• Title/Summary/Keyword: 보안 교육

Search Result 645, Processing Time 0.033 seconds

A Study on Unsafe Mobile Web Application of HTML5 (HTML5의 안전하지 않는 모바일 웹 어플리케이션에 대한 고찰)

  • Jung, Hoon-Young;Seo, Hee-Suk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.755-758
    • /
    • 2011
  • 현재 인터넷의 최대의 관심사는 HTML5의 등장으로 인한 Web Page의 변화이다. 다양한 분야에서 영향을 미칠 것으로 최근 들어 급격히 무선 네트워크 사용률이 증가한 스마트폰에서도 Web Application이 등장하고 있다. 하지만 Web Application은 Native Application보다 소스 보안에 대해 매우 취약하며 본 연구에서는 이에 대한 분석과 보안을 위해 요구되는 HTML5 기능에 대해 언급한다.

Educational Needs Analysis of General Security Jobs in Physical Protection Field using the DACUM Technique (DACUM기법을 활용한 물리적방호 분야 일반보안 직무의 교육 요구분석)

  • Lee, Jin Gu;Jung, Il Chan;Park, Min Ju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.234-246
    • /
    • 2021
  • The purpose of this study is to develop the main subjects of the job-based curriculum by deriving the job analysis results of general security job workers in the physical protection field responsible for responding to threats to nuclear materials and nuclear facilities. In the job analysis stage, FGI was conducted on 7 content experts to derive 8 duties and 55 tasks. In addition, knowledge and skills were drawn for each task. In the analysis of educational needs, surveys were conducted for workers in general security jobs to derive the top 25 educational priorities through t-test and Borich needs assess model. At the stage of selecting core tasks and organizing required/optional contents, 42 tasks, both above average or at least one of them, were derived as core tasks based on the result of evaluation of importance and difficulty ratings of 55 tasks through a questionaire. In addition, tasks applied to the top 25 rankings derived from Borich needs assess model were applied as the required contents when designing courses, and tasks which applied only one of them were selected as optional contents. At the stage of required/optional modules and educational contents, four required modules and five optional modules were derived by drifting similar tasks between the required and optional contents. Based on the above results, the study suggested academic and practical implications and future suggestions.

The Problem and the Proposal in Private Security Regulation (개정 경비업법령의 문제와 과제)

  • Kwon, Ahn Hwang
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.91-104
    • /
    • 2015
  • Korea Privative security regulation was enacted in 1976 and which was revised 18 times. But most of the revision was made by outer forces but not by for the law itself. Now more than 39 years since the law was enacted and 63 years modern private security method was adopted. In this point of time being requires well equipped private security regulation would be revised to match with much changed society. First, there is a problem with the current ways of education, written examination. Second, security guard supervisor examination subject should be revised, which means overlapped subjects must be eliminated. Third, collective civil petition place has to be arranged.

Study on the college curriculum for systematic education of the domestic information security (국내 정보보호의 체계적인 교육을 위한 대학교육과정에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.35-41
    • /
    • 2016
  • Recently, the awareness of the domestic information security is very higher due to cyber war and hacking incidents. Yet, the information security professional is very scarce situation. In these circumstances are increasing of a opening the information security related departments of the domestic universities. And the Educational institutions are developed various curriculums. However, the domestic information security curriculum is different depending on the university or department. And there tends to be concentrated on the practical education rather than theoretical education. Therefore, in this paper will be analyzed to the Information security curriculum situation of the domestic Information Security related universities. This is expected to be utilized in a systematic curriculum development of the domestic information security education in a future.

A Study on the Analysis of Participants' Satisfaction Ratings for the Promoting Cyber Education (사이버교육의 활성화를 위한 학습자 만족도 분석을 위한 연구)

  • Kim, Kyung-Hee;Kim, Kyung-Soo;Song, Young-Kee
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.145-151
    • /
    • 2008
  • Korea has constructed a high speed Internet service which is widely used for cyber education by Korean. In composition and operating systems, cyber education is different from off-line education. Colleges have to analyse factors related to active education and make the factors have optimal effect for cyber education. In this paper, we meet the needs of the present trends, arrange and classify activation factors of cyber education. In addition, to improve effective operating systems of cyber education, we survey, and analyse participants' satisfaction ratings. The result of the survey is used in our proposal for promoting cyber education.

  • PDF

A Study on the Improvement of Military Spiritual Education in Preparation for the Diversification Era (다변화시대에 대비한 군 정신교육 개선에 관한 연구)

  • Lee, Seung Jin;Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.137-144
    • /
    • 2017
  • Mental power, which is the intangible power of soldiers in our security situation, is very important recently. As for the history of war in East and West Korea, intangible combat power is regarded as a key factor that determines the rise and fall of the nation and the victory and defeat of the war. Recently, we are trying to improve the mental education in the military, but we still regard it as formal education, boring education, and time - consuming education. And continues to present the problem. The purpose of this study is to examine the problems of current mental education and to find out the direction of development of cognitive centered mental education. I would like to suggest a direction for fostering a strong group that is suitable for the diversification era.

안전한 교육정보공유체제를 위한 ID 관리 시스템의 요소 기술 분석 및 요구사항

  • Yeom Heung-Yeol
    • Review of KIISC
    • /
    • v.16 no.2
    • /
    • pp.62-70
    • /
    • 2006
  • 본 논문에서는 교육정보공유체제를 위한 토 관리시스템을 위하여 요구되는 표준화 및 기술개발 동향, 국내외 환경, 그리고 사용 시나리오를 분석하고, 교육정보공유체제를 위한 ID 관리 시스템을 위한 소요 보안 핵심 기술과 시스템 요구사항을 제시한다. 본 고의 결과는 안전한 교육정보공유체제를 위한 ID 관리 시스템 설계 시 유용하게 활용될 수 있을 것이다.

An Investigation into the Role of Technostress in Information Security Context (기술스트레스가 정보보안에 미치는 영향에 관한 연구)

  • Park, Chul-Ju;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.37-51
    • /
    • 2012
  • The purpose of this study is to approach information security from a more comprehensive perspective. Particularly, information countermeasures includes a technological tool for end users, thereby increasing the end users' technological stresses. Based on the technostress framework, we investigate a effect of security awareness training on technostress, and also examine a effect of technostress on the persistent security compliance. Results showed that security awareness training influenced on techno-overload and techno-uncertainty. We also found that techno-overload and techno-uncertainty have a significant effect on the persistent security compliance. Conclusion and implications are discussed.

정보보안경영 전문가 자격요건

  • Oh, Kyeong Hee
    • Review of KIISC
    • /
    • v.25 no.4
    • /
    • pp.51-56
    • /
    • 2015
  • 적절한 능력을 보유한 정보보안경영 전문가를 확보하는 것은 전세계적으로 많은 조직의 관심사가 되고 있다. 정보보안 경영체계 관련 표준을 다루는 ISO/IEC JTC 1 SC 27/WG 1에서는 이러한 요구를 다루기 위하여 2014년 10월 ISO/IEC 27021 정보보안경영 전문가 자격 요건에 대한 국제표준을 개시하였다. 9월까지 2차 WD가 개발될 예정인 본 표준은 2년간의 연구기간을 거치면서 표준의 범위에 관해 이미 많은 논란을 거쳤으며, 현재는 정보보안경영 전문가가 보유해야 할 비즈니스 관련 전문성에 대한 논쟁이 진행되고 있다. 본 논문에서는 이 표준이 개시되기까지의 배경과 진행 현황, 주요 현안들을 살펴본다. 본 표준은 국제 정보보안 인력 및 교육 시장에 상당한 영향을 미칠 것으로 예상되며, 이에 대한 해외의 대응을 살펴보고 활용 방안을 제시한다. 또한 국내 보안 전문가 및 인력 양성 기관들의 관심과 참여를 촉구한다.

The detection of threats using loging data analing of network resource (네트워크 자원의 로그 분석을 통한 보안 위협 탐지)

  • Kim Jin-Hong;Lee Haeng-Gon;Jo In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.179-182
    • /
    • 2006
  • 정부, 기관(연구기관, 교육기관 등) 심지어 일반 개인 생활에서 인터넷의 활용도가 증가하면서 네트워크 장비의 중요성은 한층 강조되고 있다. 현재 네트워크 장비의 보안은 방화벽, 침입탐지장치에 의존하고 있으나, 이 장비들은 잘 알려진 공격을 기준으로 패턴 매정 방식으로 검출한다. 따라서 잘 알려지지 않은 공격에는 취약하다. 본 논문에서는 네트워크 보안장비를 위회한 보안위협이 탐지될 경우 네트워크 자원에서 발생하는 로그를 실시간으로 수집하여 관리함으로써 침해사고 시 그 원인을 분석할 수 있는 근거자료를 확보하고, 실시간 로그 분석을 통해 신속한 보안 위협의 탐지 및 해결방안을 제공한다.

  • PDF