• Title/Summary/Keyword: 보안교육

Search Result 645, Processing Time 0.024 seconds

A Strategy to Strengthen Security for Remote Access of Smart Cars (스마트 자동차 원격접속 보안성 강화 방안)

  • Kim, Choungbae;Lee, Youngjun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.447-448
    • /
    • 2020
  • 본 논문에서는 스마트 자동차를 외부에서 제어할 수 있는 원격접속의 보안성을 강화할 수 있는 방안을 제안한다. 다양한 자동차 제조사들이 물리적인 자동차 구동에서 나아가 정보통신기술을 접목하여 운전자에게 다양한 편의성을 제공하고 있다. 정보통신기술을 이용해 자동차의 기능이 증가하는 만큼 정보시스템의 취약성을 이용해 외부의 비인가자에 의한 침입이 이루어질 수 있는 취약성 또한 증대하며, 자동차의 경우 이러한 위협이 주행 중 발생 시 운전자의 생명까지 위협할 수 있는 매우 위험한 상황이 발생할 수 있다. 이에 외부로부터 비인가자의 접근을 차단할 수 있는 방안을 기존 정보통신시스템 보안 기법을 접목하여 스마트 자동차의 안전한 운행이 가능할 수 있도록 한다. 본 논문에서는 기존 정보통신시스템에서 활용 중인 보안 방안을 통하여 제안하는 스마트 자동차 원격접근 제어 정책이 기존의 스마트 자동차 정보보안 정책에 비해 보안성 향상 면에서 더 우수함을 보인다.

  • PDF

An Analysis on Training Curriculum for Educating Information Security Experts (정보보안 전문인력 양성을 위한 교육과정 분석)

  • Park, Jae-Yong
    • Management & Information Systems Review
    • /
    • v.31 no.1
    • /
    • pp.149-165
    • /
    • 2012
  • Nowadays due to the development of IT, hacking has become a major issue and importance of information system security is rapidly increasing. This research focuses on problems of training system security experts within Korea by analysing university's management information system curriculum and proposes an alternative way to solve this problem. The result of this research is the following. First, reformation of university's curriculum for successfully training system security experts is crucial. Second, theories that was learned in university courses need to be coherent to the actual work that the system security experts do in the field. Lastly, advanced IT countries like the US and Japan have already made standards on training system auditors and reinforced it with laws. Therefore Korea should establish a formal standard system like the other IT industry advanced countries.

  • PDF

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

On the Design of Smartcard-based Cyber Education systems (스마트 카드 기반 사이버 교육시스템)

  • Lee, Jeong-Woo;Jun, Sung-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.681-684
    • /
    • 2001
  • 뛰어난 보안성과 다기능성으로 금융, 교통 등 각종 분야에서 스마트카드의 활용이 점차 늘어나고 있다. 이런 스마트 카드의 장점을 사이버 상에서 이루어지는 교육시스템에 적응시켜 보고자 한다. 기존의 사이버 교육시스템을 중심으로 보안성이 중요시되는 지불 및 교육컨텐츠 보호관련 부분들과 기타 시스템 이용에 관련된 부분들에 스마트 카드를 도입하여 보다 편리하고 안전한 시스템을 구성해 보았다.

  • PDF

A Meta-analysis of Korean Gamification Research Trends for Security Education Design (보안 교육 설계를 위한 국내 게이미피케이션 연구동향 메타분석)

  • Kim, Jong Wan;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.81-95
    • /
    • 2021
  • This study is to design a security game to proceed in the future based on the results of analyzing 105 research trends on gamification from 2018 to 2021 according to research period, research purpose, research subject, research topic, research method, game method, and emphasis factors. was trying to find an answer to Gamification showed a trend of increasing research related to 2021 due to the increase in the importance of non-face-to-face education in 2020, and there were not many studies targeting middle and high school students, colleges, and adults. Security-related research was a relatively incomplete and limited field, as only a small number of studies on raising awareness were conducted due to access restrictions. In the future, by referring to various research cases and statistics analyzed in this study, we will try to actually implement security education cases through gamification.

Security Management System Model using Mobile Agent (이동 에이전트를 이용한 보안 관리 시스템 모델)

  • Kim, Hyun-Bae
    • Journal of The Korean Association of Information Education
    • /
    • v.2 no.2
    • /
    • pp.302-308
    • /
    • 1998
  • The goal of this study is to survey a mobile agent technology and apply it to security management system. A tool for implementing mobile agent is introduced and a prototype model for sedcrity management system IS proposed. This study suggest the possiblity of security management system using mobile agent.

  • PDF

국가 전산망을 위한 MISSI 분석

  • 이철원;김학범;이경구;홍기융;심주걸
    • Review of KIISC
    • /
    • v.7 no.2
    • /
    • pp.35-54
    • /
    • 1997
  • 본 고에서는 행정, 교육, 과학기술, 금융, 국방, 공안, 외교 및 물류 등의 전산망을 위한 통합적인 보안 해결책 및 초고속정보통신망을 위한 보안 해결책을 제시하기 위한 일환으로 미국 NSA가 주도하여 수행하고 있는 MISSI에 대하여 소개를 한다. MISSI는 다중등급 보안을 근간으로 하고 있으며 무결성, 사용자 신분확인, 부인봉쇄, 비밀성 및 가용성 등의 보안 서비스를 제공하고 있다. 이들 보안 서비스를 위하여 Firewall, Fortezza, Guard 및 안전한 컴퓨터와 같은 상용의 보안 제품을 사용할 수 있도록 하고 있다. 본 고는 국가 전산망 및 초고속정보통신망의 효과적인 보안 해결책으로써의 지침을 제공해 주리라 생각된다.

  • PDF

WWW 보안

  • 박현동;류재철
    • Review of KIISC
    • /
    • v.7 no.1
    • /
    • pp.89-102
    • /
    • 1997
  • WWW(World Wide Web)은 인터넷에서 가장 널리 사용되고 있는 서비스 중의 하나로써 인터 넷 초기에는 일부의 계층에서 주로 교육, 연구용으로 사용하여 왔으나, 현재는 일반 사용자 계층에까지 파고들고 있다. 일반 사용자들의 참여로 인해 이제는 WWW가 상업용으로까지 이용되고 있는 실정이므로 안전한 WWW 통신의 구현이 필수적이다. 본 고에서는 안전한 WWW구축에 필요한 보안 요구사항들을 살펴보고, WWW에서 기본적으로 제공되는 보안 메카니즘과 현재 연구 개발중인 보안 기법들을 소개한다.

  • PDF

An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise (보안정책 준수 비용과 정보보안 중요성 인식 수준에 미치는 요인에 관한 연구: 중소기업을 중심으로)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.69-81
    • /
    • 2018
  • The ultimate intention of this research is to identify the factors that have a significant effect on the perceived importance of information security as the antecedent of intention to information security policy compliance. We found that the effectiveness of information security training program did not have statistically significant effect on the perceived cost of policy compliance. Second, the effectiveness of information security policy has significant influence on the perceived cost of policy compliance. Third, perceived vulnerability has a significant effect on the perceived cost of policy compliance. Fourth, perceived cost of policy compliance has a significant effect on perceived importance of information security. Fifth, supervisor's attitude toward information security silence has a significant effect on employee silent behavior towards information security. Sixth, communication opportunities towards information security has a significant influence on employee silent behavior towards information security. Finally, it was shown that employee silent behavior towards information security had a significant influence on the perceived importance of information security.

Priority of the Government Policy to support Industrial Security - Focus on a companies' demand and efficiency of policy - (산업보안 지원 정책 결정의 우선 순위 - 기업 수요와 효율성을 중심으로 -)

  • Kim, Chang-Ho;Yu, Jai-Hwan
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.155-178
    • /
    • 2015
  • This study surveyed the subject of companies' industrial security on priorities of the government policy for the confidentiality of corporate and the necessity of expanding the government support for the industrial security. In determining the priority, we should consider all opinions of companies, individuals, societies, and governments that associated with the confidentiality. Especially in industrial security, companies are the most significant beneficiaries and consumers of security policy and it would be the basis for supporting on policy-making. As a result, we analyzed the 50 valid questionnaires collected from security personnel of Korean corporations and 'Enhance support for education and promotion of human resource (On/Off-Line)', 'Establish Security management and Security measures', and 'Enhance Security professionals status via qualifications/certifications' are shown as 1st, 2nd, 3rd priority of government policy to protect Corporate confidential information including its customer information. All respondents of the study says that the Government support for Industrial Security should be enlarged.

  • PDF