• Title/Summary/Keyword: Cyber Training

Search Result 222, Processing Time 0.025 seconds

A Development of the Remote Teacher's Training Cyber System Applied by CBD Methodology (CBD 방법론을 적용한 원격교원연수 시스템의 개발)

  • Her, Young;Kim, Won-Young;Kim, Chi-Su;Kim, Jin-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.485-488
    • /
    • 2000
  • 인터넷을 통한 웹 기반 교수-학습시스템은 상호작용 중진을 통한 학습자 위주의 교육환경으로 지속적인 변화를 해왔고, 그 결과 학습자는 시간과 공간의 제약에서 벗어나 다양한 교육정보를 접할 수 있는 기회를 가지게 되었다. 본 논문에서는 교사를 대상으로 하는 원격교육 시스템에 한정하여 시스템개발에서 운영에 이르기까지의 모든 과정에 대한 경제적, 교육적 효율성 확보를 목적으로 하였다. 따라서 시스템 개발에서는 주요 모듈의 컴포넌트화를 시도하여 재사용성 증대를 통한 설계 기간 및 비용의 감소를 이끌어내어 개발의 효율성을 높이고, 교육학적 기반으로 구성주의 원리를 적용함으로써 교육의 효율성을 최대로 끌어올릴 수 있도록 설계하였다.

  • PDF

Cyber Environment for Computer Assisted Training System (컴퓨터 지원 교육훈련 시스템을 위한 사이버환경 구축)

  • 유현주
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.04a
    • /
    • pp.119-124
    • /
    • 2000
  • 최근 다양한 분야에서 Virtual Reality(가상현실) 기술을 이용하여 개발 및 응용시스템 환경을 구축하고 있는 실정이다. 본 논문에서는 효과적인 입체 3-D 시각적인 인터페이스, 내비게이션(Navigation)과 주요설비(facilit) 조작 등을 통하여 효율적인 교육효과를 지원하는 사이버환경 구축에 관하여 서술한다. 이러한 환경구축의 목적은 학생들(발전소 운전원 및 신입생)에게 원자력발전소에 대한 적절한 지식과 기술을 제공하고, 이러한 액티비티들을 통하여 효과적인 경험 취득 및 지식습득에 도움을 주려하느데 있다. 본 논문은 영광1호기 원자력발전소를 대상으로 3D 입체영상을 구현하여 발전소 운전 중에 가보지 못하는 위험한 시설물 및 기기들을 사이버 환경에서 볼 수 있도록 도와주며, 인터넷 인증을 받고 들어온 사용자에게 시설물 및 주요설비를 web browser를 통하여 자습 및 복습할 수 있는 환경 구축에 관하여 서술한다.

  • PDF

Fifteen Deadly Cybersecurity Threats Aimed Covid-19

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.123-130
    • /
    • 2021
  • Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.

Merits and Demerits of Information Security Education Using SaaS Based Virtual Training Systems (SaaS 기반 가상훈련 시스템을 이용한 정보보호 교육의 장단점)

  • Lee, Hae Young;Park, Hyun Min;Min, GyeongTae;Park, Young Sun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.211-212
    • /
    • 2019
  • 서로 다른 지역에서 서로 다른 과정의 실습 중심의 정보보호 단기 교육을 진행하기 위하여 SaaS 기반 가상훈련 시스템을 사용하였다. 본 논문에서는 SaaS 기반 가상훈련 시스템을 이용한 정보보호 실습 교육의 장단점을 정리한다. 강사 및 수강생들은 교육 과정 중 데스크톱 가상화를 사용하여 실습 환경을 구축하는 시간을 절약할 수 있었다. 또한, 원격 실습 지원, 진행 상황 확인도 가능하였다. 관리자는 강사 및 장소와 무관하게 균등한 실습 교육을 제공할 수 있다는 점이 가장 큰 장점이었다. 향후에는 서버 가상화와 데스크톱 가상화가 결합된 하이브리드 형태의 실습 환경 개발을 고려할 필요가 있다.

  • PDF

Study on Disaster Recovery Efficiency of Terminal PC in Financial Company (금융회사 단말PC 재해복구 효율에 관한 연구)

  • Yi, Seung-Chul;Yoon, Joon-Seob;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.211-224
    • /
    • 2015
  • Financial companies have invested a lot in their disaster recovery system and exercised training more than once a year to comply related laws and regulations. But massive PCs(Personal Computers) became disrupted simultaneously and it took a lot of time to recover massive PCs concurrently when March 20 cyber attack occurred. So, it was impossible to meet the tartgeted business continuity level. It was because the importance of PC recovery was neglected compared to other disaster recovery areas. This study suggests the measure to recover massive branch terminal PCs of financial companies simultaneously in cost-effective way utilizing the existing technology and tests recovery time. It means that in the event of disaster financial companies could recover branch terminal PCs in 3 hours which is recommended recovery time by regulatory body. Other financial companies operating similar type and volume of branches would refer to the recovery structure and method proposed by this study.

Situation Analysis and Education Plan of Security Ethics for Training College Students Majoring in Information Security (정보보안전공 대학생을 위한 보안 윤리의식 분석 및 교육 방안)

  • Kim, Tae-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.596-605
    • /
    • 2017
  • Recently, it has been pointed out that the lack of professional ethics of computer and security experts is serious as college students majoring in information security and insiders who are in charge of security work are involved in crimes after being tempted to cyber crimes. In this paper, we investigate and analyze the security ethics awareness and education situation of college students majoring in information security, and examine the security ethics education method for human resource development with personality and qualities. As the information society becomes more widespread, the ethics and occupational consciousness of the university students who are majoring in information security are recognized as lack of awareness and education about security ethics, As a solution to solve these problems, it is expected that it will be possible to nurture security experts who are aware of their vocation through the educational plan to enhance the security ethics of the information security major college students. According to the security ethics education system proposed in the paper, the security ethical consciousness of the group that received education was remarkably improved.

Development of the Phoropter Simulator for Education using 3D Virtual Reality (3차원 가상현실을 이용한 교육용 포롭터 시뮬레이터의 개발)

  • Lim, Yong-Moo;Lee, Dong-Hee
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2004
  • In this study, we presented a research about the development of the phoropter simulation program for education using the 3-D virtual reality in order to study the ophthalmic optics rather efficiently. Especially, by putting the facility such as the refractive error analysis of the eyeball in the cyber tutor inside, we have made the learner to learn and confirm the present situation of refractive correction through refractive power of principal meridians. By organizing the system which induces the active involvement of the learner and showing the result of the execution to the learner intuitively, the implementation of the more efficient education-environment can be possible. Consequently, it is expected that this program will be greatly helpful for the optician training as well as the ophthalmic optics education. As a next phase of study, we will develope the development technique of this simulator more and extend the cyber tutor contents more and make the web service version of this program to be provided through the internet network in order to inspire the learning desire of the learner more and more.

  • PDF

Current Status of Information Security against Cyber Attacks in Universities and Its Improvement Methods (사이버 공격에 대비한 대학의 정보보안 현황 및 개선 방안)

  • Kang, Young-Sun;Choi, Yeong-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.215-225
    • /
    • 2011
  • This paper suggests several methods of improving information securities of universities through the investigations of the current status of information securities in universities, which is becoming a hot topic in knowledge and information societies. In this paper, universities were randomly selected according to their size, and surveyed through email questionnaire to the persons in charge of security in each university, and 27 universities and 18 colleges were replied. From the survey results we confirmed that the pre-prevention is the most important thing in securing information assets, also in universities, and, in this paper, systematic support must be strengthened to establish a comprehensive security management policy and guidelines for the universities, and the importance of information assets and the necessity of security needs to be shared with the members in the universities. Moreover there must be full administrative and financial support, including recruitment and training of information security professionals and the establishing a separate security division.

A Spatial Study on the Network Formation Process of Personal Actors: The Case of Institutional Building Networks in Industries for the Elderly (개인 행위주체의 네트워크 형성 과정에 대한 공간적 고찰: 고령친화산업의 제도구축 네트워크를 사례로)

  • Koo, Yang-Mi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.334-349
    • /
    • 2008
  • In this study, the network formation process of personal actors in industries for the elderly was analyzed. This process is applied to the knowledge creation model of the SECI (Nonaka-Takeuchi learning cycle), that is socialization, externalization, combination, internalization. There are some kinds of opportunities to interact in these industries in the forms of field survey teams to overseas, some seminars and symposiums, many kinds of meetings, education and training programs, trade fairs and on-line forums. These palces(ba) - originating ba, interacting ba, cyber ba, exercising ba - played great roles in the formation of personal actor networks. Personal actors had opportunities to interconnect with distant actors through those places(ba). In the spatial perspective, personal actors could make face-to-face contact and build trust through temporary geographical proximity or temporary clusters with the help of personal mobility. Relations in the virtual spaces such as the Internet community did much toward building personal networks.

  • PDF

A Network Packet Analysis Method to Discover Malicious Activities

  • Kwon, Taewoong;Myung, Joonwoo;Lee, Jun;Kim, Kyu-il;Song, Jungsuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.143-153
    • /
    • 2022
  • With the development of networks and the increase in the number of network devices, the number of cyber attacks targeting them is also increasing. Since these cyber-attacks aim to steal important information and destroy systems, it is necessary to minimize social and economic damage through early detection and rapid response. Many studies using machine learning (ML) and artificial intelligence (AI) have been conducted, among which payload learning is one of the most intuitive and effective methods to detect malicious behavior. In this study, we propose a preprocessing method to maximize the performance of the model when learning the payload in term units. The proposed method constructs a high-quality learning data set by eliminating unnecessary noise (stopwords) and preserving important features in consideration of the machine language and natural language characteristics of the packet payload. Our method consists of three steps: Preserving significant special characters, Generating a stopword list, and Class label refinement. By processing packets of various and complex structures based on these three processes, it is possible to make high-quality training data that can be helpful to build high-performance ML/AI models for security monitoring. We prove the effectiveness of the proposed method by comparing the performance of the AI model to which the proposed method is applied and not. Forthermore, by evaluating the performance of the AI model applied proposed method in the real-world Security Operating Center (SOC) environment with live network traffic, we demonstrate the applicability of the our method to the real environment.