• Title/Summary/Keyword: Cyber Training

Search Result 220, Processing Time 0.021 seconds

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

Reference Model and Architecture of Interactive Cognitive Health Advisor based on Evolutional Cyber-physical Systems

  • Lee, KangYoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4270-4284
    • /
    • 2019
  • This study presents a reference model (RM) and the architecture of a cognitive health advisor (CHA) that integrates information with ambient intelligence. By controlling the information using the CHA platform, the reference model can provide various ambient intelligent solutions to a user. Herein, a novel approach to a CHA RM based on evolutional cyber-physical systems is proposed. The objective of the CHA RM is to improve personal health by managing data integration from many devices as well as conduct a new feedback cycle, which includes training and consulting to improve quality of life. The RM can provide an overview of the basis for implementing concrete software architectures. The proposed RM provides a standardized clarification for developers and service designers in the design and implementation process. The CHA RM provides a new approach to developing a digital healthcare model that includes integrated systems, subsystems, and components. New features for chatbots and feedback functions set the position of the conversational interface system to improve human health by integrating information, analytics, and decisions and feedback as an advisor on the CHA platform.

Social Relation of Cyber Sports Supporter's Community and Social Capital (사이버 스포츠서포터스 공동체의 사회적 관계와 사회적 자본)

  • Kim, Kyong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.8
    • /
    • pp.386-395
    • /
    • 2013
  • This study examined social relation of cyber sports supporter's community and social capital as time passes. This study selected spectator sports supporters of cyber sports community based on number of number and history of cyber sports supporter. This community is a representative supporter's club of spectator sports. This study utilized 1,848 members accumulated during three month. To analyze data, Netminer 4.0 and social network analysis were used. The conclusion is following: First, social relation of cyber sports supporter's community showed up dynamic change. Second, social capital of cyber sports supporter's community shows Sports events and training schedules, player transfer, manager, record, game watching and TV watching, cheering, cheering uniform and tools, players, teams and clubs, game photos and video, etc. This is the poor-get-poorer and the rich-get-richer phenomenon.

NCS based Leveled Micro-Degree Certification Model for Training Practical Cyber Security Experts

  • Kim, Jeong-Sham;Lee, Kyu-Chang;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.123-133
    • /
    • 2022
  • In this paper, we propose a Leveled Micro-Degree Job Competency Certification Model that considers the level of the job based on the job defined in the NCS. There is a mismatch of manpower due to the problem of university education that cannot keep up with the rapidly changing technological environment caused by the 4th Industrial Revolution. The Nano-Degree and Micro-Degree systems designed to solve this problem are used for job competency certification of cyber security personnel. NCS sub-categorized job field is defined as Micro-Degree and detailed job by ability unit is defined as Nano-Degree, the level of the ability unit defined by level is equally applied to the Micro-Degree. And it is a system that certifies the job competency corresponding to the degree-based university academic background. By applying this system to the curriculum of Cyber Security School, Yeungnam University College, we proposed a method to configure the Nano-Degree course based on NCS duties. The method proposed in this paper can be used as a method for verifying job competency of Nano-Degree and Micro-Degree, which are recently introduced by many universities.

Learning Model Development of utilizing a Tutor to study cyber-terrorism (사이버테러에 대비한 국가정보보안 현장 튜터를 활용한 교수-학습 모형 개발)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.15 no.6_1
    • /
    • pp.49-57
    • /
    • 2015
  • Changes in the national intelligence security industry is becoming increasingly rapidly changing due to the development of the network and the use of the Internet. Information also can be called by critical information assets, as well as social infrastructure of the country's reality is that individuals at risk. These professionals make to prevent terrorists to destroy national defense system and network was absolutely necessary. But, Cyber Terror Response NCOs to be responsible for cyber terrorism requires a professional NCOs with advanced knowledge. National Competency Standards(NCS) using a national information security field tutors to conduct training courses teaching - learning model to develop and to apply.

A Study on the Obstacle Factors and the Development Strategy of High Value Occupational Training for Women (여성 고부가가치 직업훈련의 장애요인과 발전방안 연구)

  • Lee, Ji-Eun;Lim, Hee-Jeong
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.181-189
    • /
    • 2019
  • The purpose of this study is to derive obstacle factors to 'high value vocational training' and to suggest development strategies. The training aims to solve the quantitative and qualitative problems of female employment by providing professional training in high value areas such as ICT, SW and knowledge service. To verify the training to meet these objectives, 48 processes operated in 2018 were analyzed and field monitoring was conducted. As a result of the analysis, problems were identified and improvements were derived in terms of learners management, training course design, field practice operation, and performance evaluation. Based on these results, researchers suggested four ways to develop high value vocational training. First, select learners based on combined talent and second, strengthen the project of linking enterprises and structured field practices. Third, establish a performance evaluation system of its own and manage performance and fourth, expand support for excellent training courses and provide consulting for course development. The results of this study are expected to be used as a reference for establishing policies for high value occupational training. In the future, quantitative research should be conducted to clarify the performance and problems.

A Study on the Continuing Education & Training Program for the Disabled Users Service Special Librarian (도서관장애인서비스 담당사서를 위한 계속교육 프로그램 개발에 관한 연구)

  • Kim, Hye-Joo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.2
    • /
    • pp.173-197
    • /
    • 2015
  • The purpose of this study proposes continuing education program development for disability services librarian training. To this end, there was researched and analysed the Curriculum for the librarian disability service training courses and the library services with disability and LIS curriculums in abroad and domestic. Based on the research results obtained by the more comprehensive study developed a model for continuing education programs to strengthen disability services librarian competencies. Models were divided program is being offered to Track 1, 2. There are Education types which are organized cyber-shaped form of education training, set-type training, and was organized in blended learning.

A Study on the Educational Needs for College Education and Job Training to Enhance Safety Manager's Competencies: Based on the Survey of Safety Managers in Daejon & Chongju Area (안전관리 전문인력의 역량 제고를 위한 대학교육과 직무교육의 교육수요에 관한 연구: 대전·청주 지역 안전관리자에 대한 조사 결과를 중심으로)

  • Kim, Yun Bae
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.5
    • /
    • pp.95-105
    • /
    • 2020
  • As one of the useful approaches to enhance safety managers' competencies, this study aims to suggest improvement plans in terms of education in school and on the job for safety managers. Educational needs at schools and job training institutes were surveyed with 321 safety managers in Daejon & Chongju Area. Correspondence with university professors at safety engineering departments via email was also conducted. Collected data were put into the R stochastic program in codified form and quantitatively analyzed through two-dimensional cross-tabulations and a chi-square test. With respect to school education, three academic subjects were examined. Job training was suggested to be conducted as 'training for trainers', which should be more flexible in terms of contents, method, and fees. Periodical investigation of educational needs for safety personnel who are consumers of safety education and training was also proposed.

Operating Report of a Hospice Cyber Counselling Program (호스피스 사이버상담 프로그램 운영에 대한 소고)

  • Yoo, Ji-Soo;Lee, Yoon-Jeoung;Kang, Se-Won
    • Journal of Hospice and Palliative Care
    • /
    • v.9 no.1
    • /
    • pp.30-34
    • /
    • 2006
  • Purpose: This study is to report the operating result of the Hospice Cyber Counselling Program for improving quality of lift for terminal patients and their families. Methods: This study was performed followed by counsellor training, building strategy of public relations, management, and evaluation of the effect in order. Results: 72 subjects visited our cyber homepage and became members for approximately 9 months from Oct. 2004 to July 2005; 17 subjects in their 20s (23.6%), 12 subjects in their 30s (16.7%), 17 subjects in their 40s (23.6%), and 13 subjects above 50s (18%). Classified by diagnose related group, cancer related disease consist of 90%. As for the relationship between contents of counselling and counselling applicants, families consist of 90% and self-applicants only 10%. Only 30 members used on-line counselling and their counselling frequency was just 35 times. Although counselling frequency and the number of members who used the counselling site were not high, they tend to contact with a counsellor continuously and use the site actively after the first counselling. Conclusion: Cyber counselling program for hospice was practically managed to improve quality of life for terminal patients and their families as a basic activity for hospice business activation. Basic public relations with regard to hospice business by mass media and the press should be performed continuously and the hospice training program is required for medical personnel to be continue.

  • PDF

A Study on Retraining for Career Development of Information Security Workforce (정보보호 업무인력의 경력개발을 위한 재교육 방향)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.4
    • /
    • pp.67-77
    • /
    • 2018
  • With the types and targets of cyber attacks expanding and with personal information leaks increasing, the quantitative demand for information security specialists has increased. The base for training the workforce has expanded accordingly, but joblessness and job-seeking still coexist. To resolve the gap between labor demand and supply, education and training systems that can supply demand quickly are needed. It takes a considerable amount of time for information security education and new manpower supply through universities and graduate schools to be reflected in the market. However, if information security retraining is carried out in terms of career development of information security and related workforce, the problem of lack of experts could be solved in a relatively short period. This paper investigates and analyzes the information security work of the information security workforce, the degree of skill level, the need for retraining, and the workplace migration experience; it also discusses the direction of career development retraining.