• 제목/요약/키워드: Cyber Training

검색결과 220건 처리시간 0.022초

사이버 보안 분야 전문가 프로파일 관리 시스템 연구 (Development of a Cybersecurity Workforce Management System)

  • 안준영;이승훈;박희민;김현철
    • 반도체디스플레이기술학회지
    • /
    • 제20권3호
    • /
    • pp.65-70
    • /
    • 2021
  • According to the trend of increasingly sophisticated cyber threats, the need for technology research that can be applied to cyber security personnel management and training systems is constantly being raised not only overseas but also in Korea. Previously, the US and UK have already recognized the need and have been steadily conducting related research from the past. In the United States, by encouraging applications based on related research (NICE Cybersecurity Workforce Framework) and disclosing successful use cases to the outside, it is laying the groundwork for profiling cyber security experts. However in Korea, research on cyber security expert training and profiling is insufficient compared to other countries. Therefore, in this study, in order to create a system suitable for the domestic situation, research and analysis of cases in the United States and the United Kingdom were conducted over the past few years, and based on this, a prototype was produced for the study of profiling technology for domestic cyber security experts.

웹기반 가상연수 시스템 설계 및 구현 (Design and Implementation of Web-Based Cyber Training System)

  • 이용훈;한판암
    • 한국정보처리학회논문지
    • /
    • 제7권9호
    • /
    • pp.2920-2929
    • /
    • 2000
  • 본 논문에서는 현직 교원연수에 적합한 가상교육시스템을 설계하고 구현하였으며, 구현된 시스템을 직접 현장에 적용하여 평가하였다. 범용 가상교육시스템이 지나치게 많은 불필요한 기능을 가지고 있어서 오히려 운영하기에 불편을 주는 반면 본 시스템에서는 불필요한 기능을 없애고 유용한 기능만으로 구성하였다. 본 시스템은 학습자, 교수자, 운영자, 컨텐츠간의 상호작용성에 보다 많은 관심을 두었다. 상호작용성을 높이기 위하여 학습자정보찾기, 연수출석, 연수자전달사항, 연수과제제출, 분임토의, 사이버카페, 접속통계 메뉴 같은 것을 둔 것이 특징적이다. 본 시스템을 2년에 걸쳐 554명의 교원에게 직접 적용한 결과 이수율 95%를 얻었다.

  • PDF

국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구 (A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations)

  • 김민수;박기태;김종민
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.197-208
    • /
    • 2020
  • 지식정보사회에서 발전된 네트워크 인프라를 바탕으로 전산망의 구조는 보안성을 확보한 다양한 형태의 망 구성을 구축하여 운영하고 있다. 국가·공공기관 전산망의 경우 각 기관별 특성과 연계 기관까지 고려한 기술적, 관리적 보안환경 구축이 필요하며, 이를 위해 기관별 특성에 따른 사이버 위협을 분류 및 위협 지도를 바탕으로 기술적·관리적 취약점 및 사이버 위협을 분석 등을 통한 사이버 훈련을 위한 기본 연구의 중요성이 대두되고 있다. 따라서 본 연구에서는 인터넷망과 국가정보통신망의 이원적 인프라 망을 기반으로 구축되어진 국가·공공기관 전산망의 내·외부 사이버 위협에 따른 유형별 분석을 사례 기반의 시나리오를 통해, 실질적인 사이버 위협 요소를 도출 및 분석하여 사이버보안 훈련 요소 도출용 사이버 위협 MAP을 제시하고자 한다.

사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례 (A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation)

  • 홍순좌;박한진;최영한;강정민
    • 정보보호학회논문지
    • /
    • 제30권6호
    • /
    • pp.1167-1187
    • /
    • 2020
  • 해킹, 말웨어, 자료 유출 및 도난 등의 사이버 위협은 생활 및 경제, 국가 안보의 중요한 문제가 될 정도로 일상과 밀접한 상황에 직면하고 있다. 국가·산업 차원의 안보 및 경제적 관점에서 사이버 위협 대응은 필수적인 방어책으로 인식하고 있으나, 사이버보안 분야에서의 산·학 기술격차 및 전문인력 부족 문제는 매우 심각한 상황이다. 본 논문에서는 이를 극복하는 방법으로 사이버보안 인력의 직무 역량 개념을 도입하여 사이버보안 기술적 대응 직무 역량(CtrJC) 프레임워크를 제안하고, 국가 및 조직 차원에서 시급히 요구되는 실시간 사이버 위협 대응 기술적 직무 역량(CtrJC-R) 모델을 구현하여 그 타당성을 확인한다.

An Ensemble Approach for Cyber Bullying Text messages and Images

  • Zarapala Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.59-66
    • /
    • 2023
  • Text mining (TM) is most widely used to find patterns from various text documents. Cyber-bullying is the term that is used to abuse a person online or offline platform. Nowadays cyber-bullying becomes more dangerous to people who are using social networking sites (SNS). Cyber-bullying is of many types such as text messaging, morphed images, morphed videos, etc. It is a very difficult task to prevent this type of abuse of the person in online SNS. Finding accurate text mining patterns gives better results in detecting cyber-bullying on any platform. Cyber-bullying is developed with the online SNS to send defamatory statements or orally bully other persons or by using the online platform to abuse in front of SNS users. Deep Learning (DL) is one of the significant domains which are used to extract and learn the quality features dynamically from the low-level text inclusions. In this scenario, Convolutional neural networks (CNN) are used for training the text data, images, and videos. CNN is a very powerful approach to training on these types of data and achieved better text classification. In this paper, an Ensemble model is introduced with the integration of Term Frequency (TF)-Inverse document frequency (IDF) and Deep Neural Network (DNN) with advanced feature-extracting techniques to classify the bullying text, images, and videos. The proposed approach also focused on reducing the training time and memory usage which helps the classification improvement.

사이버경찰의 수사한계와 수사력 강화방안 (The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability)

  • 최응렬;황영구
    • 시큐리티연구
    • /
    • 제8호
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

사이버농업기술교육 참가자의 특성과 교육효과 (Participant Characteristic and Educational Effects for Cyber Agricultural Technology Training Courses)

  • 강대구
    • 농촌지도와개발
    • /
    • 제21권1호
    • /
    • pp.35-82
    • /
    • 2014
  • 이 연구는 사이버농업기술교육 참여자의 학습특성과 효과를 분석하여, 적절한 지원방안을 제언하고자 수행되었다. 이를 위하여 문헌연구와 인터넷 조사를 통하여 수행되었다. 이 연구를 통하여 밝혀진 결과는 다음과 같다. 사이버농업기술교육을 수강하는 학생들은 50대와 40대의 대졸수준의 도시출신으로 농업분야 전공자가 아닌 사람들이 다수로서, 월 200-300만원미만의 소득을 올리고 있고, 주로 남성이 농사지식, 개인적능력개발, 담당업무처리능력 개발 목적으로 주로 참여하고 있고, 사이버교육이나 농업에 대한 선행학습경험이 약간 부족한 수준이었고, 학습양식은 구체적-순차적형, 두 가지 이상 복합형이 많았다. 사이버 농업기술교육에서 전반적으로 만족도나 학업성취는 우수하고, 내용구성이나 현업적응도는 비교적 적절한 수준이며, 운영지원과 영향력, 학습과정은 보통수준이었다. 한과목이하 이수집단보다 두과목이상 이수집단이 영향력 평가가 긍정적이었고, 수료증과정과 공개과정 모두를 이수한 집단이 공개과정만 이수한 집단보다 만족도가 더 높았다. 이상의 연구결과를 통하여 농촌진흥청 사이버 농업기술과정에 대한 지원방안을 특성화 프로그램으로의 확대, 지원인력의 확대, 온라인과 오프라인 모임공간 제공, 교육생지역의 농업기술센터와의 연계를 통한 blended learning system 도입, 학습자들의 이해를 돕기 위한 용어와 사전 제시, 흥미유발과 지원을 도울 사이버 튜터 및 인터넷 전화 활용을 제안하였다.

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

대학생의 이성교제에 관한 사이버 상담 사례 연구 (A Case Study on Cyber Counseling for University Students' Date)

  • 김진희
    • 가정과삶의질연구
    • /
    • 제23권3호
    • /
    • pp.137-151
    • /
    • 2005
  • This study was designed to analyze the cyber counseling cases on the university students' date in order to identify the problems they encounter in dating and seek for a direction for education and consulting program to help them solve the problems. A total of 253 cases in cyber counseling about date were analyzed. The findings demonstrated that the university students were short of interpersonal relationship still needed for expressing Intimacy and maintaining the relationship, and poorly coping with the negative emotions such as conflict, anxiety, and boredom. Thus, a variety of human relations training programs needs to be established in the universities to help the students stay in good terms with the counterpart. Plus, cyber counseling and e-mail counseling needs to be activated so as to allow the university students to easily access when they come to face a problem in dating.