• Title/Summary/Keyword: information Security Professionals

Search Result 104, Processing Time 0.025 seconds

COVID-19 Prediction model using Machine Learning

  • Jadi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.247-253
    • /
    • 2021
  • The outbreak of the deadly virus COVID-19 is said to infect 17.3Cr people around the globe since 2019. This outbreak is continuously affecting a lot of new people till this day and, most of it is said to under control. However, vaccines introduced around the world can help mitigate the risk of the virus. Apart from medical professionals, prediction models are also said to combinedly help predict the risk of infection based on given datasets. This paper is based on publication of a machine learning approach using regression models to predict the output based on dataset which have indictors grouped based on active, tested, recovered and critical cases along with regions and cities covering most of it from Dubai. Hence, the active cases are tested based on the other indicators and other attributes. The coefficient of the determination (r2) is 0.96, which is considered promising. This model can be used as an frame work, among others, to predict the resources related to the dangerous outbreak.

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

A Study on the NCS based Curriculum for Educating Information Security Manpower (정보보호 산업분야 신규 인력 양성을 위한 NCS 기반 교육과정 설계에 관한 연구)

  • Song, Jeong-Ho;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.537-544
    • /
    • 2016
  • National Competency Standards (NCS) need to be introduced to train newly hired staff and to gradually improve employees' work performance in the information security industry. In particular, the introduction of a new NCS curriculum for new hires is important in order to retain and efficiently manage professionals in the information security field. However, the legacy NCS is not clearly designed for the information security field. So a formal curriculum has been suggested for institutions training the information security workforce. Therefore, this study establishes a competency unit based on the types of personnel, their duties, and required knowledge. To select the competency unit, this study reviewed prior research to understand the required skills and work knowledge, and reviewed recruitment-based NCS that public agencies and public and private companies have carried out, including them in the study. The selected competency unit was classified into a required competency unit and an elective competency unit based on the importance of the duties and the demands of training. Through a verification process for the new, licensed career path model in the NCS information and communications field, this study suggests updated NCS competency units and required courses to provide an appropriate NCS curriculum for newly hired employees in the information security industry.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

An empirical study on the performance factors of the BSC perspectives on government support regional innovation clusters in the management consulting (클러스터 혁신지역의 정부지원 경영컨설팅에 대한 BSC관점 성과요인 측면에서의 실증적 소고)

  • Park, Soon-mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1583-1593
    • /
    • 2015
  • This study applied the BSC performance consulting experience and diverse variable factors and whether there any differences in terms of satisfaction and the relationship between the support for the government consulting firm specializing in human resources by the resident of the innovation cluster area was investigated through empirical research. According to the study, a new high in recent local government support Consulting Consulting satisfaction by professionals residing in the area that applies to industrial clusters leads to practical consultancy, which was being evaluated as a significant boon to real performance of the company.

Defining the Scope of the Internet of Things with a Particular Focus on Its Role in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.187-197
    • /
    • 2023
  • Today's world is experiencing rapid technological advancement like never before. The ever-changing technology space has overwhelmed citizens with a substantial load of information, which has made it difficult for them to keep up with the technology awareness. This review paper is written to provide information about the Internet of Things in a way that technical along with nontechnical individuals can understand the definition, historical evolution, components, and scope of IoT technology. Relevant literature published between January 2009 and February 2023 was included in this paper. The applications of the Internet of Things in healthcare have been a special focus of this paper as IoT has massive potential in this field and healthcare professionals often face significant issues in keeping their technology knowledge up to date. Moreover, some of the most common issues associated with IoT introduction in healthcare are also discussed in the paper along with some suitable recommendations. Although, IoT can significantly transform our lives and can introduce convenience and efficiency, particularly in the healthcare sector. However, its adoption in healthcare is still a major task due to various challenges presented by the health workforce. Thus, in-depth empirical research is suggested to assist the IoT technology transition.

A Study on Present Situation of Violence in School and Improvement Program (학교폭력의 실태분석과 개선 방안에 관한 연구)

  • Park, Youngman;Jeong, Jeahwan;Kim, Eunjung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.9-22
    • /
    • 2015
  • School is the place where teenagers spend most of their time, forming friendships and receiving guidance from the teachers. Their life in school is a procedure of learning lessons before advancing into the society. However, in this place of learning, misdeeds such as violence, extortion and bullying are actually happening, some of which developing into suicide, murder and prostitution. For this reason, violence in school, especially, raises concerns as a serious social problem these days. Therefore, this study suggests more practical improvement programs to solve the problem of the violence in school, by first investigating the concept and the actual situation of school violence, and by better understanding the problems resulted from the school violence. The researchers of the study suggest as follows: First is about strengthening the education that builds students' personality, where we investigate the methods of personality education that suit with the current situation and suggest what is necessary to improve them. The second is about expansion of the functioning of families and of the educational role of the household heads, where we argue the importance of education in the family in addition to the education in school, and we suggest the right way for the parents to discipline their children. The third is about expansion of counseling professionals and improving social environment, where we explain the importance of counseling professionals in preventing and solving the issues in school violence and suggest expansion of these professionals and also suggest installation and operation of dedicated counseling room in schools. The fourth is about use of school sheriffs, where we suggest dispatching school sheriffs nationwide and fully use them as a countermeasure against school violence.

A Study on Cybersecurity Data Sharing System Model with a Hierarchical Structure for Effective Data Sharing (효과적인 데이터 공유를 위한 계층적 구조를 갖는 사이버 보안 데이터 공유시스템 모델 연구)

  • Ho-jei Yu;Chan-hee Kim;Ye-rim Cho;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.39-54
    • /
    • 2022
  • Recently, the importance of collecting, analyzing, and real-time sharing of various cybersecurity data has emerged in order to effectively respond to intelligent and advanced cyber threats. To cope with this situation, Korea is making efforts to expand its cybersecurity data sharing system, but many private companies are unable to participate in the cybersecurity data sharing system due to a lack of budget and professionals to collect cybersecurity data. In order to solve such problems, this paper analyzes the research and development trends of existing domestic and foreign cyber security data sharing systems, and based on that, propose a cybersecurity data sharing system model with a hierarchical structure that considers the size of the organization and a step-by-step security policy that can be applied to the model. In the case of applying the model proposed in this paper, it is expected that various private companies can expand their participation in cybersecurity data sharing systems and use them to prepare a response system to respond quickly to intelligent security threats.

A study on Information Protection Manpower and Budget Adequacy for Cooperative-Type Financial Company's Federation (협동조합형 금융회사의 중앙회를 위한 정보보호 인력 및 예산의 적정성에 관한 연구)

  • Lim, Jung-hwan;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.29-38
    • /
    • 2016
  • A financial institution operated by cooperatives, abiding by the principle set by the cooperative federation, is comprised of a numerous financial institutions. Most of these small institutions are operated within local areas, providing financial services for coop members. The Financial Supervisory Regulations that supervises security professionals, organizations, and budgets are established entirely based on commercial banks in which the application of these regulations on coop financial institutions may not be proper. This paper aims to provide an efficient IT security policy for nation-wide financial institutions operated by the Cooperative Federation by analyzing its security personnel managements and adequacy.