Encryption 101 for the Bureau of Learning Resources

๐ˆ๐ง๐ญ๐ซ๐จ๐๐ฎ๐œ๐ญ๐ข๐จ๐ง

It was in the year 2007, while I was in Okinawa, Japan for training of educators, when I was introduced by my fellow scholar Chubascu  Maximus Diranga from Nauru to the Internet Society, a global organization for technical experts, researchers, educators, and other stakeholders. A community engagement platform that opens a world where everyone can access and help develop a connected, borderless, limitless Internet that creates opportunity and progress for all. He gave me some ideas as to how I would grow personally and professionally once I joined. I did not pay much attention to his stories as I was too busy with my output for the course Application of Multimedia Technology for e-Education (AMT) one of the programs sponsored by the Japan International Cooperation Agency (JICA) for developing countries like the Philippines. I did not want a minor distraction to my already successful journey as non-teaching personnel of the Instructional Materials Council Secretariat (IMCS) now called the Bureau of Learning Resources (BLR). 

Only after my challenging stint in Okinawa, Japan that I was able to focus on my other extra-curricular activities and community engagement in Manila such as Google Teachers Academy, Internet Society, and many more notable organizations. However, the switch from the old education system to the K to 12 Curriculum proved to be a daunting challenge as I was assigned various tasks in the Department of Education - Central Office (DepEd-CO), i.e., coordination with the Cultural Center of the Philippines, National Commission of Culture and the Arts. I also became the focal person for the illustrators and artists activities nationwide, and the Disaster and Risk Reduction Management of our bureau, and management of Grades 1 and 2 submissions of manuscripts from different bureaus and publishers as well.

Being in-charge in different activities, I am aware that the flow of communication between and among the Department of Education (DepEd) stakeholders is a paramount concern.  Correspondence must reach the recipients with a strong degree of confidentiality and utmost care.

Early this year, Internet Society invited chapter members, who are mid-career professionals to apply for a training course for its 2020 Training program on the following topics: 

๐‘Ž) ๐ถ๐‘œ๐‘š๐‘š๐‘ข๐‘›๐‘–๐‘ก๐‘ฆ ๐‘๐‘’๐‘ก๐‘ค๐‘œ๐‘Ÿ๐‘˜๐‘ , ๐‘†๐‘’๐‘๐‘ข๐‘Ÿ๐‘–๐‘›๐‘” ๐บ๐‘™๐‘œ๐‘๐‘Ž๐‘™ ๐‘…๐‘œ๐‘ข๐‘ก๐‘–๐‘›๐‘” (๐‘€๐ด๐‘๐‘…๐‘†) ๐‘Ž๐‘›๐‘‘ ๐‘†โ„Ž๐‘Ž๐‘๐‘–๐‘›๐‘” ๐‘กโ„Ž๐‘’ ๐ผ๐‘›๐‘ก๐‘’๐‘Ÿ๐‘›๐‘’๐‘ก, ๐‘) ๐‘‚๐‘๐‘’๐‘› ๐‘†๐‘ก๐‘Ž๐‘›๐‘‘๐‘Ž๐‘Ÿ๐‘‘๐‘  ๐ธ๐‘ฃ๐‘’๐‘Ÿ๐‘ฆ๐‘คโ„Ž๐‘’๐‘Ÿ๐‘’, ๐‘Ž๐‘›๐‘‘ ๐‘) ๐ธ๐‘›๐‘๐‘Ÿ๐‘ฆ๐‘๐‘ก๐‘–๐‘œ๐‘›.

Since I am very interested in Encryption, I immediately selected the course and applied for it.  I knew from the start that this topic will help me and the office where I served to protect data especially communication letters to reach the rightful recipients. Mid-of-March, I got a letter indicating approval for the course I previously selected.

So, I am giving back what I learned from the short period of engagement with the experts of the Internet Society.  Selected participants are required to make an initiative on the topics discussed above.  In this initiative, I will try to share information about Encryption to BLR staff and other readers.  So, hang on as I delve further into the discussion of the importance of Encryption in our office lives. 

๐„๐ง๐œ๐ซ๐ฒ๐ฉ๐ญ๐ข๐จ๐ง ๐Ÿ๐ŸŽ๐Ÿ

The information on this paper are mostly culled from the Internet Society website (internetsociety.org) which gave me the inspiration to dig further on the usefulness of encryption. I will try to contextualize them into the BLR language so that it will be understood fully by our employees.  It is hoped that BLR will use encryption in its future undertaking. Please be reminded that my comments here are personal and not the opinion of my organization.

๐‘ƒ๐‘Ÿ๐‘œ๐‘ก๐‘’๐‘๐‘ก ๐ท๐‘Ž๐‘ก๐‘Ž, ๐‘ƒ๐‘Ÿ๐‘œ๐‘ก๐‘’๐‘๐‘ก ๐‘Œ๐‘œ๐‘ข๐‘Ÿ๐‘ ๐‘’๐‘™๐‘“

The Bureau of Learning Resources (BLR) has one of the biggest chunks on the  Department of Education’s budget most of these funds were spent on the procurement of manuscripts through competitive bidding of textbooks and other supplementary learning resources. The private publishers are given full authority to make learning materials that are aligned with the curriculum guide and learning competencies set by the Department of Education for public schools’ consumption. Information like bidding documents, the total number of manuscripts to be printed, the amount of the project, project proposals, and other documents and files must be protected to avoid unscrupulous people to get the necessary information and gain an undue advantage among other stakeholders.  The exchanges of information from the Department of Education and publishers and vice-versa may be compromised.  In my opinion, it is one area that documents must be protected and secured to avoid giving undue advantage to some.  Vital documents must only be accessed by intended recipients the need for encryption is of paramount importance.  At this juncture, I will be sharing with you some basic concepts of encryption and why it will help us in protecting our documents.

๐‘Šโ„Ž๐‘Ž๐‘ก ๐‘–๐‘  ๐ธ๐‘›๐‘๐‘Ÿ๐‘ฆ๐‘๐‘ก๐‘–๐‘œ๐‘›?

Encryption is the process of scrambling or enciphering data so it can be read-only by someone with the means to return it to its original state.

Encryption keeps criminals and spies from stealing information.  Although you might not realize it, you rely on encryption every day.  It protects you while you browse the web, shop online, use mobile banking,


or use secure messaging apps.

So, encryption scrambles data, but how?

Modern encryption scrambles data using a secret value or key.  The data can then be decrypted, or made readable, by using the same or a corresponding key.

For data communicated over a network, the key is typically known by both the sender and receiver, while for stored data, only the owner knows the key.

What is end-to-end encryption?

End-to-end encryption is any form of encryption in which only the sender and intended recipient can read the message. The most important aspect of E2E encryption is that no third party, even the party providing the communication service, has knowledge of the encryption keys. 

End-to-end encryption is the most secure form of encryption that you can use. So where possible, always use end-to-end encryption to protect yourself and your data. Please see the E2E flowchart to visualize its importance.

Examples of end-to-end encryption communication services include WhatsApp, Signal, Telegram, and Threema.

How else might encryption impact me?

Encryption helps protect your data from being exposed, it also helps you:

Protect your data (documents, files, etc.) from tampering;

Be sure who you are communicating with; and

Sign digital documents.

You don’t even have to use the Internet to feel the benefits of encryption! Encryption has a big impact on the global economy and your daily life.

Companies use encryption to protect their sensitive information, like customer information, trade secrets, and financial records.

Critical infrastructure, like power plants, use encryption to protect their systems and keep your lights running. 

Automated teller machines, or ATMs, use encryption to protect your financial information from criminals. 

If you look closely, many parts of your life rely on the security that encryption brings.

๐๐ซ๐จ๐ญ๐ž๐œ๐ญ๐ข๐ง๐  ๐จ๐ฎ๐ซ ๐๐š๐ญ๐š

Encrypting data could be the new normal that every organization must face.  Whether or not this is necessary in the nature of our work. Only time can tell. What is definite is that change is inevitable, and no information can ever be safe in this fast-paced digital world. Until next time. 

I will try to share other info in my next post.  See you soon.

Comments

Popular posts from this blog

Surpassed the 2100 Rating at lichess.org

Helping Cats in Need

I Will Persist Until I Succeed (by Og Mandino)