Topic outline


  • Module Seven: IT Competency

       

    Warm Pacific Greetings, Salutations chaleureuses du Pacifique and welcome to the  CREWS Initiative SMARTMET Online Learning Courses.
    SPREP is the regional hub for Meteorological services in the Pacific and host of the PCC , our immediate audience will be the staff from the NMHSs (not limited to IT staff) and SPREP staff directly and indirectly involved in supporting Pacific SIDS.. The course content will include the fundamentals of systems and network administration, website development and maintenance, scripting, etc. Content shall be delivered by taking into consideration system and application environments in place at NMHSs and SPREP and have as its main objective enhancing the sustainability of IT tools in these institutions, and building on regional IT technical capacity.


    The objectives of the SMARTMET Training are:

    1.      To provide hands-on training to selected NMSs in the relevant Information Technology programmes associated with the operation of the SCOPIC, TKDB, Website technologies and use of WMO Information System.
    2.      To equip staff with the necessary skills and knowledge to
          • train other staff members on how to provide IT support for the operation of the above weather systems
          • adopt a security and risk based approach to IT operations and use of emerging technologies;
    3.      This will also be an opportunity for participants to share their experiences on the benefits and challenges in using these system in particular and how these could be addressed going forward.
    There are Seven Modules/Courses of the SMARTMET Training.






  • Information Security and Cybersecurity are terms that have been used interchangeably by many but it must be noted that the two have some differences. Information Security is usually used in the context of the traditional internal ICT environment of an organisation. Cybersecurity is different in that it recognises that orgnisations security perimeter now extends beyond the traditional boundaries with the introduction of mobile, remote, IoT and cloud technologies. Cybersecurity programs recognize that organizations must be vigilant, resilient, and ready to protect and defend every ingress and egress connection as well as organizational data wherever it is stored, transmitted, or processed. In this topic, we will discuss the fundamental concepts of cybersecurity and information security. We will also discover the difference between cybersecurity threats, vulnerabilities, and exploits, and explore the most common cybersecurity threats, as well as common software and hardware vulnerabilities