• Title/Summary/Keyword: 보안 전공

Search Result 191, Processing Time 0.023 seconds

<Q|Crypton>: 암호 양자안전성 검증 기술

  • Dooho Choi;Yousung Kang;Sokjoon Lee
    • Review of KIISC
    • /
    • v.33 no.1
    • /
    • pp.7-12
    • /
    • 2023
  • 현존 암호인프라에 대한 양자컴퓨터 위협이 가시화됨에 따라, 다각도의 양자리스크 대응 연구가 이루어지고 있다. 그 중에서 양자컴퓨터 상에서 주어진 암호를 해독하기 위해서 소요되는 양자자원량(큐비트수, 양자게이트수, 수행시간 등)을 계산하여 양자보안강도를 추정하는 양자안전성 검증 기술은 대규모의 큐비트를 컨트롤할 수 있는 범용 양자컴퓨터가 아직 없는 상태에서는 쉽지 않은 기술이라 할 수 있다. 이에, 본 고에서는 암호 양자안전성 검증을 위한 현실적이고 유일한 접근이라 할 수 있는 <Q|Crypton> 기술 개념을 설명하고, 이러한 개념을 바탕으로 개발되고 있는 <Q|Crypton> 플랫폼의 전반적인 설명을 제공하고자 한다. 이러한 <Q|Crypton> 기술은 향후, 효율적이면서 높은 양자 저항성을 가지는 암호를 선별하는 데 있어서 실제적인 기여를 할 것으로 예상되고 있다.

Influence of Problem Solving Process with Critical Thinking to College Life in Freshmen (전문대학 신입생의 비판적 사고성향이 문제해결과정에 미치는 영향)

  • Lim, Gye Hwan;Heo, Ge Eun
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.175-183
    • /
    • 2013
  • This study determined the correlation between College Life in Freshmen critical thinking disposition; problem solving process. It also examined the impact of critical thinking disposition on problem solving process. The data was collected from 215 Freshmen members. Descriptive statistics, t-test, ANOVA, scheffe test, pearson correlation analysis and multiple regression analysis were performed. Results: In critical thinking disposition, there were significants differences in age, interpersonal relationships. In multiple regression analysis, critical thinking disposition and major satisfaction were significants factors of problem process ability explaining 38% Conclusion: To enhance problem process ability for freshmen, it is necessary to develop teaching program and curriculum.

A Study on the Effect of System Characteristics of Online Lectures on Lecture Satisfaction in the COVID-19 Crisis: Focused on the Moderating Effect of ICT Utilization Ability (코로나19 사태에 온라인 강의의 시스템 특성이 강의만족도에 미치는 영향연구: ICT 활용능력의 조절효과를 중심으로)

  • Mo, Ya-Ting;Xu, Yu-Jia;Lee, Yoon-koo
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.43-57
    • /
    • 2021
  • The purpose of this study is to find the relationship between Online Lecture System, Motivation for Use, ICT Utilization Ability, and Lectures Satisfaction as online lectures continue. For that, conducted survey of students at Woosong University, secured 330 valid samples, and conducted with analysis of actual proof with using SPSS 25.0. The results of the study confirmed that the system's Convenience, Simplicity, Security and Motivation for Use have significantly affected to Lecture Satisfaction, and also confirmed that ICT Utilization Ability, the variable of Moderating Effect, also has meaningful correlation between System Characteristics(Simplicity and Security) and Lecture Satisfaction. Therefore, the need for development and operation of additional education programs to improve ICT Utilization Ability as well as development of new online system are presented in order to enhance online Lecture Satisfaction of students. Lastly, various sample surveys and researches are seems to be needed in the future in order to increase the Lecture Satisfaction.

A Study on the Effectiveness of EPL Utilizing Programming Education based on Problem Based Learning (PBL) for Non-SW Major (비SW전공자 대상 문제중심학습(PBL) 기반의 EPL 활용 프로그래밍 교육의 효과성 연구)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.105-111
    • /
    • 2019
  • Since the problem-based learning (PBL) shows the effectiveness of self-directed learning ability and internalization of learning motivation in the process of solving real problems, studies on PBL and application cases are actively pursued in the university education. This study analyzed the effects of PBL on the academic achievement and computational thinking in a non-SW major students' programming course. The programing course was divided into the PBL class and non-PBL class, and at the end of the classes, the scores of the exams and the results of questionnaires about the educational effectiveness and computational thinking were analyzed. As a result, the students in the PBL class, compared to those in the non-PBL class, showed significantly higher scores in the areas of the algorithm implementing skill, self-directed learning, problem solving ability, and continuous learning motivation.

A study on how to advance the student management system for innovative university education (혁신적 대학교육을 위한 학생관리시스템 고도화 방안 연구)

  • Minsu Kim;Hyun-Ku Min
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.89-94
    • /
    • 2022
  • Efforts to improve the quality of university education, that is, advanced plans for innovative university education, are needed in the face of changes in educational demand due to rapid changes in new industries and society and the competition for survival due to a rapidly decreasing school-age population with the full-fledged start of the era of the 4th industrial revolution is being demanded. In particular, it is necessary to apply a system for student counseling and guidance management through college life adjustment diagnosis from students entering college to graduation. Accordingly, each university is promoting a project to upgrade a course-linked integrated platform based on core technologies of the 4th industrial revolution era, such as big data and artificial intelligence (AI). Therefore, in this study, based on the field of information security major, we intend to present a plan to advance the student management system for innovative university education.

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.

Cyber-Threat Detection of ICS Using Sysmon and ELK (Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지)

  • Kim, Yongjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.331-346
    • /
    • 2019
  • Global cyber threats to industrial control systems are increasing. As a result, related research and cooperation are actively underway. However, we are focusing on strengthening security for physical network separation and perimeter. Internal threats are still vulnerable. This is because the easiest and strongest countermeasure is to enhance border security, and solutions for enhancing internal security are not easy to apply due to system availability problems. In particular, there are many vulnerabilities due to the large number of legacy systems remaining throughout industrial control systems. Unless these vulnerable systems are newly built according to the security framework, it is necessary to respond to these vulnerable systems, and therefore, a security solution considering availability has been verified and suggested. Using Sysmon and ELK, security solutions can detect Cyber-threat that are difficult to detect in unstructured ICS.

Research on Secure Keypads for Mobile Devices with Stretchable Displays (스트레처블 디스플레이가 적용된 모바일 기기의 보안 키패드 연구)

  • Dongmin Choi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.885-890
    • /
    • 2024
  • This study proposes a secure keypad structure that can adapt to screen changes in mobile devices equipped with stretchable display. For this purpose, we compared and analyzed the authentication methods applied to current rigid form factor smartphones with those applied to rollable and bendable display based smartphones, which are the previous stages of stretchable display. Based on the results of this analysis, we identified potential user convenience and security safety issues that may arise in the form factor structure for smart wallets, multitasking, screen expansion and media viewing, and gaming and entertainment applications where stretchable displays will be applied, then proposed a security keypad structure for these form factors. Our keypad structure provides enhanced user convenience and security compared to the structures applied in the smartphone environment based on the conventional rigid display form factor and rollable, bendable display form factor.

A Study on the Necessity of Cybersecurity Legislation and Policies in Response to the Use of EFB by Flight Crew (운항승무원 전자비행정보장치(EFB) 사용에 따른 사이버보안 법률 및 정책 필요성 연구)

  • Minho Kang;Sanghoon Jeon;Howon Hwang
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.31 no.4
    • /
    • pp.72-81
    • /
    • 2023
  • The use of EFB (Electronic Flight Bag) has expanded, providing convenience to flight crews by minimizing paper usage within aircraft and offering the latest information, operability, and convenience related to aircraft operations. EFBs provide flight-sensitive information such as aircraft performance calculations, airport diagrams, routes, and approach procedures. For these information, EFBs connect to the cyber environment through Wi-Fi or self-contained data communication, allowing access to cloud-based systems for information updates, with administrators uploading the latest information for retrieval. However, in contrast to the evolving aviation technology, there is currently no legislation or security policy in place to maintain the security of EFBs, leaving them exposed to potential cyber threats. Therefore, improvements such as revising relevant laws to address potential cyber threats targeting EFBs and establishing and implementing EFB management systems are necessary. This paper aims to present the necessity for amending laws related to EFB security in response to cyber threats and suggests methods for enhancement.

A Study on the Institutional Improvement for Establishment of Occupational Identity and Occupational Prestige of Private Security (민간경비의 직업정체성과 직업명망 확립을 위한 제도적 개선방안 연구 : 한국표준직업분류상 경비원 직업분류의 개선을 중심으로)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.187-203
    • /
    • 2017
  • This study focuses on analyzing the problems of the Korean standard classification of occupations(KSCO), which is a formal and institutional implementation method that affects the occupational identity and Occupational Prestige of Private Security, and suggests ways to improve it. The following should be supplemented. (1) It is necessary to unify occupations related to private security that are classified into simple labor workers. (2) Delete the Technical Security Guards(4123) and create a Security Guard(4123) instead. (3) Facility Security Guards(41230), Convoy Security Guards, Technical Security Guards(41232), Security monitoring and control personnel(41233), and Special Security Guards(National important facility security guard)(41234) will be newly established. (4) Change the name of subclassification and subclassification in simple labor worker of Major Class 9(Code 9), and adjust Security Guards(9421) to the Surveillance Personnel(9421).