Geek magazine hacker daily blog

2 years, 11 months ago
In article operation of application University of Kaspersky 2020 for a social network of VKontakte is considered: target audience, features of work, the considered subjects.

Entering the Kaspersky Lab building the first that is evident - it is a statue of an elephant. A statue, it is so proud flaunting in the foyer, the Triumphal elephant is Salvador Dalí's work under the name. As well as many works of authorship of Dali, a sculpture it is executed in style of surrealism, and apparently in the photo, the elephant costs on long thin legs. The specialist in information technology field, it is not important even to what specifically he belongs to the direction (the programmer, the specialist in the area a web, the system administrator, the teacher of information science, etc.) if he is not familiar with bases of information security something is similar to this elephant: at all the solidity and validity also all its reputation (both business, and personal), an abyss all its documentation can fail, he can fall a victim – any swindler blocking its data. The triumphal IT elephant on brittle legs is always vulnerable before the fact that to him can put a pig in the form of a malware.

Fig. 1. A triumphal elephant at office of Kaspersky Lab (the author: Salvador Dalí)

Modern education system as average, and the highest does not pay enough attention to questions of information security. The exception is made only by those who consciously made safety of IT-systems the specialty. But such it is a little. And if "narrow" specialists in information security field (as, by the way, and those persons which counteract them) can be assimilated to high quality athletes, then it is necessary to be engaged normal sports, in this case, in understanding of bases of IT safety in everything — as for saving of the data on the computer and gadgets, and for saving of the nerves.

The Kaspersky Lab was always generous on that to share the knowledge: in due time there were cycles of webinars which passed on subjects, actual in the field of safety, earlier, online the course "Actual Threats of a Computer Security" is announced now. And here one of the last projects – Kaspersky's 2020 University, the free application working on a social network of VKontakte.

The University 2000 application represents the training course raising a set of the questions of information security, and those problems from the field of information science (and sometimes and psychology) which are on intersection with problems of a computer security. The simplified diagram of the curriculum is given in fig. 2.

Fig. 2. Simplified diagram of the curriculum

Execution of tasks, successful passing of testing after each subject and social missions (a repost on the wall of information with the link to material of the blog of Kaspersky Lab) assumes accumulation of points. Points can be exchanged for the real prizes and rather interesting: these are figurative winchesters and other valuable prizes. The separate block of "gifts" is made by products of the company: antiviruses with the license for a year (for a certain percent won this prize, it is the first not stolen version of the proprietary software). Also points can be exchanged for two-hour training at office of the company, excursion on Kaspersky Lab or on personal meeting with the founder and the CEO of the company Evgeny Kaspersky.

The name of the application in which the word University appears, assumes that in it there have to be students. Let's try to describe categories of users which make potential target audience of the application.

Students. As it was already mentioned, the application is expected users of VKontakte — a social network which is the most popular in the student's environment. The students who honesty worked a course of University of Kaspersky can decide on subjects of term papers, both in information technology field, and in the field of psychology and pedagogics. The considerable part of prizes of the application, is expected active youth.

Parents. The considerable part of material is expected parents. In order that they knew how to secure the children in the Network. And in order that they could reduce the level of threats for the aged parents. Questions of a kiberbulling, social engineering are a minimum of information literacy which each parent has to master. Acquaintance to the given analytics, what websites are popular with children, can surprise parents very much. What with it to do what software to use for decrease in risks what problems not to solve by any program or technical means – it is considered it is aware of University.

School students. Being one of the most active Internet users (but not seniors at the same time, and the most trustful users), children are the potential victims for those whose purpose is attack to foreign systems or experiments in the field of social engineering. Consideration is aware of such questions as possible threats at computer games which appear from there where you do not wait for them in any way, safety during the work on social networks along with a game manner of application programming Kaspersky's University, assuming competitive accumulation of points and a real opportunity to bypass "students" not virtual, but the presents – those reasons which cannot but "hook" on school students what interest in the sphere of IT is extraordinary high (and, unfortunately, it is not satisfied on due level within normal lessons). Besides school students receive an excellent occasion, sitting up to declare at the computer that they not just sit VKontakte, and increase the level of the information literacy.

Users of smartphones, gadgets and other "smart" devices. Users of smartphones and popular gadgets, will obtain valuable information on protection of the devices, actions in case of their loss. Material is structured so that safety issues are considered also for users of Android and other widespread operating systems of gadgets. The separate direction by which it is difficult to pass is the Internet of things: smart TVs, refrigerators with Internet connection and what all this threatens the buyer who is not suspecting about dangers with.

There is a question – and what it is necessary for Kaspersky Lab for? It is difficult to give a definite answer. It is possible to offer that it at the same time both the social and educational and advertizing draft, a method of promoting of the blog and products of the company. Anyway, it is that exceptional case, when there is no losers. Everyone in own way wins.

The fair assessment of the application, assumes not only the description of its advantages, but also those characteristics which can be improved. At all advantages of University of Kaspersky it is necessary to tell that there are periods of "idle time" of the application caused by failure of the server (in attempt of an input in the application the report is given that the input is not possible yet since the rector pushes the flame speech to students on a lawn) and the fact that waiting of separate groups of prizes is possible. Also it should be noted high-quality work of official support desk of the application: all revealed notes in operation of application on which I informed quickly improved.

Summarizing, it is possible to claim that the University of Kaspersky 2020 is the successful application which is organically combining qualitative content from leading experts in information security field with training elements in a game manner with an opportunity to win valuable prizes. The project can be considered as one of the most successful methods of promoting of knowledge in Inerneta, at a slow pace towards intellectualization of a social network of VKontakte, and on condition of similar steps from others the IT company on postsovestky space, capable to continue not growing track to increase of level of information culture of users.
Photo from personal archive of the author

This article is a translation of the original post at
If you have any questions regarding the material covered in the article above, please, contact the original author of the post.
If you have any complaints about this article or you want this article to be deleted, please, drop an email here:

We believe that the knowledge, which is available at the most popular Russian IT blog, should be accessed by everyone, even though it is poorly translated.
Shared knowledge makes the world better.
Best wishes.