn how to protect information by coding, and utilize this knowledge Implement measures to keep information secure Learn to develop a proactive plan, emergency responses, Learn to build a fundamental security plan backward incidence regarding information security Learn to prevent information leaks caused by unauthorized access Learn to build proactive plan, emergency response, backward incidence regarding viruses Know and implement techniques to protect laptops and information adequately Implement measures against network-mediated attacks (firewalls, etc.) Figure 6 Information security education 5

4. Challenges There are some challenges to improving information security education at each stage of education: ) at the kindergarten stage, since schools often focus most of their attention on familiarizing students with ICT, there is a difference between each school s efforts regarding information education, and instruction on information ethics is not enough. ) At the lower secondary school stage, as either of the two subjects Utilizing Multimedia and Measurement and Regulation of Computer Programs (as mentioned above) may be selected by each school, there is a gap in students information literacy when they graduate. ) At the teacher training stage, where teachers ability to teach information education must be fostered and supported with on-going training. And 4) at all the stages of school education, instruction regarding information ethics is not enough. In recent years, there have been many cases of students getting into trouble in this area, like defamation and bullying on the Internet, as well as crimes and the dissemination of illegal and/or harmful information on the Internet. However, information security education needs to be addressed by a variety of stakeholders, including teachers, students, parents, and communities. REFERENCE: Ministry of Internal Affairs and Communications, Japan (0), White Paper 0, Information and Communications in Japan Information-technology Promotion Agency, Japan (0), White Paper on IT Human Resource Information-technology Promotion Agency, Japan (0), Information Security Reader, Jikkyo Shuppan Information-technology Promotion Agency, Japan (0), White Paper on Information Security Microsoft Security Intelligence Report Volume 5, January through June 0 http://www.microsoft.com/security/sir/default.aspx McAfee Threats Report: Second Quarter 0 http://www.mcafee.com/ca/resources/reports/rp-quarterly-threat-q-0.pdf Cabinet Office (0), Survey results about internet usage environment of Youth in Japan <Akiko Kohgo> 77 6