• 제목/요약/키워드: Security education

검색결과 1,742건 처리시간 0.026초

AES 암호 알고리즘 교육용 학습 프로그램 개발 (Development of Education Learning Program for AES Cryptography Algorithm)

  • 이동범;정명수;곽진
    • 컴퓨터교육학회논문지
    • /
    • 제14권4호
    • /
    • pp.53-61
    • /
    • 2011
  • 최근 급변하고 있는 시대에 맞춰 IT 관련 분야에서는 정보보호에 대한 중요성이 강조되고 있다. 정보보호 관련 기관에서는 관련 정책을 통해 개인정보보호 및 보안의 중요성을 강조하고 있지만, 아직까지 일부 업체나 개인 사용자들은 보안 의식이 매우 저조한 수준이다. 이에 본 논문에서는 사용자들의 보안의식을 제고시키기 위하여 대칭 블록 암호인 AES를 이용한 학습 프로그램을 개발하여 사용자들이 암호 알고리즘에 대해 쉽게 이해할 수 있도록 한다. 즉, AES 암호 알고리즘 교육용 학습 프로그램을 통해 암호화 및 복호화 되는 과정을 직접 확인할 수 있어 AES 암호에 대한 관심을 유발하고 정보보호에 대한 의식을 제고시키고자 한다.

  • PDF

은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구 (A Study on the Information Security Measures Influencing Information Security Policy Compliance Intentions of IT Personnel of Banks)

  • 심준보;황경태
    • Journal of Information Technology Applications and Management
    • /
    • 제22권2호
    • /
    • pp.171-199
    • /
    • 2015
  • This study proposes the practical information security measures that help IT personnel of banks comply the information security policy. The research model of the study is composed of independent variables (clarity and comprehensiveness of policy, penalty, dedicated security organization, audit, training and education program, and top management support), a dependent variable (information security policy compliance intention), and moderating variables (age and gender). Analyses results show that the information security measures except 'clarity of policy' and 'training and education program' are proven to affect the 'information security policy compliance intention.' In case of moderating variables, age moderated the relationship between top management support and compliance intention, but gender does not show any moderating effect at all. This study analyzes information security measures based solely on the perception of the respondents. Future study may introduce more objective measurement methods such as systematically analyzing the contents of the information security measures instead of asking the respondents' perception. In addition, this study analyzes intention of employees rather than the actual behavior. Future research may analyze the relationship between intention and actual behavior and the factors affecting the relationship.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권11호
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

교육기관에서의 스마트단말기 보안위협에 대한 대응방안 (Countermeasures against Security Threats on Smart Device in Educational Institutions)

  • 이인호;김태성
    • 한국IT서비스학회지
    • /
    • 제23권2호
    • /
    • pp.13-29
    • /
    • 2024
  • Recently, with the rapid spread of mobile terminals such as smartphones and tablet PCs, social demand for mobile information security is increasing as new security issues that are difficult to predict as well as service evolution and lifestyle changes are raised. Smart terminals include smartphones, smart pads, chromebooks, laptops, etc. that provide various functions such as phone calls, text messages, Internet browsing, social media apps, games, and education. Along with the explosive spread of these smart terminals, they are naturally being used in our daily life and educational environment. In the mobile environment, behind the convenience of portability, there are more various security threats and vulnerabilities than in the general PC environment, and threats such as device loss, information leakage, and malicious codes exist, so it is necessary to take fundamental security measures at a higher level. In this study, we suggest ways to improve security by identifying trends in mobile smart information security and effectively responding to security threats to the mobile environment. In addition, it presents implications for various measures for effective class utilization along with correct security management methods and security measures related to the supply of smart devices that the Office of Education is promoting for schools at each level.

교육행정정보시스템의 보안 및 기술적 문제 분석 (Analysis of the Security and Technical Problem of National Education Information System)

  • 이대식;윤동식
    • 융합보안논문지
    • /
    • 제4권3호
    • /
    • pp.9-18
    • /
    • 2004
  • 본 연구에서는 교육행정정보시스템의 보안 및 기술적 문제를 분석하여 보다 효율적인 시스템에 대한 개선 방안을 제시한다. 따라서 초 중 고 선생님들에게 교육행정정보시스템의 보안 및 기술적 문제를 5가지 항목으로 나누어 설문 조사를 실시하였다. 각 항목별 설문 문항을 분석한 결과, 교육행정정보시스템은 인권침해와 보안 및 개인정보유출 등의 문제가 있지만 정보화시대에 꼭 필요한 시스템이라는 인식이 높았다.

  • PDF

Information Security Activity of Analysis Phase in Information Security Model in Accordance with SDLC

  • Shin, Seong-Yoon;Lee, Tae-Wuk
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권11호
    • /
    • pp.79-83
    • /
    • 2016
  • In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. It dealt with from the first manifestations of the projects planning to final planning to establish information security in activities of the Information Security requirements. As an example exhibited by assessing the information security analysis phase activities of S corporations, it can be seen that the improved sales rise in information security activities.

정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석 : 정보보안 교육 서비스 투자를 중심으로 (An Empirical Study of Relationship between Information Security Investment and Information Security Incidents : A Focus on Information Security Training, Awareness and Education Service Sector)

  • 이한솔;채상미
    • 정보보호학회논문지
    • /
    • 제28권1호
    • /
    • pp.269-281
    • /
    • 2018
  • 정보화 사회에서 핵심 가치로 평가받고 있는 자원은 정보 그 자체이다. 이런 이유로 기업의 가치 있는 정보를 노리는 시도가 많아지며 정보보안 사고가 급증하고 있다. 기업에서는 정보보안 사고를 예방하기 위해 다양한 정보보안 부문에 투자하고 있으나, 어떤 부문에 대한 투자가 정보보안 사고를 감소시키는 데에 직접적으로 기여하는지는 잘 알지 못한 채 투자하고 있다. 기업의 대표적인 정보보안 투자 부문인 제품뿐만 아니라 대표적인 정보보안 서비스 사업으로 각광받고 있는 정보보안 교육 및 훈련, 보안관제 서비스, 그리고 취약점 분석의 투자 효용을 알아보기 위해 본 연구를 진행하였다. 한국 인터넷 진흥원의 2014년 정보보호 실태 조사의 원자료를 이용하고, 총 정보보안 사고건수를 종속변수로 두고 음이항분포 회귀분석을 실시한 결과 교육 서비스와 취약점 분석 서비스가 정보보안 사고를 줄이는 데에 유의미하게 기여하는 것으로 판단되었다. 이 연구는 학문적으로는 정보보안 경제학을 이론적 배경으로하여 정보보안 투자 부문의 실제 효용을 파악한 연구이며, 실증적으로는 조직에서 한정된 자원을 정보보안 투자에 배분할 때 효율적인 의사결정을 하는 데에 지침을 제공할 수 있는 연구이다.

보안정책에 대한 편향적 사고가 보안준수 행동에 미치는 영향 (Effects of Biased Awareness of Security Policies on Security Compliance Behavior)

  • 허준;안성진
    • 컴퓨터교육학회논문지
    • /
    • 제23권1호
    • /
    • pp.63-75
    • /
    • 2020
  • 보안사고 예방을 위한 많은 노력에도 불구하고 조직구성원의 보안행동과 연관된 정보유출, 랜섬웨어 등 치명적 보안사고 피해는 해마다 늘어나고 있다. 이 연구에서는 보안사고의 주요한 원인인 조직원의 보안정책 준수의 관점에서, 보안정책 준수에 영향을 주는 요인으로 편향적 사고를 제시하고 다음을 검증하였다. 첫째, 보안정책에 대한 편향적사고가 보안정책준수 태도에 주는 영향을 검증한다. 둘째, 경영진의 참여, 지각된 위험성, 교육 및 처벌이 편향적 사고를 증가 또는 감소시키는 조절 효과를 검증한다. 마지막으로, 보안정책준수 태도가 준수행동에 유의미한 영향을 주는 지 검증하였다. 이를 위해 157명을 대상으로 설문조사를 실시하고 연구모형 및 구조방정식 통계적 분석, 적합성 분석을 실시하였다. 연구결과 편향적 사고는 정보보안 정책준수 태도에 부정적 영향을 주는 것으로 나타났다. 또한 정보보안 정책준수 태도는 정책준수 행동을 증가시키는 것으로 분석되었다. 한편, 조직원 개인이 정보보안에 대한 위험성을 높게 지각할수록 편향적 사고를 감소시키는 조절효과가 있었으나, 경영진의 참여, 교육 및 처벌은 조절효과가 없는 것으로 나타났다. 향후, 연구결과는 내부조직원에 의한 보안사고 대처방안에 시사점을 줄 것으로 기대된다.

ATCIS 성능개량체계 만족 및 지속사용 의도에 미치는 영향요인 (A Study on the Factors Affecting the User Satisfaction and Continuous Use Intention of the Improved Army Tactical Command Information System)

  • 이태복;백승령
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제31권1호
    • /
    • pp.1-24
    • /
    • 2022
  • Purpose The purpose of this study is to investigate the factors that affect the user satisfaction and continuous use intention of the improved ATCIS in the Korean Army. Design/methodology/approach Based on the various theories in relation to IT continuance, user satisfaction was identified as the main factor with regard to the continuous use intention of the improved ATCIS. In addition, computer self-efficacy, education-training, and system quality were hypothesized as antecedent variables to user satisfaction, and information security stress was set as a moderating variable for these relationships. Findings Survey results show that computer self-efficacy, education and training, and system quality had a positive effect on user satisfaction, and information security stress was found to moderate these relationships. The effects of computer self-efficacy and education-training on user satisfaction were higher in the group with low information security stress. However, the relationship between system quality and user satisfaction was higher in the group with high information security stress. User satisfaction is found to have a positive effect on the continuous use intention even with habit considered as a control variable.

교수·학습이론의 군 학교교육 적용에 관한 연구 (A study on the Application of Teaching and Learning Theory to Military School Education)

  • 이득운
    • 안보군사학연구
    • /
    • 통권15호
    • /
    • pp.87-116
    • /
    • 2018
  • This study is a study on applying the teaching-learning theory of education to military school education. For the purpose, the theories of constructivist, cognitive, and behavioral theories of teaching-learning theory are reviewed and applied to military school education. The application of teaching-learning theory to military school education suggested the application of constructivist, cognitive, and behavioral education methods to each core curriculum and OBC curriculum. In addition, Gagne's 9th instructional design model of teaching and learning theory was applied in school education design. Applying the teaching-learning theory of education to military, discussion of situation education is constructivist education method, L&T education is cognitive education method, mastery education is behavioral education method, teaching principle, applicable education method. Based on the teaching-learning theory presented in this study, it is expected that the design of military school education and the application of education method will achieve the goal of more effective military school education.

  • PDF