﻿{"id":5658,"date":"2025-06-12T09:40:00","date_gmt":"2025-06-12T09:40:00","guid":{"rendered":"https:\/\/uni.hi.is\/helmut\/?p=5658"},"modified":"2026-01-31T09:44:28","modified_gmt":"2026-01-31T09:44:28","slug":"childrens-university-visiting-computer-science-department","status":"publish","type":"post","link":"https:\/\/uni.hi.is\/helmut\/2025\/06\/12\/childrens-university-visiting-computer-science-department\/","title":{"rendered":"Children's university visiting Computer Science department"},"content":{"rendered":"<p>On 11th of July 2025, participants of the <a href=\"https:\/\/ung.hi.is\/is\">Children's university (H\u00e1sk\u00f3li unga f\u00f3lksins)<\/a> visited the Computer Science department. We did there a mini tabletop exercise on critical infrastructure in Iceland and after that authentication was discussed, e.g.: <\/p>\n<ul>\n<li>use different passwords for different services -- do not use the same password everywhere (if your password got stolen, it will by tried at all kinds of other web pages, so if you use the same password everywhere, all other services can be accessed using your identity,<\/li>\n<li>use two factor authentication: even if your password got stolen, an attacker would still need the second authentication factor, e.g., would need to steal your phone that contains some authentication app as second factor in addition to your password.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/06\/huf2025_cysec-670x502.jpg\" alt=\"\" width=\"670\" height=\"502\" class=\"alignnone size-medium wp-image-5661\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/06\/huf2025_cysec-670x502.jpg 670w, https:\/\/uni.hi.is\/helmut\/files\/2025\/06\/huf2025_cysec-1024x768.jpg 1024w, https:\/\/uni.hi.is\/helmut\/files\/2025\/06\/huf2025_cysec-150x112.jpg 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/06\/huf2025_cysec-768x576.jpg 768w, https:\/\/uni.hi.is\/helmut\/files\/2025\/06\/huf2025_cysec.jpg 1331w\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><\/p>\n<hr>\n<p>This event is in the context of our <a href=\"https:\/\/uni.hi.is\/helmut\/cybersecurity\/\">cybersecurity activities<\/a> and the ECCC\/EU co-funded projects <a href=\"https:\/\/uni.hi.is\/helmut\/research\/icedef-defend-iceland\/\">ICEDEF \u2013 Defend Iceland<\/a> and <a href=\"https:\/\/uni.hi.is\/helmut\/research\/eyvor-ncc\/\">Eyv\u00f6r \u2013 the National Cybersecurity Coordination Centre of Iceland (NCC-IS)<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png\" alt=\"\" width=\"150\" height=\"49\" class=\"alignright size-thumbnail wp-image-5148\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo-150x49.png 150w, https:\/\/uni.hi.is\/helmut\/files\/2025\/01\/ECCC_logo.png 442w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><br \/>\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg\" alt=\"\" width=\"150\" height=\"31\" class=\"alignright size-thumbnail wp-image-3911\" srcset=\"https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-150x31.jpg 150w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-670x141.jpg 670w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS-768x161.jpg 768w, https:\/\/uni.hi.is\/helmut\/files\/2023\/09\/EN-Co-funded-by-the-EU_POS.jpg 991w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 11th of July 2025, participants of the Children's university (H\u00e1sk\u00f3li unga f\u00f3lksins) visited the Computer Science department. We did there a mini tabletop exercise on critical infrastructure in Iceland and after that authentication was discussed, e.g.: use different passwords for different services -- do not use the same password everywhere (if your password got [&hellip;]<\/p>\n","protected":false},"author":512,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[177208,210],"tags":[],"class_list":["post-5658","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-teaching"],"_links":{"self":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/users\/512"}],"replies":[{"embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/comments?post=5658"}],"version-history":[{"count":9,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5658\/revisions"}],"predecessor-version":[{"id":6122,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/posts\/5658\/revisions\/6122"}],"wp:attachment":[{"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/media?parent=5658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/categories?post=5658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uni.hi.is\/helmut\/wp-json\/wp\/v2\/tags?post=5658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}