Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.5.1335

Curriculum Development for Smart Factory Information Security Awareness Training  

Jeon, In-seok (Graduate School of Information Security, Korea University)
Yi, Byung-gueon (Chonnam University)
Kim, Dong-won (Graduate School of Information Security, Korea University)
Choi, Jin-yung (Graduate School of Information Security, Korea University)
Abstract
Smart factory of Manufacturing sector is rapidly spreading, globally. In case of domestic, it is on going based on KOSF. It is neither lack of invest nor security of information due to it has been spread from manufacturing sector. Hence, that's very difficult to efficiency prevent from new type of intimidation and security accident happened sometimes from this situation. According to research information security condition with recognized new menace, there is a most efficient way is provide education of information security without any extra budget to safely spread smart factory. Thus, this study of research has developed security awareness training curriculum from international standard, requirement of the industry, and curriculum of educational institution based on NCS (National Competency Standard). It is be very helpful to spread smart factory safely due to expert group has been test of validity.
Keywords
smart factory security; smart manufacture security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 wikipedia, https://ko.wikipedia.org/wiki/%EC%83%9D%EC%82%B0_%EA%B4%80%EB%A6%AC_%EC%8B%9C%EC%8A%A4%ED%85%9C
2 Korea Smart Factory Foundation, http://www.smart-factory.kr/dext5editordata/2016/06/20160602_102324259_38328.jpg
3 Korea Smart Factory Foundation, 2015 smart factory support companies participating in monthly House of excellence, pp. 5, 2015
4 Ministry of Commerce Industry and Energy, http://www.motie.go.kr/motie/py/brf/motiebriefing/motiebriefing11.do?brf_code_v=11#header
5 Ministry of Commerce Industry and Energy, creative economy implementations for manufacturing innovation 3.0 strategy, pp. 3. 2014
6 mitre, hhttp://capec.mitre.org/data/definitions/1000.html
7 NIST, GUIDE TO INDUSTRIAL CONTROL SYSTEMS (ICS) SECURITY (FINAL PUBLIC DRAFT),pp. 20-21, 2008
8 IEC 62443-3-3, "Industrial communication networks-Network and system security-Part 3-3: System security requirements and security levels"
9 NCS, http://www.ncs.go.kr/ncs/page.do?sk=P1A1_PG01_001
10 NIST 800-16 "Information Technology Security Training Requirements:A Roleand Performance-Based Model"
11 NIST 800-50 "Building an Information Technology Security Awareness and Training Program"
12 C. H. LAWSHE, A QUANTITATIVE APPROACH TO CONTENT VALIDITY, Personnel Psychology, Volume 28, Issue 4, pp. 563-575, Dec, 1975   DOI
13 Korea Evaluation Institute Of Industrial Technology, PD ISSUE REPORT, VOL 15-11, pp. 14, 2015
14 KHIDI, Health and medical information and medical information for Exchange-based activation, 2015
15 boannews, http://www.boannews.com/media/view.asp?idx=44738
16 KOSF, The Foundation for the spread of the smart plant study on spontaneous composition, 2016
17 wikipedia, https://ko.wikipedia.org/wiki/%EC%8A%A4%ED%84%B1%EC%8A%A4%EB%84%B7
18 dailysecu, http://www.dailysecu.com/news/articleView.html?idxno=12372