• Title/Summary/Keyword: Cyber training

Search Result 220, Processing Time 0.028 seconds

Effective Response Methods for the Prevention of Cyber-terror in South Korea (한국 사이버테러 방지를 위한 효과적 대응방안)

  • Sung, Yong-Eun;Youn, Byoung-Hoon
    • Convergence Security Journal
    • /
    • v.16 no.2
    • /
    • pp.11-17
    • /
    • 2016
  • The purpose of this research is to explore the effective response methods for the prevention of cyber-terror in South Korea. This research used an analysis of literature research. From the result of this research, the researchers suggested 1) enactment of the 'Cyber-terror Prevention Act' in order to enhance the effectiveness against cyber-terror; 2) establishment of practical control tower for cyber-terror; 3) expansion of the expert training for cyber-terror. The limitations of this research and the recommendations for future research were discussed at the last part of this research.

The Effects of Transfer of Education Training on Korean Enterprise Revitalization -Focusing on Characteristics of Education Training Program and Organization Characteristics in Cyber Education- (교육훈련전이가 한국기업의 활성화에 미치는 영향에 관한 연구 -사이버교육의 교육훈련프로그램 및 조직 특성을 중심으로-)

  • So, Won-Hyun;Kim, Ha-Kyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.3
    • /
    • pp.661-676
    • /
    • 2013
  • This article starts with a review of the organization characteristics and corporate education training program, especially in relation to the cyber education. In particular, we empirically analyzed the factors affecting the characteristics of education program (e.g., relatedness of the program contents, method of education and instructor's ability) and the organization characters (e.g., support of manager and coworker, education culture). Hence the main purpose of this article is to suggest an empirical model explaining how these factors affect the transfer of training and enterprise revitalization. Furthermore, we suggested an expanded model about cyber education training program, transfer of training, and corporate's facilitation. We founded that the contents and method of education significantly affect the transfer of training, while instructor's ability does not significantly affect. Supports from manager and coworkers, education culture, and transfer of training also affect the enteprize revitalization.

Design and Implementation of Cyber Warfare Training Data Set Generation Method based on Traffic Distribution Plan (트래픽 유통계획 기반 사이버전 훈련데이터셋 생성방법 설계 및 구현)

  • Kim, Yong Hyun;Ahn, Myung Kil
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.71-80
    • /
    • 2020
  • In order to provide realistic traffic to the cyber warfare training system, it is necessary to prepare a traffic distribution plan in advance and to create a training data set using normal/threat data sets. This paper presents the design and implementation results of a method for creating a traffic distribution plan and a training data set to provide background traffic like a real environment to a cyber warfare training system. We propose a method of a traffic distribution plan by using the network topology of the training environment to distribute traffic and the traffic attribute information collected in real and simulated environments. We propose a method of generating a training data set according to a traffic distribution plan using a unit traffic and a mixed traffic method using the ratio of the protocol. Using the implemented tool, a traffic distribution plan was created, and the training data set creation result according to the distribution plan was confirmed.

A Fuzzy Rule-based System for Automatically Generating Customized Training Scenarios in Cyber Security

  • Nam, Su Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.39-45
    • /
    • 2020
  • Despite the increasing interest in cyber security in recent years, the emergence of new technologies has led to a shortage of professional personnel to efficiently perform the cyber security. Although various methods such as cyber rage are being used to cultivate cyber security experts, there are problems of limitation of virtual training system, scenario-based practice content development and operation, unit content-oriented development, and lack of consideration of learner level. In this paper, we develop a fuzzy rule-based user-customized training scenario automatic generation system for improving user's ability to respond to infringement. The proposed system creates and provides scenarios based on advanced persistent threats according to fuzzy rules. Thus, the proposed system can improve the trainee's ability to respond to the bed through the generated scenario.

A Study on Control System Cyber Security Education & Training Method (제어시스템 사이버 보안 교육훈련 방안 연구)

  • Kim, Kyeong-Ho;Maeng, YounJae;Jang, MoonSu;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.645-656
    • /
    • 2019
  • As the number of cyber threats to control systems increases, the need for control system cyber security is also increasing. Currently, various cyber security related education and control system education are being conducted. However, it does not fully reflect the characteristics of the control system and the characteristics of the participants. In this paper, we propose a training system and technique to enhance the control system cyber security capability. To this end, we analyze the limitations of existing security education. Based on the results, we develop a control system training environment model based on the IEC62443 Standard and develop an ARCH based training method.

Development of Cyber Training Content for Newly Employed Public Services Librarians (신임사서공무원을 위한 기본소양 사이버 연수용 콘텐츠 개발)

  • Lee, Shin-Ho;Yang, Hae-Sool
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.3
    • /
    • pp.289-316
    • /
    • 2011
  • This study sets out to examine training courses for newly government-employed librarian for developing training contents to learn their basic knowledge, and suggests development model about training contents' planning, designing and making-process. In addition, in order to evaluate cyber training contents it devises self-evaluating tool, conducts a reviewing of questionnaire and measure by Delphi method. The final content made under the cyber contents development model proposes the six areas and 28th trials. Feasibility assessment for the purpose of evaluating educational contents, based on 17 questions to measure the factor analysis results, it yields, it yields 4 factors having more than .40 variance. Though differences in perception depending on factors did not show statistical significance, the difference in the adequacy of questions results significantly lower in some of them.

Measures for Training Military Information Security Professional Personnel for Cyber Security (사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안)

  • Lee, Kwang-ho;Kim, Heung-Taek
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.145-151
    • /
    • 2017
  • The Cyberspace of the Republic of Korea Army is continuously threatened by enemies. Means for responding to such cyber threats are ultimately Military information security professional personnel. Currently, however, there are only a handful of advanced information security professional persons in Republic of Korea Army, and a lack of systematic training is inadequate. Therefore, in this thesis, we surveyed the information security professional human resource policies of USA, UK, Israel, and Japan. In addition, the policy to train professional human resources specialized in defense cyber security, we proposed training of specialist talent of 4 steps and medium and long term plan, step-by-step training system sizing, introduction of certification system.

A Study on Sizing and Operational Policies for Building the Cloud Training Portal System of Cyber Universities (사이버대학의 클라우드 실습 포털 구축을 위한 규모 산정 및 운영 정책)

  • Park, Jung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.171-178
    • /
    • 2015
  • In these days, the practical training education is getting highlighted in IT curriculum. This study is for the Cloud computing based Virtual Desktop Service Plan of IT education and its efficient operation and management plan. With the implementation of a virtual lab environment system, the training environment which is customized by the curriculum is able to be provided. Also in the case of the limited system, the curriculum is able to be provided for each subject in advance. Therefore if the Cloud Training (or Practicing) Portal system for the multiple cyber universities is implemented according to this study's estimated scale and operation managing policies, the virtual training education service system could be provided in more efficient and more effective ways.

A Cyber-Training & Education Model for Tug-barge Operators

  • Lee, Eun-Bang;Yun, Jong-Hwui;Jeong, Tae-Gweon
    • Journal of Navigation and Port Research
    • /
    • v.34 no.4
    • /
    • pp.287-292
    • /
    • 2010
  • The purpose of this study was to create a cyber-training & education program in response to the needs of skippers and crews operating tug-barges within Korean coastal waters and the rapid changers in this industry. Skippers and crews are inclined to operate tug-barges on the basis of experience rather than information. It is not easy to provide useful information whenever they want or to drill them in safety management skills, because of their passive attitude toward education and the few opportunities that exist. In order to increase educational opportunities, efficiency and motivation, the authors have developed this program which consists of a 'tug bridge resource management module, risk perception training module, accident case module, operating module and navigation module', and are hoping that this program will enhance and strengthen all tug-barge operations. We are also putting all our energies into designing up to date animation programs and developing new scenarios concerning the method of evaluation and certification distribution.

Effect of perceptions of attributes of Cyber Education on the adoption decision (사이버학습 속성인식이 학습참여결정에 미치는 영향 분석)

  • Suh, Soon-shik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.35-43
    • /
    • 2002
  • By entering the information society, the trend of increasing use of the cyber education to deliver high-Quality educational programs is likely to continue. For instance, supported by the government agencies, central officials training institute is expending vast amounts of money for the installation of cyber education programs. However, much of the research that has been done concerns the discrepancy between the potential and the actual use of technology in the field of education and training. The intent of this study was to identify the decision of the adoption of cyber education among national officials who had just peceived the existence the cyber education programs which would be used for their professional training and development, and to investigate the relationships between the Rogers' five attributes of innovation (relative advantage, compatibility, easy of use, observability, trialiability) and their decision of adoption. The results of the study generally concurred with Rogers diffusion of innovation theory revealing that perceived compatibility, easy of use, and observability of cyber education are significant predictors of decision to participate in cyber education.

  • PDF