• Title/Summary/Keyword: Cyber Index

Search Result 80, Processing Time 0.027 seconds

A Study on the Capability of Cyber Security Education and Training Professional Personnel (사이버보안 교육훈련 전문 인력의 역량에 관한 연구)

  • Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.43-51
    • /
    • 2019
  • This research proposed the necessary capability of cyber security professional personnel for cyber security education and training. Cyber security professional personnel were required specialized capability because the curriculum of cyber security education and training is structured around practice and training. Based on the knowledge, skills, and attitudes of professors, we derive candidate capabilities and index through the results of precedent research. As a result, we derived capability such the candidate capability group as teaching qualification, expert knowledge, practical ability, lecture ability, and research ability, and detailed capability index was derived accordingly. Finally, based on the questionnaire results of the professors related to the information security, it was determined that the capability required for the cyber security education and training professional personnel were expert knowledge, practical ability, and lecture ability. Among the capabilities, executive ability means that they have to fulfil abundant executive experience due to the high proportion of practical training due to the characteristics of cyber security education and training.

Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics (인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석)

  • Shin, Hyun Jo;Lee, Kyung Bok;Park, Tae Hyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

A Study on analysis of architecture and user interface at cyber museum (Cyber Museum User Interface의 구성과 구조에 관한 고찰)

  • 구세연;임채진
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2001.05a
    • /
    • pp.121-127
    • /
    • 2001
  • An unified measure of user interface efficiency and aesthetics for cyber museum is proposed. First, general structure of cyber museum is discussed and hierarchical analyses are done for sample sites. Usability tests based on the hierarchical analyses yield statistics of user access frequency and persistency for each page, on which access probability is deduced. Second, visual occupancy, a measure of efficiency of user interface element based on access probability is defined. The hierarchical statistics of visual occupancy can be an index for characterization and classification of cyber museums. Examples are provided.

  • PDF

Post-Examination Analysis on the Student Dropout Prediction Index (학생 중도탈락 예측지수에 관한 사후검증 연구)

  • Lee, Ji-Eun
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.175-183
    • /
    • 2019
  • Drop-out issue is one of the challenges of cyber university. There are about 130,000 students enrolled in cyber universities, but the dropout rate is also very high. To lower the dropout rate, cyber universities invest heavily in learning analytics. Some cyber universities analyze the possibility of dropout and actively support students who are more likely to drop out. The purpose of this paper is to identify the learning data affecting the dropout prediction index. As a result of the analysis, it is confirmed that number of lessons(progress), credits, achievement and leave of absence have a significant effect on dropout rate. It is necessary to increase the accuracy of the prediction model through post-test on the student dropout prediction index.

  • PDF

A Study on Cyber Sickness according to Shader Application of 3D Objects in Virtual Reality Content (가상현실(VR) 콘텐츠에서 3D 객체의 셰이더 적용에 따른 사이버 멀미 연구)

  • Lee, SuYeol;Bak, Seon-Hui;Bae, Jong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.11
    • /
    • pp.1560-1566
    • /
    • 2021
  • Cyber Sickness, which occurs when using Virtual Reality contents, is the most serious problem in immersive Virtual Reality contents. The purpose of this study is to identify the effects and causes of graphic environmental factors on Cyber Sickness in Virtual Reality contents. To this end, cyber sickness experiments were conducted according to the light source and material settings, which are most commonly used in graphical environmental elements. Cyber Sickness measurements were based on the Simulator Sickness Question(SSQ) tool to derive an index that causes Cyber Sickness As a result of the analysis, the smaller the surface roughness, the higher the degree of Cyber Sickness, and the smaller the surface roughness, the smoother the surface of the 3D object, and many specular reflections from the light source occurred, which was confirmed to be the cause of great Cyber Sickness.

Standardization Model and Implementation of Event Type in Real Time Cyber Threat (실시간 위협에서 Event 유형의 정형화 설계 및 구현)

  • Lee, Dong-Hwi;Lee, Dong-Chun;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.67-73
    • /
    • 2006
  • The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes the basis which constructs the effective cyber attack response system. Especially at the time of security accident occurrence, It overcomes the problem of existing security system through a definition of the event of security system and traffic volume and a concretize of database input method, and propose the standardization plan which is the cornerstone real time response and early warning system. a general standardization plan of this paper summarizes that put out of threat index, threat rating through adding this index and the package of early warning process, output a basis of cyber threat index calculation.

  • PDF

Dosimetric comparison of volumetric modulated arc therapy with robotic stereotactic radiation therapy in hepatocellular carcinoma

  • Paik, Eun Kyung;Kim, Mi-Sook;Choi, Chul Won;Jang, Won Il;Lee, Sung Hyun;Choi, Sang Hyoun;Kim, Kum Bae;Lee, Dong Han
    • Radiation Oncology Journal
    • /
    • v.33 no.3
    • /
    • pp.233-241
    • /
    • 2015
  • Purpose: To compare volumetric modulated arc therapy of RapidArc with robotic stereotactic body radiation therapy (SBRT) of CyberKnife in the planning and delivery of SBRT for hepatocellular carcinoma (HCC) treatment by analyzing dosimetric parameters. Materials and Methods: Two radiation treatment plans were generated for 29 HCC patients, one using Eclipse for the RapidArc plan and the other using Multiplan for the CyberKnife plan. The prescription dose was 60 Gy in 3 fractions. The dosimetric parameters of planning target volume (PTV) coverage and normal tissue sparing in the RapidArc and the CyberKnife plans were analyzed. Results: The conformity index was $1.05{\pm}0.02$ for the CyberKnife plan, and $1.13{\pm}0.10$ for the RapidArc plan. The homogeneity index was $1.23{\pm}0.01$ for the CyberKnife plan, and $1.10{\pm}0.03$ for the RapidArc plan. For the normal liver, there were significant differences between the two plans in the low-dose regions of $V_1$ and $V_3$. The normalized volumes of $V_{60}$ for the normal liver in the RapidArc plan were drastically increased when the mean dose of the PTVs in RapidArc plan is equivalent to the mean dose of the PTVs in the CyberKnife plan. Conclusion: CyberKnife plans show greater dose conformity, especially in small-sized tumors, while RapidArc plans show good dosimetric distribution of low dose sparing in the normal liver and body.

Development and Measurement of Learners' Satisfaction Index Model for Cyber Education

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.343-347
    • /
    • 2010
  • Cyber education has been predicted that it would become the primary education system of 21st century as a way of education focusing on consumers, with the aspect that it seems to be able to satisfy the demand about re-education and lifelong education as the acceleration of fast knowledge accumulation throughout every field of society in the digital era. However, cyber education system has a lot of problems which are for that it lacks of human resources for effective interaction, and it can be disadvantageous to certain type of students with a class environment concentrated on reading and writing and with foundation on computer technology. Therefore, in this thesis, We intended to analyze factors influencing satisfaction of people studying in a situation that cyber education has been required to be a mainstream system of education in the midst of trend of changing paradigm of college education recently, and to suggest some possible solutions for cyber education at university.

A Study on the Model of Training Performance Measurement Specialized to Cyber Security Trainee for Cyber Security Professionals Acquisition (사이버보안 전문인력 획득을 위한 사이버보안 훈련생에 특화된 훈련성과 측정 모델에 관한 연구)

  • Kim, Kihoon;Eom, Jungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.59-69
    • /
    • 2016
  • We proposed a specialized model of performance measurement to measure the training performance of the trainees in cyber practical training. Cyber security professionals are cultivating their expertise, skills, and competencies through cyber practical training in specialized education and training institutions. The our proposed process of trainee evaluation is consisted of an evaluation component discovery, evaluation item selection, evaluation index catalog, ratings and criteria decision, and calculation formula. The trainee evaluation is consisted of a formative evaluation during the training and an overall evaluation after finished training. Formative evaluation includes progress evaluation and participation evaluation, and overall evaluation includes practice evaluation and learning evaluation. The evaluation is weighted according to the importance of evaluation type. Because it is evaluated actual skills and abilities, competencies are assigned a high weight, while knowledge and attitudes are assigned a low weight. If cyber security trainees are evaluated by the proposed evaluation model, cyber security professionals can be cultivated by each skill and knowledge level and can be deployed by importance of security task.