DOI QR코드

DOI QR Code

A Measures to Converge Manage an Efficient Information Security Management System for Information Security Experts Manpower

정보보호 인력양성을 위한 효율적인 정보보호관리체계의 융합 관리 방안

  • Lee, Keun-Ho (Division of Information & Communication, Baekseok University)
  • 이근호 (백석대학교 정보통신학부)
  • Received : 2014.08.25
  • Accepted : 2014.11.15
  • Published : 2014.12.31

Abstract

The development in IT technology has brought about various services that are on offer based on a new service model. But such new services have increased security risks. The government is operating a program to foster experts in information security to protect assets from the threat of such risks, too. Society's awareness on the importance of information security has also grown, leading to various courses to train such personnel, including membership clubs for the fostering of such specialists. This study seeks to suggest a method that efficiently manages the convergence of running a curriculum on ISMS(information security management systems) and a club that focuses on information protection. Such converged information security courses are expected to contribute to a safer IT-based society.

IT기술의 발전으로 인하여 각종 새로운 서비스모델을 통한 다양한 서비스가 제공이 되고 있다. 이러한 새로운 서비스의 제공으로 인한 새로운 보안위협이 증가하고 있는 상황이다. 국가적으로도 보안위협으로부터 안전한 자산을 보호하기 위한 각종 정보보호 인력 양성프로그램이 운영이 되고 있다. 제도적으로도 정보보호관리체계를 통하여 새로운 서비스와 기존 서비스에 대한 안전성을 검증하면서 기관 인증을 해주고 있다. 사회적으로도 정보보호에 대한 인식이 확산되어 많은 대학이 정보보호 인력 양성을 위한 과정을 운영중이다. 아울러 정보보호 인력양성을 위한 정보보호동아리에 대한 관리도 함께 병행하고 있다. 본 연구에서는 각 대학의 정보보호 인력 양성시 필요한 정보보호관리체계(ISMS)에 대한 교과과정의 운영과 정보보호동아리의 효율적인 융합관리 방안을 제안하고자 한다. 정보보호 인력의 양성을 통하여 안전성을 좀더 보완하는 융합형 정보보안 전문 과정으로 IT기반의 사회의 안전에 기여가 예상된다.

Keywords

References

  1. SangSoo Jang, BongNam Noh, SangJoon Lee, "The Effects of the Operation of an Information Security Management System on the Performance of Information Security", Journal of Korea Institute of Information Science and Engineers", Vol. 40, No. 1, pp. 58-69, 2013.
  2. Young-Sik Bae, "A study of Effect of Information Security Management System [ISMS] Certification on Organization Performance", Journal of the Kroea Academia-Industrial Cooperation Society, Vol. 13, No. 9. pp. 4224-4233, 2012. https://doi.org/10.5762/KAIS.2012.13.9.4224
  3. Jinkeun Hong, "Analysis of Academic Curriculum of Information Security Major in Domestic University and Convergence Education Policy", Journal of Digital Convergence, Vol. 12, No. 1, pp. 599-605, 2014. https://doi.org/10.14400/JDPM.2014.12.1.599
  4. The National Assembly of the Republic of Korea, Act on Promotion of Information and Communications Network Utilization and Information Protection, ect, 2008.
  5. ISO/IEC27002, Information technology - Security techniques - Code of practice for information security management, 2005.
  6. Implementing the ISO/IEC 27001 Information Security Management System Standard, ISACA, 2007.
  7. Information Security Governance Guidance for Information Security Managers, ITGI, 2008.
  8. Jody Westby and Julia Allen, Governing for Enterprise Security(GES) Implementation Guide, CMU/SEI, 2007.
  9. The Graduate School of Konkuk University, A study of a Model for Financial Information Security on Applies Information Security Management, 2010.
  10. KCC, KISA, Information Security Management System (ISMS) certification best casebook, 2010
  11. KISA, Improvement of the Information Security Management System Certification Scheme by Incorporating Information Security Governance Concepts, 2009.

Cited by

  1. Analysis of the present state and Improvement of the Institute of Information Security Education for the Gifted vol.14, pp.12, 2016, https://doi.org/10.14400/JDC.2016.14.12.441
  2. Redifining Digital Poverty : A Study on Target Changes of the Digital Divide Survey for Disabilities, Low-Income and Elders vol.14, pp.3, 2016, https://doi.org/10.14400/JDC.2016.14.3.1
  3. Relationships among Information Resources Use, Problem Solving Ability, Nursing Information Literacy Competency in General Hospital Nurses vol.14, pp.7, 2016, https://doi.org/10.14400/JDC.2016.14.7.289