• Title/Summary/Keyword: information security education

검색결과 910건 처리시간 0.023초

SaaS 기반 가상훈련 시스템을 이용한 정보보호 교육의 장단점 (Merits and Demerits of Information Security Education Using SaaS Based Virtual Training Systems)

  • 이해영;박현민;민경태;박영선
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제59차 동계학술대회논문집 27권1호
    • /
    • pp.211-212
    • /
    • 2019
  • 서로 다른 지역에서 서로 다른 과정의 실습 중심의 정보보호 단기 교육을 진행하기 위하여 SaaS 기반 가상훈련 시스템을 사용하였다. 본 논문에서는 SaaS 기반 가상훈련 시스템을 이용한 정보보호 실습 교육의 장단점을 정리한다. 강사 및 수강생들은 교육 과정 중 데스크톱 가상화를 사용하여 실습 환경을 구축하는 시간을 절약할 수 있었다. 또한, 원격 실습 지원, 진행 상황 확인도 가능하였다. 관리자는 강사 및 장소와 무관하게 균등한 실습 교육을 제공할 수 있다는 점이 가장 큰 장점이었다. 향후에는 서버 가상화와 데스크톱 가상화가 결합된 하이브리드 형태의 실습 환경 개발을 고려할 필요가 있다.

  • PDF

민간경호업의 질적 발전 방안에 관한 연구 (A Study on the Qualitative Improvement of Private Security Industrial)

  • 송상욱
    • 한국재난정보학회 논문집
    • /
    • 제2권1호
    • /
    • pp.113-127
    • /
    • 2006
  • The suggestions that follow are about the Qualitative Improvement of private security Industrial. First, in legal and institutional policy, new establishment by law for private security and more support from government is asked. Moreover, the restructuring or M&A between petty companies and the pricing for security service should be performed. Second, in the structural aspect of private security industry, the professional education center for private security guards should be established and the terms of payment and welfare should be improved to the level above standard. In addition, it should be achieved to change the public to have a new and correct understanding of private security and develope the specialized parts suited to the characteristic and ability of each companies. Third, the construction of operating system for private security service should be achieved; recruit system for competent security guards, marketing strategy and enforcement system, widely known confidence to client, normal training system for security guards and post management system for client. This is also to be suited to the characteristic of each companies.

  • PDF

Aesthetic Education of Young People As a Necessary Condition for Cultural Development of the Individual in Modern Conditions of the Information Society

  • Shevtsova, Olena;Tiutiunnyk, Mariia;Bosyi, Oleksandr;Zharovska, Olena;Patsaliuk, Iryna;Bielikova, Valentyna;Kuchai, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.207-213
    • /
    • 2022
  • The article reveals the problems of aesthetic education of young people as a necessary condition for the cultural development of the individual in the modern conditions of the information society. Aesthetic education should contribute to the formation of a creatively active personality. The basis of aesthetic education of young people in the modern conditions of the information society is the core of artistic culture - art as a unique form of public consciousness that contributes to the spiritual development and improvement of the inner world of a person. The main tasks of aesthetic education are highlighted. It is focused on the formation of aesthetic consciousness and aesthetic behavior of the individual. The formation of true aesthetic and spiritual values of students is impossible without a deep awareness of the national foundations of culture, which combines science (including technology), education, art, morality, way of life and worldview, and most importantly its information component - information culture. The effectiveness of aesthetic education of students largely depends on the skillful use of various methods and means by teachers. Aesthetic education of students involves a qualitative change in the level of their aesthetic culture in the modern conditions of the information society. In the era of information and computer technologies, the main Institute for aesthetic education of young people, as a necessary condition for the cultural development of the individual, is mass media. Television stands out especially because it has several information series (audio and video sequence), multiplied by the efficiency of providing information that increases several times compared to paper media, which allows you to report directly during the event.

IoT 제품의 안전 관리를 위한 기술 및 정책적 사후 보안관리 프레임워크 (Technology and Policy Post-Security Management Framework for IoT Electrical Safety Management)

  • 이동혁;박남제
    • 전기학회논문지
    • /
    • 제66권12호
    • /
    • pp.1879-1888
    • /
    • 2017
  • The Internet of Things (IoT) environment has been gradually approaching reality, and although it provides great convenience, security threats are increasing accordingly. For the IoT environment to settle safely, careful consideration of information security is necessary. Although many security measures in the design and development stages of IoT products have been studied thus far, apart from them, the establishment of systems and countermeasures for post management after the launch of IoT products is also very important. In the present paper, a technical and policy post-security management framework is proposed to provide secure IoT environments. The proposed framework defines the concrete response procedures of individual entities such as users, manufacturers, and competent authorities in the case of the occurrence of security flaws after launching IoT products, and performs appropriate measures such as software updates and recalls based on an assessment of the risk of security flaws.

Comparative Characteristics Of Information Technologies And Technologies Of Distance Learning Of Higher Education Institutions

  • Dibrova, Valentyna;Sovhira, Svitlana;Liakhovska, Yuliia;Burdun, Victor;Boichuk, Nelia;Saikivska, Liliia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.69-72
    • /
    • 2021
  • The article discusses the features of the use of distance technologies to intensify the learning process of students. The advantages and disadvantages of distance learning are shown. The role and functions of the teacher in distance learning have been adjusted. Information and methodological support for distance learning of students is proposed. Analyzed pedagogical, psychological, methodological and philosophical literature, educational standards, charters of higher educational institutions and other documents. Studied foreign experience in conducting classes using information technology.

Information and Methodological Technologies of the Marketing Activity Management System in Higher Education Institutions

  • Fursykova, Tetiana;Boychuk, Inna;Baluk, Nadiia;Karpii, Olena;Korotka, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.383-390
    • /
    • 2021
  • The main purpose of the study is to determine the features of the functioning of the university as a part of the state structure in the context of marketing management n the context of storing information technologies. Students were obtained due to the following theoretical methods: systems of analysis and synthesis, induction and deduction, comparison, classification, generalization and systematization, idealization and abstraction. It is advisable to study the essence and nature of educational services, as well as the role of education in economic development, relying on the methodology of institutional theory, the theory of stakeholders, which makes it possible to assess the contribution of education to the harmonization of public and individual interests, the formation of appropriate structures and subjects of development, ensuring the building of intellectual potential and quality of life. The specificity of the functioning of the university as a part of the state structure in terms of managing marketing activities was characterized.

고등학교 정보보안단원의 체험형 스마트교육 콘텐츠 적용 수업이 정보통신윤리의식에 미치는 영향 (The Effect on Information Communication Ethics of Experience Type Smart Learning Contents Application for High School Information Security Education)

  • 서현정;김성식
    • 컴퓨터교육학회논문지
    • /
    • 제19권6호
    • /
    • pp.81-89
    • /
    • 2016
  • 사회적 기술적 환경이 급변함에 따라 수동적인 지식습득자였던 학습자는 주어진 정보를 단순히 기억하고 재생하는 차원을 넘어 실생활의 현상을 비판적으로 파악하고 창의적인 문제해결력이 필요하게 되었다. 이는 새로운 형태의 교육목표 및 내용, 교육방법과 평가방법과 더불어 교육환경도 함께 요구됨을 의미한다. 변화된 교육패러다임에 부합하는 스마트교육에 대해 분석하고, 스마트교육모형에 의거 고등학교 정보윤리부분 '정보보호와 보안' 단원에 해당하는 교수-체험형 교육콘텐츠를 개발하여 수업에 적용해 봄으로써 스마트교육이 정보통신윤리의식에 미치는 영향을 알아보고자 하였다.

메타버스를 활용한 조선 해양 분야 정보보호 교육 콘텐츠 개발 방안 (A Study on the Development of Information Protection Education Contents in the Maritime Using Metaverse)

  • 김진
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.1011-1020
    • /
    • 2021
  • 해를 거듭할수록 IT 산업의 발전에 따라 조선·해양 산업 관련 사이버보안 사고가 자주 발생하고 있다. 이에 따라 정보보호 산업 전문 역량이 필요하고 이를 위한 효과적인 정보보호 교육 콘텐츠가 필요하다. 최근 메타버스(Metaverse) 기술을 교육 분야에 적용하여 사용자 경험을 높이는 사례가 늘고 있다. 이에 본 연구에서는 기존 정보보호 교육 및 훈련에 관한 연구와 조선·해양 산업의 정보보호 교육 콘텐츠를 분석하고, 메타버스를 활용한 정보보호 교육 및 훈련을 위한 콘텐츠 개발 방향 4가지(온라인 교육 및 세미나 활용, 가상 선박의 사이버보안 위협 요소 학습, 모의 해킹 학습과 사고 재현, 사이버보안 전시관 운영)를 제안한다.

A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication

  • Yantao, Zhong;Jianfeng, Ma
    • Journal of Communications and Networks
    • /
    • 제12권6호
    • /
    • pp.592-599
    • /
    • 2010
  • In recent years, significant improvements have been made to the techniques used for analyzing satellite communication and attacking satellite systems. In 2003, a research team at Los Alamos National Laboratory, USA, demonstrated the ease with which civilian global positioning system (GPS) spoofing attacks can be implemented. They fed fake signals to the GPS receiver so that it operates as though it were located at a position different from its actual location. Moreover, Galileo in-orbit validation element A and Compass-M1 civilian codes in all available frequency bands were decoded in 2007 and 2009. These events indicate that cryptography should be used in addition to the coding technique for secure and authenticated satellite communication. In this study, we address this issue by using an authenticated key-exchange protocol to build a secure and authenticated communication channel for satellite communication. Our protocol uses identity-based cryptography. We also prove the security of our protocol in the extended Canetti-Krawczyk model, which is the strongest security model for authenticated key-exchange protocols, under the random oracle assumption and computational Diffie-Hellman assumption. In addition, our protocol helps achieve high efficiency in both communication and computation and thus improve security in satellite communication.