• 제목/요약/키워드: Cyber Index

검색결과 80건 처리시간 0.034초

사이버보안 교육훈련 전문 인력의 역량에 관한 연구 (A Study on the Capability of Cyber Security Education and Training Professional Personnel)

  • 엄정호
    • 디지털산업정보학회논문지
    • /
    • 제15권1호
    • /
    • pp.43-51
    • /
    • 2019
  • This research proposed the necessary capability of cyber security professional personnel for cyber security education and training. Cyber security professional personnel were required specialized capability because the curriculum of cyber security education and training is structured around practice and training. Based on the knowledge, skills, and attitudes of professors, we derive candidate capabilities and index through the results of precedent research. As a result, we derived capability such the candidate capability group as teaching qualification, expert knowledge, practical ability, lecture ability, and research ability, and detailed capability index was derived accordingly. Finally, based on the questionnaire results of the professors related to the information security, it was determined that the capability required for the cyber security education and training professional personnel were expert knowledge, practical ability, and lecture ability. Among the capabilities, executive ability means that they have to fulfil abundant executive experience due to the high proportion of practical training due to the characteristics of cyber security education and training.

인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석 (Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics)

  • 신현조;이경복;박태형
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Cyber Museum User Interface의 구성과 구조에 관한 고찰 (A Study on analysis of architecture and user interface at cyber museum)

  • 구세연;임채진
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2001년도 춘계학술발표대회 논문집
    • /
    • pp.121-127
    • /
    • 2001
  • An unified measure of user interface efficiency and aesthetics for cyber museum is proposed. First, general structure of cyber museum is discussed and hierarchical analyses are done for sample sites. Usability tests based on the hierarchical analyses yield statistics of user access frequency and persistency for each page, on which access probability is deduced. Second, visual occupancy, a measure of efficiency of user interface element based on access probability is defined. The hierarchical statistics of visual occupancy can be an index for characterization and classification of cyber museums. Examples are provided.

  • PDF

학생 중도탈락 예측지수에 관한 사후검증 연구 (Post-Examination Analysis on the Student Dropout Prediction Index)

  • 이지은
    • 한국빅데이터학회지
    • /
    • 제4권2호
    • /
    • pp.175-183
    • /
    • 2019
  • 학습자 중도탈락은 사이버대학이 해결해야 할 과제 중 하나이다. 2019년도 기준으로 사이버대학의 전체 학생 수는 13만여 명에 달하고 있으나, 중도탈락 비율도 매우 높은 편이다. 중도탈락율을 낮추기 위해 사이버대학은 학습 분석에 많은 투자를 하고 있다. 특히 일부 사이버대학에서는 중도탈락 가능성을 정량적으로 분석하여 중도탈락이 우려되는 학생에 대한 지원을 강화하고 있다. 본 논문의 목적은 중도탈락 예측지수에 영향을 미치는 학습데이터를 규명하는데 있다. 분석 결과, 수강 차시(진도율), 이수학점, 평점, 휴학 횟수가 중도탈락에 유의미한 영향을 미치는 것으로 확인되었다. 사이버대학은 학생 중도탈락 예측지수에 관한 사후검증을 통해 예측 모델의 정확도를 높여나가야 할 것이다.

  • PDF

가상현실(VR) 콘텐츠에서 3D 객체의 셰이더 적용에 따른 사이버 멀미 연구 (A Study on Cyber Sickness according to Shader Application of 3D Objects in Virtual Reality Content)

  • 이수열;박선희;배종환
    • 한국멀티미디어학회논문지
    • /
    • 제24권11호
    • /
    • pp.1560-1566
    • /
    • 2021
  • Cyber Sickness, which occurs when using Virtual Reality contents, is the most serious problem in immersive Virtual Reality contents. The purpose of this study is to identify the effects and causes of graphic environmental factors on Cyber Sickness in Virtual Reality contents. To this end, cyber sickness experiments were conducted according to the light source and material settings, which are most commonly used in graphical environmental elements. Cyber Sickness measurements were based on the Simulator Sickness Question(SSQ) tool to derive an index that causes Cyber Sickness As a result of the analysis, the smaller the surface roughness, the higher the degree of Cyber Sickness, and the smaller the surface roughness, the smoother the surface of the 3D object, and many specular reflections from the light source occurred, which was confirmed to be the cause of great Cyber Sickness.

실시간 위협에서 Event 유형의 정형화 설계 및 구현 (Standardization Model and Implementation of Event Type in Real Time Cyber Threat)

  • 이동휘;이동춘;김귀남
    • 융합보안논문지
    • /
    • 제6권4호
    • /
    • pp.67-73
    • /
    • 2006
  • 실시간 사이버위협에서 정형화 방법은 각 보안장비의 이벤트를 실시간 분석하여 인터넷 웜, 바이러스, 해킹 등의 사이버공격에 대한 네트워크 이상 징후를 임계치와 상관관계를 틀 통하여 탐지하고, 동 평가결과의 통계분석을 통해 정형화 방안 기능을 부여하고 실효성 있는 사이버공격대응시스템을 구축하는데 있다. 본 논문은 우선 위협지표 산출과 동 지표의 합산을 통한 위협평가 및 조기 경보 과정의 패키지화로 만들고, 사이버 위협 지표 계산의 기준을 설정한다. 특히 보안사고 발생 시 각 보안장비의 이벤트와 트래픽 양에 대한 정의 및 데이터베이스 입력 방법을 구체화하여 실시간 대응 및 조기예경보체계의 초석이 가능한 정형화 방안을 제시한다. 분석을 위해 축적한 90일간의 데이터 임계치 설정작업을 통해 보다 정확한 적용 값을 계산한다. 산출한 값을 토대로 정형화가 가능한 보안이벤트 정보를 표준데이터로 적용, 각 보안장비 및 HoneyNet 시스템, 기타 취약정보 등과의 상관관계를 분석하여 보안이벤트 표준지수를 산출한다.

  • PDF

Dosimetric comparison of volumetric modulated arc therapy with robotic stereotactic radiation therapy in hepatocellular carcinoma

  • Paik, Eun Kyung;Kim, Mi-Sook;Choi, Chul Won;Jang, Won Il;Lee, Sung Hyun;Choi, Sang Hyoun;Kim, Kum Bae;Lee, Dong Han
    • Radiation Oncology Journal
    • /
    • 제33권3호
    • /
    • pp.233-241
    • /
    • 2015
  • Purpose: To compare volumetric modulated arc therapy of RapidArc with robotic stereotactic body radiation therapy (SBRT) of CyberKnife in the planning and delivery of SBRT for hepatocellular carcinoma (HCC) treatment by analyzing dosimetric parameters. Materials and Methods: Two radiation treatment plans were generated for 29 HCC patients, one using Eclipse for the RapidArc plan and the other using Multiplan for the CyberKnife plan. The prescription dose was 60 Gy in 3 fractions. The dosimetric parameters of planning target volume (PTV) coverage and normal tissue sparing in the RapidArc and the CyberKnife plans were analyzed. Results: The conformity index was $1.05{\pm}0.02$ for the CyberKnife plan, and $1.13{\pm}0.10$ for the RapidArc plan. The homogeneity index was $1.23{\pm}0.01$ for the CyberKnife plan, and $1.10{\pm}0.03$ for the RapidArc plan. For the normal liver, there were significant differences between the two plans in the low-dose regions of $V_1$ and $V_3$. The normalized volumes of $V_{60}$ for the normal liver in the RapidArc plan were drastically increased when the mean dose of the PTVs in RapidArc plan is equivalent to the mean dose of the PTVs in the CyberKnife plan. Conclusion: CyberKnife plans show greater dose conformity, especially in small-sized tumors, while RapidArc plans show good dosimetric distribution of low dose sparing in the normal liver and body.

Development and Measurement of Learners' Satisfaction Index Model for Cyber Education

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제8권3호
    • /
    • pp.343-347
    • /
    • 2010
  • Cyber education has been predicted that it would become the primary education system of 21st century as a way of education focusing on consumers, with the aspect that it seems to be able to satisfy the demand about re-education and lifelong education as the acceleration of fast knowledge accumulation throughout every field of society in the digital era. However, cyber education system has a lot of problems which are for that it lacks of human resources for effective interaction, and it can be disadvantageous to certain type of students with a class environment concentrated on reading and writing and with foundation on computer technology. Therefore, in this thesis, We intended to analyze factors influencing satisfaction of people studying in a situation that cyber education has been required to be a mainstream system of education in the midst of trend of changing paradigm of college education recently, and to suggest some possible solutions for cyber education at university.

사이버보안 전문인력 획득을 위한 사이버보안 훈련생에 특화된 훈련성과 측정 모델에 관한 연구 (A Study on the Model of Training Performance Measurement Specialized to Cyber Security Trainee for Cyber Security Professionals Acquisition)

  • 김기훈;엄정호
    • 디지털산업정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.59-69
    • /
    • 2016
  • We proposed a specialized model of performance measurement to measure the training performance of the trainees in cyber practical training. Cyber security professionals are cultivating their expertise, skills, and competencies through cyber practical training in specialized education and training institutions. The our proposed process of trainee evaluation is consisted of an evaluation component discovery, evaluation item selection, evaluation index catalog, ratings and criteria decision, and calculation formula. The trainee evaluation is consisted of a formative evaluation during the training and an overall evaluation after finished training. Formative evaluation includes progress evaluation and participation evaluation, and overall evaluation includes practice evaluation and learning evaluation. The evaluation is weighted according to the importance of evaluation type. Because it is evaluated actual skills and abilities, competencies are assigned a high weight, while knowledge and attitudes are assigned a low weight. If cyber security trainees are evaluated by the proposed evaluation model, cyber security professionals can be cultivated by each skill and knowledge level and can be deployed by importance of security task.