DOI QR코드

DOI QR Code

A Study on the Infringement Incident Response Curriculum Model in IoT Environment

사물인터넷 환경에서 침해사고대응 교육과정 모델에 관한 연구

  • Keun-Ho Lee (Div. of Computer Engineering, BaekSeok University)
  • 이근호 (백석대학교 컴퓨터공학부 )
  • Received : 2023.03.30
  • Accepted : 2023.05.24
  • Published : 2023.06.30

Abstract

The IoT environment is very vulnerable to security threats, and if an intrusion occurs, it can cause great damage. In order to strengthen the security of the IoT environment, a curriculum that considers the characteristics of the IoT environment is needed. In this paper, we propose a curriculum model for cyber incident response in the Internet of Things environment. The proposed curriculum model was designed as a model for security threats in the IoT environment, types of intrusion incidents, and incident response procedures. The proposed curriculum model is expected to contribute to improving security awareness in the IoT environment and fostering cyber incident response experts in the IoT field. The proposed curriculum model strengthens the security of the IoT environment and is expected to be safe through security incident response in the IoT.

사물인터넷 환경은 보안 위협에 상당히 취약하며, 침해사고가 발생하면 큰 피해를 줄 수 있다. 사물인터넷 환경의 보안을 강화하기 위해서는 사물인터넷 환경의 특성을 고려한 교육과정이 필요하다. 본 논문에서는 사물인터넷 환경에서의 침해사고대응 교육과정 모델을 제안하고자 한다. 제안된 교육과정 모델은 사물인터넷 환경의 보안 위협, 침해사고의 종류, 침해사고대응 절차 등을 위한 모델로 설계하였다. 제안된 교육과정 모델은 사물인터넷 환경에서의 보안 인식을 향상시키고, 사물인터넷 분야에서의 침해사고대응 전문가를 양성하는 데 기여가 예상된다. 제안된 교육과정 모델은 사물인터넷 환경의 보안을 강화하고, 사물인터넷에서의 침해사고대응을 통한 안전성이 기대된다.

Keywords

Acknowledgement

이 논문은 2023학년도 백석대학교 학술연구비 지원을 받아 작성되었음

References

  1. H.W.Kim. "Intrusion response methods in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.28, No.4, 739-749, 2018. 
  2. J.H.Lee, "Security threats and response methods in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.27, No.4, 697-706. 2017. 
  3. Y.M.Park, "Training program model for intrusion response in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.29, No.4, 795-804. 2019.  https://doi.org/10.13089/JKIISC.2019.29.4.795
  4. "The Internet of Things (IoT): A Security Perspective", by Andrew S. Tanenbaum and Maarten van Steen, in "The New Internet", edited by Andrew S. Tanenbaum and Maarten van Steen, 2010. 
  5. "Security in the Internet of Things", by Richard E. Smith, in "The Internet of Things: A Systems Perspective", edited by Richard E. Smith, 2015. 
  6. "Security for the Internet of Things", by David A. Wheeler and Richard E. Smith, 2016. 
  7. Korea Internet & Security Agency, a study on estimating the economic and social costs of cyber infringement accidents(2021.12) 
  8. Ministry of Science and ICT, number of cyber infringement incidents by year (2022.11) 
  9. K.H.Lee, "A Study on a Project-based Blockchain Web Developer Education Model Customized for Companies", Journal of Internet of Things and Convergence, Vol.8, No.4, pp.77-83, 2022.  https://doi.org/10.20465/KIOTS.2022.8.4.077
  10. N. Asokan, S. Sadeh, and A. Sadeh, "A Survey on Security Issues in the Internet of Things", Proceedings of the 2009 IEEE Security and Privacy Symposium, Vol.23, No.5, pp.71-82, 2009. 
  11. M. Conti, S. Dehghantanha, S. Jajodia, and H. Hu,, "Security and Privacy in the Internet of Things", Computer, Vol.49, No.2, pp.84-91, 2016. 
  12. S. M. Rahman, M. A. Khan, and S. K. Das, "A Survey on Security and Privacy Challenges in the Internet of Things", IEEE Access, Vol.6, pp.17684-17707, 2018. 
  13. J.Park, H.Lee and M.Seo, "The 4th Industrial Revolution and the Future of Advertising and Public Relations Curriculum : Focusing on Academic and Industry Perspectives", Korean Journal of Advertising, 115, pp.120-142. 2019.  https://doi.org/10.16914/ar.2017.115.120
  14. S.B.Kang, S.J.Lee and J.I.Lim, "A Study on the Effective Countermeasures for Preventing Computer Security Incidents", Journal of The Korea Institute of Information Security and Cryptology, Vol.22, No.1, pp.107-115, 2012.  https://doi.org/10.13089/JKIISC.2012.22.1.107
  15. M.G.Lee, "A Development of Curriculum for Information Security Professional Manpower Training", Journal of the Institute of Electronics and Information Engineers, Vol.54, No.1, pp.46-52, 2017. https://doi.org/10.5573/IEIE.2017.54.1.046