• Title/Summary/Keyword: 정보보호 전문인력

Search Result 92, Processing Time 0.022 seconds

Security Self-Analysis and Self-Evaluation for Public Information System (공공기관 정보시스템의 자가진단 보안 분석.평가 연구)

  • 김인중;정윤정;이철원;장병화;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.629-632
    • /
    • 2002
  • 공공기관은 자신의 정보시스템에 대한 보안 대책을 수립하기 위하여 자체 보안·분석평가를 수행함으로써 적절한 보안 목표와 방향을 설정해야 한다. 하지만, 현재 연구되어 있는 위험분석 및 보안평가방법론등은 복잡하고 전문적인 사항이 많으므로 자체 보안분석을 수행하기에는 인력 및 비용이 많이 소요된다. 이를 위하여 본 논문에서는 정보시스템의 위험분석방법론에서 제시하는 자산, 취약점, 위협, 대응책에 보안평가방법론을 포함하여 정보시스템에 대한 모델링, 가정, 증상, 원인, 해결책등을 통한 자가진단 보안 분석·평가 방법을 제시한다.

  • PDF

A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S. (미국 ATE 정책 기반의 신규 사이버보안 인력양성 정책 비교 프레임워크 연구)

  • Hong, Soonjwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.249-267
    • /
    • 2018
  • The US cybersecurity workforce policy is being pursued comprehensively and systematically, based on the NICE established initiated in 2010. Security Technologies, one of the eight areas of Advanced Technology Education(ATE) of the National Science Foundation(NSF) included in the STEM. This policy has been comprehensively promoted in conjunction with NICE, and this security technology field is operated with five detailed programs. In this paper, we examine in detail five cybersecurity workforce development programs supported by ATE, and compare them with the current status cultivation of cybersecurity workforce in Korea. After finding out the problems and improvements by comparison with the current situation of cybersecurity workforce development in Korea, we propose several implementations of nation-wide strategies for cultivating new cybersecurity workforce in Korea.

Analysis of e-Learning based Information Security Education Curriculum (e-러닝 기반의 정보보호 교육과정 분석 연구)

  • Lee, Hyung-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.6
    • /
    • pp.13-21
    • /
    • 2005
  • In this study, we study and analysis on e-Learning based Information Security curriculum. e-Learning based university education courses will be much more established in Korea based on advanced IT technology. Computer related majors such as 'Computer Science' and 'Software' can be easily combined with e-Learning system. And Advanced Information Security Expert (AISE) educational course must be broadly opened for satisfying national requirements. In this study, we analyze e-Learning course on Information Security major based on off-line curriculum and suggest new model for further research.

  • PDF

Trends in Cyber Range Technology in the Field of Information Security (정보보호 분야에서의 사이버 레인지 기술 동향)

  • Yu, Jaehak;Koo, Kijong;Kim, Ikkyun;Moon, Daesung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.208-211
    • /
    • 2022
  • 최근 COVID-19 팬데믹 시대 도래로 ICT 기술 기반의 지능화된 사회실현에 대한 관심이 높아지고 있지만, 사이버 위협의 다변화로 그 범위와 피해 또한 확대되고 있다. 특히, 개인의 민감 데이터뿐만 아니라, 산업체와 공공기관의 사이버 위험성 및 노출은 심각한 문제가 발생할 수 있다. 본 논문에서는 이러한 정보보호 분야에서의 위협행위 등을 탐지, 분석, 대응할 수 있는 교육 프로그램 개발과 전문 인력양성을 위한 사이버 레인지의 국내·외 기술 동향을 살펴보고자 한다. 마지막으로, 더욱 지능화되고 발전하는 사이버 위협으로부터 이를 방지하고 대응하기 위한 사이버 레인지의 발전 방향을 논하고자 한다.

A Study on the Linkage and Gap in Personal Information Policy in Cloud Services between Multinational Companies' Human Resource Management and Domestic Companies' Human Resource Management (제조 전문 국제기업 인사관리와 국내 인사관리 클라우드 서비스 운영 개인정보정책과의 연계 및 괴리에 대한 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.639-643
    • /
    • 2018
  • Laws concerning the protection of personal information have been enacted and revised as the legislation on personal information protection on the basis of the Act on the Protection of Personal Information Maintained by Public Institutions. Nevertheless, there have been continuing threats resulting from the fact that restrictions on security subject to laws remain unclear. By proposing protected access utilizing a unique identification key of enterprises, regarding the personal information of various internal and external clients held by international manufacturing companies and attempting to make policy aspect and management access at the same time, there is a change of gradual decline in cloud personnel information management service, which is the domestic ISP service for personnel management as the technology facilitated to reduce the burden on personnel and cost for the protection of personal information and the market is also changing to the direction for companies to directly operate. Therefore, this study intends to examine the convenience of integrated management for ensuring security, while confirming the gap on flexibility and safety on management point regarding the human resources of international manufacturing companies arising from its interactions.

A Study on Quantitative Method of Certificate for Information Security Education Course in the Private Sector (민간부문 정보보호 교육과정의 정량적 인증방법에 관한 연구)

  • Kim, Joo-hee;Cho, Sung-woo;Yoo, Dong-young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.551-558
    • /
    • 2016
  • The recent convergence in ICT industry has created new businesses as well as other opportunities. However, it entails new convergence threat accompanied by security risks. Even though there are security professionals who are dealing with the situation, there is not enough human resource in risk management. Moreover, the amount of research that studies quality of education and training security personnel is not sufficient. This paper explores the curriculum of information security education in the private sector and reasons out fifteen standard curriculums in four professional fields categorized by job classification. In addition, it provides a weighted score table based on the evaluation indicator for the effective security education certificates in the private sector.

An Evaluation of the Efficiency of Information Protection Activities of Private Companies (기업의 정보보호활동의 효율성 평가)

  • Choi, Won-Nyeong;Kim, Woo-Je;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.25-32
    • /
    • 2018
  • Cyber hackings are increasing and becoming more intelligent. The government and private companies conduct various information protection activities by investing lots of money and employing security personnel to protect import ant assets and personal information. It is important to evaluate the efficiency of the information protection activities that cost lots of money and manpower. However, the studies on the efficiency of the information protection activities were mainly conducted for government agencies the information of which is more readily available. This study suggests a model that can evaluate the efficiency of the activities of information protection and information security certification of various private companies. Our model evaluates the efficiency of the information protection activities by applying AHP and DEA on the information that are publicly announced by the private companies. Our model identifies the DMUs that are efficiently operated and suggests the improvement policies for the DMU that are non-efficiently operated.

  • PDF

Strategies for the Expans ion of Internet Trade Leads Site in Korean Exporting Firms (우리 나라 무역업체의 인터넷 무역거래알선사이트의 활성화방안)

  • Jang, Myung-Jin;Yun, Kwang-Woon
    • International Commerce and Information Review
    • /
    • v.2 no.2
    • /
    • pp.69-95
    • /
    • 2000
  • 무역거래의 패턴이 최근 크게 변화하고 있는데, 기존 무역거래방식에서 인터넷무역방식으로 그 비중이 확대되면서 인터넷 무역거래알선사이트에 관한 관심과 활용도가 점차 높아지고 있으며 특히 무역거래알선사이트의 구축 및 운영은 국내외의 무역 유관기관과 지방자치 단체, 대기업 종합무역상사 및 개별기업을 중심으로 활발히 진행되고 있다. 이에 실제 우리 나라 무역업체들의 사이트 이용 및 현황과 이용만족도 조사를 위해 설문조사를 한 결과, 현재까지 무역업체들이 가장 선호하는 사이트는 무역 유관기관이 운영하는 사이트들이다. 또한 실제 무역거래알선사이트를 이용한 결과와 관련하여 거래알선사이트 제공서비스에 대한 만족은 대상 업체 중 불과 17.9%의 낮은 수준으로서 이렇듯 낮은 만족도를 보이는데는 다음과 같은 문제점들이 있었다. 즉, 정보 인프라 측면에서의 관련정책의 분산, 보안 인프라의 우려, 오프라인 상의 결제 및 세금문제, 인터넷무역 관련 국제협력문제 등을 들 수 있으며, 무역업체의 측면에서는 전문인력의 부족, 최고경영자의 정보화 인프라에 대한 마인드 부족과 업체내의 웹 기반 환경 구축 미흡 등을 들 수 있다. 이상의 문제점들을 개선하기 위한 활성화방안을 살펴보면 첫째, 거래정보 보호기술의 육성 둘째, 무역거래알선사이트의 적극적인 국내외 홍보 셋째, 무역거래알선사이트 관련 분쟁 신용조회 등의 통합관리 넷째, 사이트관련 온라인과 오프라인상의 제반환경 개선 및 국제거래 규약 개선 다섯째, 무역거래알선시스템의 효율성제고를 위한 전문인력 양성 및 교육훈련 강화 등이 절실히 요망되고 있다.

  • PDF

A Study on the Business Archival System in Korea (한국의 민간기업 기록보존시스템에 관한 연구)

  • 김상호
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.1
    • /
    • pp.205-228
    • /
    • 2001
  • The purpose of this study is to review the business records management and archival system in Korea. Each private enterprise has several reasons to maintain its own records, archives and historical materials. Those are to meet the legal requirements and the social needs. They are for supporting the business activities and protecting the benefits of corporate. It's needed to establish an integrated knowledge, information, records, and communication center, employing the archivists and records managers who have an ethical sense of duty and the knowledge about business records to improve the current system at own storage facilities.

  • PDF

A Study on Improvement Plans of SMEs Support Policy for Information Security in Korea (국내 중소기업 정보보호 지원 정책 개선 방안에 관한 연구)

  • Jang, Sang-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.332-339
    • /
    • 2020
  • This study aims to analyze problems and deduce improvement plans for information security support policies for SMEs in Korea. To this end, an effective support policy necessary for reinforcing cyber safety nets to enhance the level of information security of domestic SMEs based on the analysis results by analyzing the status and problems of the previous research review and analysis, the current status of information security of SMEs and the information security support policies of major SMEs at home and abroad. I would like to suggest improvement measures. Reinforcement of awareness, legal basis, voluntary capacity building, joint response system, professional manpower and budget support, cyber security construction, untact era support, and regional strategic industry security internalization were suggested. This can be used as the government's information security support policy to raise the level of information security of SMEs in preparation for the post Covid19.