• Title/Summary/Keyword: 정보보호 교육기관

Search Result 106, Processing Time 0.024 seconds

A study on Professionalization of Student Protecting Manpower for the Prevention of School Violence (학교폭력예방을 위한 학생보호인력의 전문화방안에 관한 연구)

  • Kim, Sun-Ah
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.1
    • /
    • pp.87-96
    • /
    • 2013
  • The purpose of this research is to suggest specialization measures of student protecting manpower for the prevention of school violence in Korea. Therefore, student protecting manpower's legal limitation, insufficiency of professionalism, insufficiency of recruitment standard's suitability, insufficiency of educational training, cooperative problem with related institutions and ethical problems were drawn as the problems of student protecting manpower. The measures for improving those problems are as follows. The first is to revise laws related to school protecting manpower and strengthen systems. The second is to prepare proper standard to recruit student protecting manpower. The third is to establish professional training institution of student protecting manpower. The fourth is to establish close cooperation system with institutions related to student protection. The fifth is to legislate ethics codes of student protecting manpower.

CTD-Edu: Cell-Based Three-Dimensional Education Model for Information Security Education (실무중심 정보보안 교육을 위한 셀 기반 입체교육 모델)

  • Choi, Sang-Yong;Kim, Jeong-Sahm;Lee, Kyu-Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1031-1043
    • /
    • 2021
  • Recently, the importance of information security has become greater. For this reason, the number of departments related to information security at universities and professional educational institutions is increasing. It is analyzed that the curriculum of such educational institutions has a lot to do with the job competency mentioned in NCS in relation to major subjects. This has the advantage of providing a standardized level of education for each job competency. However from the perspective of students there may be limitations on duplicate curriculum quality of education according to the level of teachers and timely acquisition of necessary elemental skills. In this paper we analyze the curriculum of universities and professional educational institutions and propose a cell-based three-dimensional education model to address the limitations of students. We verified based on the college curriculum that the proposed model can effectively improve its limitations.

Analysis of the present state and Improvement of the Institute of Information Security Education for the Gifted (정보보호영재교육원 운영현황 분석 및 개선방안)

  • Yun, Bo-Ram;Hong, Do-Won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.441-449
    • /
    • 2016
  • Today, as a daily routine such as administration/finance is operated under information system and various cyber crime against national, public, and private institutions happen, demand for information security manpower is increasing. Hence, Ministry of Education has formed an Institute of Information Security Education for the Gifted to early discover talent in the field of information security and train professional personnel with specialty and ethics in 4 universities of country in 2014. But the nascent Institute of Information Security Education for the Gifted lack systematic analyses compared to Institute of Mathematics and Science Education for the Gifted that has existed from a long time ago. In this paper, we analyze the state of the Institute of Information Security Education for the Gifted in three parts: operation, selection, education and suggest an improvement to build a practical program for effective operations and education.

The analysis of requirements for evaluation facilities to meet requirements of CCRA in order to support qualities for evaluation Service (양질의 평가서비스 제고를 위한 CCRA 요구사항 수준의 평가기관 요구사항 분석)

  • 이유리;박동규;김상호;김재성
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.317-323
    • /
    • 2003
  • 본 논문에서는 정보보호제품의 평가 수요 증가에 적극적으로 대처하고, 양질의 평가서비스 제고를 위한 CCRA 요구사항 수준의 평가기관 요구사항을 분석 및 도출한다. 이를 위하여 CCRA의 평가기관 요구사항 및 ISO/IEC17025의 요구사항을 분석하였으며, NIST Handbook 150, NIST Handbook150-20 등 CAP 국가들의 평가기관 인정과 관련된 표준문서들을 연구하여 각 CAP 국가들의 평가기관 요구사항들을 분석하고 평가기관의 평가자 양성을 위한 교육 및 자격 부여 프로그램들을 비교 분석하였다.

  • PDF

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

Considering Information Security Professionals' Career to Analyze Knowledge and Skills Requirements (정보보호 전문인력의 경력에 따른 지식 및 기술 수요 특성)

  • Yoo, Hye-Won;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.77-89
    • /
    • 2009
  • As the awareness on the information security has been well developed, there have been various studies on effective training and management of the information security workforce. But, one of the most important things for the effective training is to develop education programs based on knowledge and skills requirements for information security professionals. This study aims to analyze the required and possessed levels of knowledge and skills for information security professionals' career. For this study, we selected 71 critical knowledge and skills for information security professionals by literature review and Delphi method, and we conducted a survey of information security knowledge and skills requirements for information security professionals to perform their jobs. As a result, we analyzed the current status of the information security professionals' knowledge and skills level and suggested some guidelines for educating information security professionals by their job career.

The Improvement of Information Protection Service Cost Model in Public Institution (공공기관 정보보호서비스 대가 모델의 개선 방안)

  • Oh, Sangik;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.123-131
    • /
    • 2019
  • In this paper, related studies were investigated by dividing them into cost-benefit analysis, security continuity services, and SW-centric calculations. The case analysis was conducted on A institutions in the United States, Japan and South Korea. Based on this, an improvement model was prepared through comparison with the current system. The SCS(Security Continuity Service) performance evaluation system-based information protection service cost calculation model is proposed. This method applies a service level agreement(SLA) and NIST Cybersecurity framework that are highly effective through cost-effectiveness analysis and calculates consideration based on characteristics, performance criteria, and weights by information protection service. This model can be used as a tool to objectively calculate the cost of information protection services at public institutions. It is also expected that this system can be established by strengthening the current recommended statutory level to the enforceability level, improving the evaluation system of state agencies and public institutions, introducing a verification system of information protection services by national certification bodies, and expanding its scope to all systems.

Convergence Study on Perception on Patient Private Information Protection in Nursing Students (간호학생의 환자 개인정보보호 인식에 관한 융합적인 연구)

  • Lee, Hyun-Jung
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.59-65
    • /
    • 2017
  • The purpose of this study was to research the perception on patient private information protection of 126 nursing students before clinical practice. The mean score of perception on patient private information protection was 4.52 points of full 5. The perception of protecting patient privacy was no significantly differentiated with general characteristics of nursing students. Development and application of patient private information education program for inexperienced nursing students is necessary. Also it is necessary to seek joint plans between medical institutions and universities to improve the awareness of patient privacy.

A Study for Limitations and Improvement of Information Security Management System (정보보호 관리의 한계점과 개선방안에 관한 연구)

  • Lee, Sujin;Choi, Sang-Yong;Kim, JaeKyoung;Oh, ChungShick;Seo, Changho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.563-570
    • /
    • 2014
  • As information security is becoming more important today, efforts in managing information security more efficiently is becoming greater. Each department such as Ministry of Security and Public Administration, Ministry of Science, Ministry of Education, National Intelligence Service, etc. is established screening criteria for information security and conducted the evaluation. Various information security certification and evaluation for public institutions effectively help to improve the level of information security. However, there are limitations of efficient security management because the examination to be performed frequently by each department. In this paper, we analyze screening criteria of the information security management that is being conducted in the public institutions. We also present limitations of information security management and the direction of improving the limitations.

Study of Problem Based Learning for Information Security Consultant and its Analysis (정보보호 컨설턴트 양성을 위한 PBL 교육방안 적용 및 효과성 분석)

  • Oh, Changhyun;Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2325-2332
    • /
    • 2017
  • Consulting projects such as diagnosis of vulnerabilities of major information and telecommunication infrastructure are increasing, mandatory public information infrastructure assessment (PIA) for public institutions and ISMS (Information Security Management System) The demand for information protection consulting is continuously increasing as the field obeys the law, but the lack of information security consultant is not improving. One reason is that information security consultants are not being developed to meet the increasing demand for information protection consulting. In this paper, we present the case of information protection consulting as a scenario for studying and educating the duty of information security consultant by studying overseas case and domestic case based on standardization and standardization. We propose a problem-based learning (PBL) training method. In addition, we analyze the effectiveness of the PBL - based learning method.