DOI QR코드

DOI QR Code

Comparison of Security Education Program of Woman Information Security Majors of Seoul Region

서울지역 여성 정보보호전공의 보안교육 프로그램 비교

  • Hong, Jin-Keun (Division of Information Communication Technology, Baekseok University)
  • Received : 2020.09.02
  • Accepted : 2020.10.20
  • Published : 2020.10.28

Abstract

With the development of IT technology, along with the expansion of women's participation in society, the education training of information security women's workforce is becoming a very important issue. Therefore, it is important to analyze the relevant curriculum to identify the direction of fostering women's information security workforce. Therefore, in this paper, the education and training programs of the department for training women's information security workforce based in Seoul area of the Korean metropolitan area were analyzed. The main research objective of this paper is to review whether the education and training system, which consists of the department of women's information security human resources development, is in line with the direction of NIST's human resources development. The research focus was on what the women's information security department organizes courses with each security major and what task training is interested in. In addition, in this paper, we were confirmed that the curriculum of the relevant major is based on the NIST Human Resources Development Framework, and that the majors of the relevant universities have an education and training system that conforms to the relevant task. In conclusion, the related majors are judged to be focused on the development of certification evaluation personnel of convergence industry security or information security development personnel, and general cyber security personnel.

IT기술의 발전에 따라, 여성인력의 사회 참여 확대와 함께 정보보호 여성의 인력 양성은 매우 중요한 이슈가 되고 있다. 그러므로 여성 정보보호 인력 양성의 방향을 파악하기 위해 관련 교육과정을 분석하는 것이 중요하다. 따라서 본 논문에서는 국내 수도권의 서울 지역에 소재하고 있는 여성 정보보호 인력 양성 학과의 교육훈련 프로그램을 분석하였다. 본 논문의 주된 연구 목표는 여성 정보보안 인력양성 학과가 구성하고 있는 교육훈련 체계가 NIST 인력양성 방향과 부합하고 있는지 검토하는 것이다. 연구 초점은 여성 정보보안 학과가 보안 전공별로 어떤 특성을 가진 교육과정을 편성하는지, 그리고 어떤 직무 교육에 관심을 가지는지에 초점을 맞추어 연구하였다. 또한 본 논문에서는 해당 전공의 교육과정이 NIST 인력양성 프레임워크를 기준하여, 관련 대학의 전공들이 해당 직무에 부합하는 교육훈련 체계를 가지고 있음을 확인할 수 있었다. 결론적으로 말해, 관련 전공들은 융합산업 보안의 인증 평가 인력이나 정보보안 개발인력, 그리고 일반적인 사이버 보안 인력 양성에 초점을 맞추고 있는 것으로 판단된다.

Keywords

References

  1. C. Curricula. (2017). Curriculum guidelines for post-secondary degree programs in cybersecurity. New York : IEEE Computer Society. https://cybered.hosting.acm.org/wp/wp-content/uploads/2018/02/csec2017_web.pdf
  2. W. Park & S. Ahn. (2017). Enhancing Education Curriculum of cybersecurityBased on NICE. KIPS Trans. on Comp. and Comm. Sys., 6(1), 321-328. DOI : 10.3745/KTCCS.2017.6.7.321
  3. S. Hong. (2018). A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S. Journal of the Korea Institute of Information Security and Cryptology, 28(1), 249-267. DOI : 10.13089/JKIISC.2018. 28.1.249
  4. Cybersecurity Competency Model. https://www.careeronestop.org/CompetencyModel/competency-models/pyramid-download.aspx?industry=cybersecurity
  5. https://dodcio.defense.gov/Cyber-Workforce/DCWF.aspx
  6. William Newhouse, Stephanie Keith, Benjamin Scribner, Greg Witte. NICE Cybersecurity Workforce Framework. NIST SP 800-181.
  7. NICE Webinar Series How You can influence an updates to the NICE framework https://www.nist.gov/system/files/documents/2019/12/04/NICEFramework_Webinar_FINAL.pdf
  8. D. Yuan. (2017). Design and develop hands on cyber-security curriculum and laboratory. Computing Conference 2017. 1176-1179. DOI : 10.1109/SAI.2017.8252239
  9. A. Lodgher, J. Yang & U. Bulut. (2018). An Innovative Modular Approach of Teaching cybersecurityacross Computing Curricula. In 2018 IEEE Frontiers in Education Conference (FIE). 1-5. DOI : 10.1109/FIE.2018.8659040
  10. S. Naqvi, P. Sommer & M. Josephs. (2019). A Research-Led Practice-Driven Digital Forensic Curriculum to Train Next Generation of Cyber Firefighters. In 2019 IEEE Global Engineering Education Conference (EDUCON). 1204-1211. DOI: 10.1109/EDUCON.2019.8725129
  11. S. Azadegan & M. O'Leary. (2016) An undergraduate Cyber Operations curriculum in the making: A 10+ year report. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). 251-254. DOI : 10.1109/ISI.2016.7745484
  12. K. Kim, J. Smith, T. A. Yang & D. J. Kim, (2018). An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework. In 2018 National Cyber Summit (NCS). 1-7.
  13. N. Miloslavskaya & A. Tolstoy. (2016). State level views on professional competencies in the field of IoT and cloud information security. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). 83-90.
  14. Conklin Wm Arthur, Cline Raymond E, Roosa Tiffany. (2014). Re engineering cyberseucirty educationin the US : An analysis of the critical factors. System Sciences (HICCS) 47th Hawaii International Conference 2014. 2006-2014.
  15. I. Alsmadi & M. Zarour. (2018). Cybersecurity programs in Saudi Arabia: Issues and Recommendations. In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). 1-5.
  16. B. D. Caulkins, K. Badillo-Urquiola, P. Bockelman & R. Leis. (2016). Cyber workforce development using a behavioral cybersecurity paradigm. In 2016 International Conference on Cyber Conflict (CyCon US). 1-6.