DOI QR코드

DOI QR Code

A Study on the Cybersecurity Workforce Training Program Development by Level of a Characteristic of Training Program

사이버보안 교육과정 특성에 따른 교육 프로그램 설계의 필요성에 대한 연구

  • Received : 2016.11.22
  • Accepted : 2016.12.23
  • Published : 2016.12.31

Abstract

The Korean government has implemented various policies such as establishing new major/department and operating a variety of education programs related with cybersecurity. However, it has not yet been constructed virtuous cycle that can provide appropriate education and training to professionals with the high level and quality. In this study, by surveying and analyzing satisfaction about education and training program aimed at employees in public sector who are in charge of cybersecurity, we suggest the direction of education and training for cybersecurity experts required at the national level.

Keywords

References

  1. Bishop, M., "Education in information security", IEEE of Concurrency, Vol. 8, No. 4, 2000, pp. 4-8. https://doi.org/10.1109/4434.895087
  2. Chosun, Korea has been attacked 100 million hacker attack per day, 2015.
  3. Conklin, A., "Cyber defense competitions and information security education : An active learning solution for a capstone course", Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), Vol. 9, 2006, pp. 220b-220b.
  4. Evaluation, National cybersecurity ability to react will be reinforced by government, 2015.
  5. Kang, M. H., Jun, H. J., and Kim, T. S., "Difference between information security education demand of information security employees and curriculum of information security education center", Information Systems Review, Vol. 16, No. 3, 2014, pp. 179-190.
  6. Kim, C., "A study on information security curriculum development of university", Korea Institute of Information Security and Cryptology, Vol. 11, No. 3, 2001, pp. 75-89.
  7. Kim, T. S., Kim, J. H., and Kim, M. J., "Analysis on information security educational institutions with statistical yearbook of education", The Journal of Korean Institute of Communications and Information Sciences, Vol. 29, No. 10B, 2004, pp. 880-890.
  8. Kim, J. D. and Baek, T. S., "A study on essential body of knowledge and education certification program for information security professional development", The Journal of Digital Policy and Management, Vol. 9, No. 5, 2011, pp. 113-121.
  9. KISA, A Study on the System of Fostering National Cybersecurity Manpower and on Measures for the Utilization Thereof, 2013.
  10. Kung, M., Yang, S. C., and Zhang, Y., "The changing information systems (IS) curriculum : A survey of undergraduate programs in the United States", Journal of Education for Business, Vol. 81, No. 6, 2006, pp. 291-300. https://doi.org/10.3200/JOEB.81.6.291-300
  11. Lee, M. K., "Education Contents Research and Presentation for Professional Competent Man Cultivation of Information Security", Master's Degree Thesis of Mokpo National University, 2008.
  12. Libicki, M. C., Senty, D., and Pollak, J., "Hackers Wanted : An Examination of the Cybersecurity Labor Market," RAND Corporation, 2014.
  13. MOTIE, "Motie will innovate cybersecurity scheme of some organizations related with energy policy", 2015.
  14. Newscj, [IT Column] A Study on the System of Fostering National Cybersecurity Manpower and on Measures defence ability, 2013.
  15. Rha, H. M., "An analysis of United States curriculum standard for information systems security professionals", Journal of Employment and Skills Development, Vol. 8, No. 2, 2005, pp. 21-46.
  16. Securelist, Kaspersky DDoS Intelligence Report Q2 2015, 2015.
  17. Siponen, M. T., "A conceptual foundation for organizational information security awareness", Information Management and Computer Security, Vol. 8, No. 1, 2000, pp. 31-41. https://doi.org/10.1108/09685220010371394
  18. Yang, J. M., Lee, O. Y., Lee, H. W., Ha, J. C., and Yoo, S. J., "A study on analysis and development of education program in information security major", Journal of the Korea Institute of Information Security and Cryptology, Vol. 13, No. 3, 2003, pp. 17-16, 2003.