• Title/Summary/Keyword: 보안교육

Search Result 645, Processing Time 0.024 seconds

A Study on the Design of Re-training Courses for Nurturing Cybersecurity Professionals from Other Occupational Groups (타 직업군으로부터의 사이버보안 전문인력으로의 직무전환을 위한 재교육과정 설계 연구)

  • Ji, Juyeon;Park, Sangho;Yu, Harang;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.43-60
    • /
    • 2018
  • Recently, with the arrival of the 4th industrial revolution, the security risks are converging and complexly changing, and the demand of cybersecurity experts is increasing. Therefore, in this paper, it is the largest of the domestic educational institutions, it has the largest number of emissions talent, and selects the representative major field of humanities and society. Then, after analyzing the common curriculum in each major field, compare it with the training course of cybersecurity experts derived through existing previous research. Through analysis results, we try to design a retraining course for cybersecurity professional human resources. Utilizing the results of this research, it is expected that it will be used as the basic material necessary for the subjects of the re-curriculum education. It is also expected to contribute to resolving the supply-demand gap of cybersecurity professionals.

  • PDF

A Study on the Relation between the Number of First Aid Training and the Performance of Facilities Security Personnel (시설보안요원의 응급처치교육이수와 직무수행 관계에 관한 연구)

  • Kim, Sin-Hye;Han, I-Jun
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.91-108
    • /
    • 2019
  • The purpose of this study is to investigate the relationship between the number of first aid training and safety performance. The researcher's questionnaire consisted of three variables: necessity of first aid education, application to security practice, and improvement of job satisfaction. In this study, Chronbach's Alpha coefficients were calculated to measure the internal validity for the reliability of the questionnaire. In order to verify the validity of the measured variables, exploratory factor analysis was carried out using the Berimax rotation method. The mean variance extracted AVE and the conceptual reliability CR value of the measurement result variables were both above the allowable reference value of 0.5 and it was judged to be a good test in terms of intensive validity. As a result of the hypothesis test, the standardization coefficient was 1.106 for 'necessity of first aid education ⇒ applied to security practice work', and 'applied to security work practice ⇒ improvement of job satisfaction' was 1.063 and the relationship of hypothesis 1 hypothesis 2 was significant (+), Respectively. Therefore, in order to increase the job satisfaction of security related workers, it is necessary to support first aid education and to receive first aid education.

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

Multi-Certification of Agent System Using XML (XML 전자서명을 이용한 다중인증 멀티 에이전트시스템)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence about an age of information demand is focused on a learner and remote education based on information technology WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submit various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. In this paper, we propose multi-Certification of agent system using XML digital signature to satisfy security requirement.

  • PDF

A Study on the Effect of Digital Literacy Education in Personal Information Security Perception (디지털리터러시 교육이 개인 정보 보안 인식에 미치는 영향 연구)

  • Kwon, Jungin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.161-167
    • /
    • 2020
  • Convergence ethics education for digital culture in cyberspace is limited to specific areas such as personal information and copyright. Education on the ability to accept information and provide information in cyberspace in which digital natives communicate, share and exchange is inadequate. As a result, the dysfunction of abusing the personal information of others without recognizing the importance of information security has recently emerged as a social problem. In this study, among digital netizen who communicate and exchange information the most in cyberspace, digital literacy education was conducted for students in the first and second grades of university, and then they investigated the change in information security perception. Based on this, we intend to prepare fundamental measures for systematic cultivation of digital literacy education necessary for the Digital Cultural Society.

A Study on the Infringement Incident Response Curriculum Model in IoT Environment (사물인터넷 환경에서 침해사고대응 교육과정 모델에 관한 연구)

  • Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.55-60
    • /
    • 2023
  • The IoT environment is very vulnerable to security threats, and if an intrusion occurs, it can cause great damage. In order to strengthen the security of the IoT environment, a curriculum that considers the characteristics of the IoT environment is needed. In this paper, we propose a curriculum model for cyber incident response in the Internet of Things environment. The proposed curriculum model was designed as a model for security threats in the IoT environment, types of intrusion incidents, and incident response procedures. The proposed curriculum model is expected to contribute to improving security awareness in the IoT environment and fostering cyber incident response experts in the IoT field. The proposed curriculum model strengthens the security of the IoT environment and is expected to be safe through security incident response in the IoT.

The Effects of Information Security Vaccine User's Construal Level and Message Type on the Information Security Behavior (정보보안 백신 사용자의 해석수준과 메시지유형이 정보보안행동에 미치는 영향)

  • Lee, Kyong Eun;Kim, Jung Yoon;Hyun, Jung Suk;Park, Chan Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.6
    • /
    • pp.33-42
    • /
    • 2015
  • Based on the Construal Level Theory, this study aims to investigate how information security vaccine users' selection intentions differ from each other according to the selection time of information security vaccine, advertisement message types, and information security knowledge levels. For the foregoing, this study conducted an experiment by applying an experimental design of 2(knowledge level: high/low) ${\times}2$(temporal distances: short distance/long distance) ${\times}2$(advertisement message types: how(concrete)/why(abstract)) on computer security vaccine softwares. As a result, this study confirmed that the selection intentions about information security vaccines differed from each other according to the temporal distance and advertisement message type, and also varied according to the information security knowledge level. In conclusion, this study provides an implication that the consideration of well-timed persuasive message is especially important for the users at the high level of knowledge. Also, this research implies the necessity of development of abstract thinking ability based on temporal distance for the users at the low level of knowledge.

A Study on Development of Standard Modeling Education Program in Information Security : Focusing on Domestic University Cases (정보보호 교육과정 표준화모델 개발 연구 : 국내 대학 사례를 중심으로)

  • Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.99-104
    • /
    • 2018
  • Modern society has entered the era of the fourth industrial revolution beyond the information age. In other words, technology innovations such as life science, unmanned automobiles, drone, artificial intelligence, big data, robot technology, Internet of things, and nano-technology are leading the change of the world. In these technologies use and delivery of information is playing a key role, and the field of information security for the safe use of information has become an indispensable discipline. In this sense, it is necessary to standardize the curriculum of universities to foster security manpower to meet the needs of the era. In this paper, we develop and present a model to standardize the curriculum in the field of information security. Using this model, each educational institution will be able to select the necessary track or field to guide the students and cultivate information security manpower effectively.

  • PDF

Strengthening Safety for National Assembly: Focus on the Public Tour System (국회 안전확보를 위한 보안성 강화방안: 참관제도를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.115-124
    • /
    • 2017
  • The purpose of this study is to provide measures for National Assembly safety and control safety issues arise from increased National Assembly public tour services. First, the study provided the definition of National Assembly public tour and types of tour services, tour procedures, and visitor guidelines. Next, risk factors for National Assembly were discussed and environmental security of national major facilities were compared. Furthermore, four measures for strengthening safety for National Assembly were discussed. First, it is important to utilize special security guards in National Assembly since they can use special weapons unlike general security guards. Second, special guards can be flexibly utilized compared to general security guards. Third, based on the Private Security Law, there is no legal issues for utilizing special security guards since National Assembly is categorized as national major facilities. Fourth, educational programs for security guards are focused on National Assembly safety, brief education, martial arts, customer satisfaction, more specialized educational program for public tour programs should be provided.