• Title/Summary/Keyword: information security education

Search Result 900, Processing Time 0.023 seconds

A Case Study on the Information Security Management System for Major Korean Businessn Groups (국내주요그룹의 정보보안관리 체계에 관한 사례 연구)

  • Sun, Han-Gil;Han, In-Goo
    • Asia pacific journal of information systems
    • /
    • v.8 no.2
    • /
    • pp.105-119
    • /
    • 1998
  • As the first step to information security, the security policy and organizational control need to be established. The purpose of this study is to investigate the policy and management of information security of five major Korean business groups. The results of case study on five giant groups can be summarized as follows. There exists a basic policy for information security. But it is outdated and not realistic in the present. The security audit and education need to be upgraded. It is also necessary to use security tools actively. The security level is low in companies which do not have independent information security divisions. Therefore, it is desirable to build information security teams. The number of security personnel is not enough for the task although there exist an information security team in the company. It is important to check if the team has the ability of perform information security task. The interview with security managers reveals that the total security management should be integrated with physical and computer security. It is suggested that an Information Security Center play the major role for information security. The study on the information security management for industry level is expected to be performed in the future.

  • PDF

Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence : Focusing on the Mediating Effect of Information Security Awareness (금융회사의 정보보호활동이 정보보호의식 및 정보보호자신감에 미치는 영향 : 정보보호의식의 매개효과를 중심으로)

  • Soh, Hyeon-Chul;Kim, Jong Keun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.45-64
    • /
    • 2017
  • The Purpose of this Study is to find out the Implications of the Information Security Activities of Financial Companies on the Confidence of the Information Security Officers and to find Academic and Practical Implications to Supplement the Insufficiencies. As a Result, it was Confirmed that the Information Security Officer's Confidence in Information Security for Companies and the Level of Information Security Awareness of the Employees are Increased when Financial Companies Conduct Information Protection Activities Focusing on Information Security Education, Security Incident Responses and In/Out Security.

The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone (정보시스템 관련 교육의 정도가 보안 우려 및 온라인 거래 의도에 미치는 영향 - 인터넷 이용과 스마트 폰 이용의 비교 분석)

  • Jung, Seung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.145-161
    • /
    • 2012
  • This study aims to explore how the degree of education related to information systems and the Internet literacy affect perceived security risk and how these three variables affect online transaction intention based on the Technology Acceptance Model (TAM). Since using smartphone to purchase necessary products is increasing, the study provided two different cases of using the existing Internet and smartphone to buy products. As a result of an empirical test, the degree of information system education, internet literacy, and perceived security risk had significant effects on online transaction intention mediating perceived usefulness and perceived ease of use. Unlike the expectation, the more people have education related to information systems, the more they have knowledge about hacking or cases of privacy infringement, leading to even more concerns about security, thereby believing the Internet transactions require much effort. The more the education about information system, the more we have concerns about security; therefore, perceived security risk have a positive(+) effect on perceived usefulness not a negative(-) effect. Lastly, while the degree of education related to information systems has relations with the recognition of the usefulness of the Internet transaction, the study showed that there are no relations of recognizing the usefulness and the ease of use of smartphone.

A Study on Developing Professional Training of the Private Security Industry (민간경비 산업의 전문인력 양성 방안)

  • Park, Aok-Cheol
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.91-111
    • /
    • 2006
  • Technology development of modern society reduces times, costs and labor costs but demands work forces requiring expert knowledge on technology. Consequently knowledge worker becomes important. Not changing into a specialist acquired expert knowledge, people can't survive in competitive society. Therefore, the purpose of this study is to grasp the actual condition of private security industry and to examine problems. The final goal is to find the way to improve the professionalism of workers in private security industry. First. Now we must make up for the subject for examination actually and be in a triangular position and complement a professional materials for teaching. At the same time it must strengthen the education using advanced instruments seek to Total Security System. Moreover it is demanded 'institutional supplement of security guard instructors' which means job training for security guard instructor Second. On the job training which can deal with a state of emergency through 'security guard training' with a theory and an actual training must be strengthen. Also, most security guards have low understandings and interests because their ages are from 50's to 60's. Accordingly proper education must be offered to security guard. Third. Certification system of the private security guards are needed to fix the problems on an indiscreet issue and an abuse of license through deliberation on the security license. Fourth. Universities must find a new market to minimize the squandering of human resources because of oversupply and reduce the personnel. Also with enhancing the employment rate through specialized education, universities must offer an education which keeps pace with the times for not an entrance strategy but a long-term development. Effort for education of specialist will produce an improvement in business quality and improved services produce a customer satisfaction. A customer satisfaction will produce a fame of a successful company and positive images in market area. Finally the private industry will be developed by productivity improvement.

  • PDF

Development of Human Resources at universities for training of specialist in security industries - based on Departments related Security services - (경호·경비분야 전문인력양성을 위한 대학 인적자원개발 - 경호관련학과를 중심으로 -)

  • Kwon, Tae-Il
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.19-38
    • /
    • 2006
  • With rapid social change, security industries were diversified and universities related total security service were founded for training of specialist with a theory and practical affairs. Today, universities must provide an education which fits to job characteristics in rapidly changing society. Also students through this education must find their job properly. The purposes of this study, therefore, are to search a career selection of students majoring in total security service related departments and to study a role of universities for development of specialist related security industries. Revitalization plan of human resources for departments related security services are as follows ; roles of universities: a specialization of curriculum and a diversification of training method. 'academic-industrial cooperation', role of government: 'a legal and institutional policy on academic-industrial cooperation';. Universities, cooperations, government must cooperate mutually for development of specialist related security service field.

  • PDF

A Study on Control System Cyber Security Education & Training Method (제어시스템 사이버 보안 교육훈련 방안 연구)

  • Kim, Kyeong-Ho;Maeng, YounJae;Jang, MoonSu;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.645-656
    • /
    • 2019
  • As the number of cyber threats to control systems increases, the need for control system cyber security is also increasing. Currently, various cyber security related education and control system education are being conducted. However, it does not fully reflect the characteristics of the control system and the characteristics of the participants. In this paper, we propose a training system and technique to enhance the control system cyber security capability. To this end, we analyze the limitations of existing security education. Based on the results, we develop a control system training environment model based on the IEC62443 Standard and develop an ARCH based training method.

Methods of Organization of Information And Communication Technologies In Institutions of Higher Education

  • Popova, Alla;Sinenko, Oksana;Prokopenko, liudmyla;Dorofieieva Veronika;Broiako, Nadiia;Danylenko, Olha;Vitkalov, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.140-144
    • /
    • 2021
  • The article considers aspects of improving the quality of training of specialists based on the use of modern information and communication technologies in the educational process; the use of teaching methods and, as a result, an increase in the creative and intellectual components of educational activities; integration of various types of educational activities (educational, research, etc.); adaptation of information technology training to individual the characteristics of the student; ensuring continuity and consistency in learning; development of information technologies for distance learning; improving the software and methodological support of educational process.

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

A Study for Mobile Agent System to Support Security Service (보안 서비스를 제공하기 위한 이동 에이전트 시스템의 설계에 관한 연구)

  • Kim, Hyun-Bae
    • Journal of The Korean Association of Information Education
    • /
    • v.2 no.1
    • /
    • pp.130-137
    • /
    • 1998
  • An agent is a computer program that acts autonomously on a computer system. A mobile agent is not bound to the system where it begins execution. It has an ability to transport itself from on e system in a network to another. Mobile agent system solve the network traffic problem. Moreover, the agent may utilize the object services of the destination agent system. In this study the mobile agent system is introduced to support security service.

  • PDF