• Title/Summary/Keyword: Information security education

Search Result 900, Processing Time 0.027 seconds

Theoretical Foundations of the Evolution of the Use of Multimedia Technologies in Modern IT Education in Ukraine

  • Zbanatska, Oksana;Zadorozhnya, Olena;Hurbanska, Antonina;Hurbanska, Svitlana;Grinberg, Larysa;Melnyk, Alla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.473-476
    • /
    • 2021
  • The article used a complex system of research methods: observation of the course of the educational process, analysis of literature on pedagogy, teaching methods, modern pedagogical technologies; analysis of the experience of using multimedia in the study of disciplines. The theoretical significance of the article: the definition of multimedia programs is given, the advantages and disadvantages of using multimedia programs are revealed, the basic principles of teaching using multimedia programs are revealed.

A Study on Improvements of the Information Security Department via the Curriculum Analysis (국내 정보보호학과의 교육과정 분석을 통한 개선방안 연구)

  • Lim, Wongyu;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.71-80
    • /
    • 2014
  • Accidents for information disclosure occurred in a steady increase, so many information security department has been established recently. But there was a lack of differentiation between department of IT department and they cannot train appropriate students for companies. This research examined the Workforce framework and competencies, the related research for improving information security curriculum. And then this research analyzed status and characteristics of the curriculum to the information security department, based on the Workforce framework and competencies presented by NICE. The result of the research confirmed that the current curriculum mainly consists of courses dealing with development of products that secure information, so the curriculum is needed to improve by focusing on workforce framework competencies. The result will be utilized as fundamental research for improving the curriculum of information security major in the future.

  • PDF

Effect of Security Culture on Security Compliance and Knowledge of Employees (조직의 정보보안 문화 형성이 조직 구성원의 보안 지식 및 준수의도에 미치는 영향 연구)

  • Hwang, Inho;Kim, Daejin;Kim, Taeha;Kim, Jinsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.1-23
    • /
    • 2016
  • This study proposes an alternative to minimize insider-caused security threats that are relatively difficult to control and cause high uncertainty in information security management. Therefore, we investigate the relationship between organizational effort and the security understanding of employees to eventually enhance security compliance intention among employees. We develop a research model and formulate hypotheses on the basis of past findings. Accomplished questionnaires are collected from 526 employees working in organizations where information security policy is being implemented. In addition, we prove the hypotheses using a structural model. After reviewing the structural model, the security knowledge of employees and information security culture are determined to positively influence the security compliance intention of employees. Moreover, top management support, security policy, security visibility, and security education programs are proven to be antecedent factors in establishing a security culture in organizations. The findings of this study could guide organizations in formulating information security strategies to enhance the security compliance intention of employees.

A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud (안전한 해사클라우드 환경을 위한 SH-Tree 기반의 데이터 동기화 기법 제안)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.929-940
    • /
    • 2016
  • The IMO e-navigation strategy has requested a communication infrastructure providing authorized seamless information transfer between stakeholders. The Maritime Cloud is the term used to describe the concept of an infrastructure that support authorized, seamless information transfer, adding those elements, that are necessary to support the e-navigation domain. It is necessary to consider the study on maritime cloud security, but the study is still an early stage. In this paper, we propose a secure synchronization method for the maritime cloud services. The proposed method can be synchronize between the vessel based on the SH-Tree, and it has the advantage that there is no exposure information in the synchronization process.

Improving Research Information Security in Academic Institutes through the Analysis of Security Awareness and Activities (보안 인지 및 실천 현황 분석을 통한 대학 연구정보보안 수준 제고 방안)

  • Park, Il-Hyung;Kim, Seong-Woo;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.91-108
    • /
    • 2010
  • Universities are one of leading R&D institutes, however, their scarce security investment allows research information to leak outside. This paper proposes methods for improving security level of academic institutes to protect research information by analyzing security awareness and activities. To do that, we verified the current status of information security and awareness level by analyzing the survey which was conducted for a member of Seoul National University. As a result of statistical analysis using correlation, analysis of variance, multi regression and so on, we concluded that it is essential to improve security awareness, activities, professor's security level and management process for research labs. Thus, we suggest the following methods, security awareness and knowledge development through education, security management for research labs through provision, introduction of data protection softwares and physical control of visitors which are to be adopted to improve security level.

Use of Innovation and Information Technologies In Music Lessons

  • Potapchuk, Tetiana;Fabryka-Protska, Olga;Gunder, Liubov;Dutchak, Violetta;Osypenko, Yaroslav;Fomin, Kateryna;Shvets, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.300-308
    • /
    • 2021
  • The processes of informatization of the modern educational space are inextricably linked with the active introduction of innovative information technologies, which diversify the forms of education and upbringing. The use of these technologies in education due to their specific properties significantly enhances the clarity of learning, emotional impact on students, helps to deepen interdisciplinary links, intensifies students' work, and improves the organization of educational activities. Innovative information technologies offer new opportunities for the use of text, audio, graphic, and video information in lessons, enriching the methodological possibilities of the lesson. Today, the use of these technologies is becoming an integral part of the study of any subject. Using multimedia presentations, publications, and websites created by students in the learning process, they can develop learning skills. According to researchers, there are many multimedia programs for working with a computer in a music lesson, namely: a music player, a program for singing karaoke, a music constructor, music encyclopedias, and training programs. The introduction of innovative information technologies in the system of music education allows expanding learning opportunities.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Research on Education and Training of the Analyzer for Security Enhancement of SW Vulnerability (SW 취약점의 보안성 강화를 위한 진단원의 교육 양성 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.945-950
    • /
    • 2017
  • Due to the vulnerability of the software, there is a hacking attack on the country's cyber infrastructure and real financial assets. Software is an integral part of the operating system and execution system that controls and operates Internet information provision, cyber financial settlement and cyber infrastructures. Analyzing these software vulnerabilities and enhancing security will enhance the security of cyber infrastructures and enhance the security of actual life in the actual country and people. Software development security system analysis and software development Security diagnosis analysis and research for enhancing security of software vulnerability. In addition, we will develop a textbook for the training of software vulnerability diagnosis and maintenance education, develop pilot test problems, pilot test of diagnostic staff, The purpose of this study is to enhance the software security of the cyber infrastructures of national and national life by presenting curriculum and diagnosis guide to train the software vulnerability examiner.

Curriculum Development for Smart Factory Information Security Awareness Training (스마트공장 정보보호 인식교육을 위한 커리큘럼 개발)

  • Jeon, In-seok;Yi, Byung-gueon;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1335-1348
    • /
    • 2016
  • Smart factory of Manufacturing sector is rapidly spreading, globally. In case of domestic, it is on going based on KOSF. It is neither lack of invest nor security of information due to it has been spread from manufacturing sector. Hence, that's very difficult to efficiency prevent from new type of intimidation and security accident happened sometimes from this situation. According to research information security condition with recognized new menace, there is a most efficient way is provide education of information security without any extra budget to safely spread smart factory. Thus, this study of research has developed security awareness training curriculum from international standard, requirement of the industry, and curriculum of educational institution based on NCS (National Competency Standard). It is be very helpful to spread smart factory safely due to expert group has been test of validity.

A Design on Information Security Occupational Classification for Future Convergence Environment (미래 융합환경 기반의 정보보호 직업군 설계)

  • Lee, Yunsoo;Shin, Yongtae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.201-215
    • /
    • 2015
  • Recently advanced security threats have increasingly occurred, and the necessity and importance of Information Security has been growing with the advent of the era of convergence beyond information-oriented age. Most domestic studies in the field of occupational classification of Information Security have only focused on technology-oriented occupations. Relatively little research has been carried out on the occupational classification in the view of convergence environment. Therefore, in this paper we gave a definition of Information Security occupations, classified them and draw required capabilities by occupations in order to design the occupational classification system of Information Security and the required capabilities for future convergence environment by analyzing the previous studies. We also reclassified the occupational classification and required capabilities by occupations, and verified the validity of them based on National Initiative for Cybersecurity Education's the occupational classification system of Information Security considering the future convertgence environment. It is expected that the results of this study will be employed as base data for manpower demand and supply and improvement of working conditions in the future convergence environments. In the future study we will build standardized instruction methods which provide occupational capabilities by using the required capabilities by occupations.