• Title/Summary/Keyword: security professionals

Search Result 159, Processing Time 0.026 seconds

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.

The Enhancement of intrusion detection reliability using Explainable Artificial Intelligence(XAI) (설명 가능한 인공지능(XAI)을 활용한 침입탐지 신뢰성 강화 방안)

  • Jung Il Ok;Choi Woo Bin;Kim Su Chul
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.101-110
    • /
    • 2022
  • As the cases of using artificial intelligence in various fields increase, attempts to solve various issues through artificial intelligence in the intrusion detection field are also increasing. However, the black box basis, which cannot explain or trace the reasons for the predicted results through machine learning, presents difficulties for security professionals who must use it. To solve this problem, research on explainable AI(XAI), which helps interpret and understand decisions in machine learning, is increasing in various fields. Therefore, in this paper, we propose an explanatory AI to enhance the reliability of machine learning-based intrusion detection prediction results. First, the intrusion detection model is implemented through XGBoost, and the description of the model is implemented using SHAP. And it provides reliability for security experts to make decisions by comparing and analyzing the existing feature importance and the results using SHAP. For this experiment, PKDD2007 dataset was used, and the association between existing feature importance and SHAP Value was analyzed, and it was verified that SHAP-based explainable AI was valid to give security experts the reliability of the prediction results of intrusion detection models.

A Study on Present Situation of Violence in School and Improvement Program (학교폭력의 실태분석과 개선 방안에 관한 연구)

  • Park, Youngman;Jeong, Jeahwan;Kim, Eunjung
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.9-22
    • /
    • 2015
  • School is the place where teenagers spend most of their time, forming friendships and receiving guidance from the teachers. Their life in school is a procedure of learning lessons before advancing into the society. However, in this place of learning, misdeeds such as violence, extortion and bullying are actually happening, some of which developing into suicide, murder and prostitution. For this reason, violence in school, especially, raises concerns as a serious social problem these days. Therefore, this study suggests more practical improvement programs to solve the problem of the violence in school, by first investigating the concept and the actual situation of school violence, and by better understanding the problems resulted from the school violence. The researchers of the study suggest as follows: First is about strengthening the education that builds students' personality, where we investigate the methods of personality education that suit with the current situation and suggest what is necessary to improve them. The second is about expansion of the functioning of families and of the educational role of the household heads, where we argue the importance of education in the family in addition to the education in school, and we suggest the right way for the parents to discipline their children. The third is about expansion of counseling professionals and improving social environment, where we explain the importance of counseling professionals in preventing and solving the issues in school violence and suggest expansion of these professionals and also suggest installation and operation of dedicated counseling room in schools. The fourth is about use of school sheriffs, where we suggest dispatching school sheriffs nationwide and fully use them as a countermeasure against school violence.

NCS proposal for industrial security (산업보안 분야에 대한 NCS 제안)

  • Park, Jong-Chan;Ahn, Jung-Hyun;Choi, Young-Pyul;Lee, Seung-Hoon;Baik, Nam-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.358-360
    • /
    • 2022
  • Modern society is developing rapidly and technologies that provide convenience in living are developing day by day. On the other hand, the development of cyber attacks that threaten cybersecurity is developing faster, and it still adversely affects the industrial environment, and industrial damage is steadily occurring every year. Industrial security is an activity that safely protects major assets or technologies of companies and organizations from these attacks. Therefore, it is a situation that requires professional manpower for security. Currently, the manpower situation for security is staffed, but knowledge of the understanding and concept of industrial security jobs is insufficient. In other words, there is a lack of professional manpower for industrial security. It is the NCS that came out to solve this problem. NCS is the state standardized ability (knowledge, attitude, skills, etc.) necessary to perform duties in the industrial field. NCS can systematically design the curriculum using NCS as well as help in hiring personnel, and NCS can be applied to the national qualification system. However, in the field of industrial security, NCS has not yet been developed and is still having difficulties in hiring personnel and curriculum. Although the NCS system in the field of industrial security has not been developed, this paper proposes the industrial security NCS to solve the problem of hiring professionals later and to help the field of industrial security NCS to be established later.

  • PDF

Perceptions of the Security Management at Critical Facilities in South Korea: College students' attitudes toward increasing demand for security personnel and the alternatives to police (공공부문 정규직 전환 및 의무경찰제도 폐지에 따른 보안산업 변화에 대한 인식)

  • Wang, Sug-Won;Choi, Yeon-Jun
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.87-107
    • /
    • 2019
  • With the government policy on converting contract workers to full-time employees, there have been significant changes about the security personnel at the nation's critical facilities, including the National Assembly Building and airports. Moreover, the scheduled disbandment of the conscripted police force in 2023 has raised concerns about security management at different government agencies. To examine the college students' perceptions on the possible alternatives to fill the expected security gap, 234 undergraduate students of security management and protection in the Seoul metropolitan region were surveyed. Particularly, a comparative analysis was conducted on the legal bases and supervision, the employment types and salaries, and the scopes of responsibility and authority of suggested alternatives were compared. The results showed that utilization of private police forces was thought to be the most effective option. Based on the research findings, the university departments should develop and maintain a quality curriculum to educate their students to be prepared security professionals with a focus on emergency response capabilities and martial arts, including the courses on private police law and emergency rescue and cardiopulmonary resuscitation (CPR).

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF

A study on Information Protection Manpower and Budget Adequacy for Cooperative-Type Financial Company's Federation (협동조합형 금융회사의 중앙회를 위한 정보보호 인력 및 예산의 적정성에 관한 연구)

  • Lim, Jung-hwan;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.29-38
    • /
    • 2016
  • A financial institution operated by cooperatives, abiding by the principle set by the cooperative federation, is comprised of a numerous financial institutions. Most of these small institutions are operated within local areas, providing financial services for coop members. The Financial Supervisory Regulations that supervises security professionals, organizations, and budgets are established entirely based on commercial banks in which the application of these regulations on coop financial institutions may not be proper. This paper aims to provide an efficient IT security policy for nation-wide financial institutions operated by the Cooperative Federation by analyzing its security personnel managements and adequacy.

Suggestion of Elementary School Information Security Education Elements Based on Pipe Game to Understand the Principle of Data De-Identification (데이터 비식별화 원리의 이해를 위한 파이프 게임 기반 초등 정보보호 교육 요소 제언)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1063-1070
    • /
    • 2021
  • The development of IT technology emphasizes the importance of training IT professionals, and the need for education for elementary and secondary education as well as adult education for training technical talent is expanding. In particular, information curriculum will be added as an essential course from the 2015 revised curriculum, and IT technology will be understood in the curriculum for elementary and secondary schools and will be required to develop applicability to solve problems based on understanding. Currently, research is under way to integrate IT technologies to provide new services, and if the use of personal information is required in the process, thorough security for the leakage of personal information is pre-empted. It also prevents the identification of personal information in the process of transmitting data to the outside world. In this paper, we propose a training method for elementary school subjects to understand the non-identification process that occurs in the process of transferring data using pipe games so that they can understand the principles of non-identification and develop applications to solve real-life problems.

Beyond the clinical walls: registered dietitian nutritionists providing medical nutrition therapy in the home setting

  • Hicks-Roof, Kristen;Xu, Jing;Fults, Amanda K.;Latortue, Krista Yoder
    • Nutrition Research and Practice
    • /
    • v.15 no.6
    • /
    • pp.789-797
    • /
    • 2021
  • BACKGROUD/OBJECTIVES: Registered dietitian nutritionists (RDN) are providers of medical nutrition therapy (MNT) to address health and chronic disease. Traditionally, RDNs have provided care in healthcare facilities including hospitals and private care facilities. The purpose of this study was to determine how RDN individualized MNT in the home impacted nutrition, physical activity, and food security. SUBJECTS/METHODS: This is a secondary data analysis. The mean age of the participants (n = 1,007) was 51.6 years old with a mean body mass index (BMI) of 34.1 kg/m2. Individualized MNT visits were delivered by an RDN in the home setting from January to December 2019. Participants were referred by healthcare professionals or self-referred. Participants had MNT benefits covered by their health insurance plan (43.3% Medicaid; 39.8% private insurance; 7.9% Medicare, 9% other). Health outcomes related to nutrition care were measured. Outcomes included self-reported consumption of nutrition factors and physical activity. Our secondary outcome focused on food security. The changes in weight, BMI, physical activity, and nutrition factors were analyzed by a linear regression model or linear mixed model, adjusting for age, sex, baseline value, and number of appointments. Food security was summarized in a 2 by 2 contingency table. RESULTS: Baseline values had significantly negative impacts for all changes and number of appointments was significant in the changes for weight and BMI. Increases in physical activity were significant for both female and male participants, 10.4 and 12.6 minutes per day, respectively, while the changes in weight and BMI were not. Regarding dietary factors, the consumption total servings per day of vegetables (0.13) and water (3.35) significantly increased, while the consumption of total servings of whole grain (-0.27), fruit (-0.32), dairy (-0.80) and fish (-0.81) significantly decreased. About 24% (of overall population) and 45% (of Medicaid population) reported improvements in food security. CONCLUSIONS: This study found that home visits were a useful setting for MNT delivered by RDNs. There is a strong need for individualized counseling to meet the participants' needs and personal goals.

Research about the development of education courses for nurturing digital forensic experts (디지털 포렌식 전문인력 양성 교육과정 개선에 관한 연구)

  • Kim, Jong Min;Choi, Kyong Ho;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.79-85
    • /
    • 2012
  • This research is to improve the education courses for nurturing digital forensic exports. To do so, the education courses for nurturing digital forensic exports were proposed and surveys targeting forensic professionals are conducted. Using AHP method, the most rational and important education courses among aspects (forensic introduction, system forensic, theories and analyses by categories, tool using, and research work) were drawn from results from the above. From this research, it is to improve the education courses for nurturing digital forensic experts applying rational courses with high status.