• Title/Summary/Keyword: 보안역량

Search Result 168, Processing Time 0.024 seconds

An Analysis of Employment Mindset According to Academic Achievement of IT Major Students (IT 전공 학생들의 학업성취도에 따른 취업 마인드 분석)

  • You Jung Ahn;Kyong Ah Kim;Ji Sim Kim;Suk Oh;Myung Sook Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.419-421
    • /
    • 2023
  • 팬데믹 이후 많은 업무가 원격으로 전환되었고 4차 산업의 대두로 그 근간이 되는 IT분야의 인력 수요가 해마다 가파르게 증가하면서 IT분야 취업에 청신호가 켜지고 있다. 그러나 질 높은 취업을 위해서는 체계적인 취업 지원 체계를 통해 역량을 갖추어 남다른 취업 경쟁력을 갖추어야 한다. 본 연구는 대학에 체계적인 취업 지원 체계를 갖추기 위한 목적으로, 우선 학생들이 현재 처한 상황과 그에 따른 니즈를 파악해보고자 취업에 대한 학생들의 마인드를 파악할 수 있는 설문을 실시하였고 설문 결과를 학생들의 학업성취도에 따라 분석해보았다. 이 연구 결과는 향후 IT 전공 학생들의 취업 역량을 강화하는, 효과적인 지원 프로그램을 대학에 마련하는데 기초가 될 것으로 기대된다.

  • PDF

Utilization of VR Immersive Content for Self-Directed Learning (VR 실감형 콘텐츠를 활용한 학생주도학습 활용사례)

  • Young-bok Cho
    • Journal of Practical Engineering Education
    • /
    • v.15 no.2
    • /
    • pp.373-379
    • /
    • 2023
  • With the 4th Industrial Revolution, VR/AR technology is developing, and since COVID-19, the use of VR/AR technology is increasing and is being used in various environments. In particular, AR technology can be used in various educational fields and the perception of VR in the educational field and learning satisfaction, problem-solving ability, and self-directed learning ability when using VR were analyzed. It was analyzed that perception of VR and learning satisfaction had a significant correlation at the significance level of 0.001, and problem-solving competency had a significant correlation between learning satisfaction and self-directed learning ability at the significance level of 0.05.

Relation of Empowerment and Organization Attachment with the Organization Culture of Security Organization (시큐리티조직의 조직문화와 임파워먼트 및 조직애착도의 관계)

  • Kim, Chan Sun
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.33-41
    • /
    • 2014
  • The purpose of this study is to establish the relationship of empowerment and organization attachment with the organization culture of security organization. This study is based by setting the security organization employed in security firms in the capital area(Seoul) in 2012 as the parent population and using the purposive sampling method to analyze a total amount of 280 examples. The frequency analysis, analysis on primary factors, reliability analysis, multiple regression analysis, path analysis methods using SPSSWIN 18.0 were used in analysis. The reliability of the survey showed a Cronbach's ${\alpha}$ value of over 0.690. The results are like the following. First, the organization culture of security organization affect empowerment. Thus, the more a practical development culture is settled, the more the capability of self-determinism, meaningfulness, and effect is amplified. Moreover, the more a consensual culture is established, the more the capability of self-determinism is enhanced, and the more a hierarchical culture is established, the more the meaningfulness is enhanced. Second, the organization culture of security organization affect organization attachment. Thus, the continuous normative attachment is enhanced when a more hierarchical culture is established. Moreover, emotional attachment is enhanced when a more practical development culture is established. Third, the empowerment of security organization affects organization attachment. Thus, the continuous normative attachment is decreased when one's capability of self-determinism is more lacking. However, the continuous normative attachment is higher when the meaningfulness and effect is enhanced. Moreover, emotional attachment is enhanced when meaningfulness is increased. Fourth, the organization culture of security organization directly/indirectly affects empowerment and organization attachment. Thus, empowerment is an important mediating factor between organization culture and organization attachment.

Development of Educational Model for ICT-based Convergence Expert (ICT 기반의 융합전문가 양성을 위한 교육모형 개발)

  • Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.75-80
    • /
    • 2015
  • To train convergence experts ICT infrastructure must be learned IoT use capabilities of things. In this paper, targeted to students that are majoring in computer science, and for the design of the curriculum and the educational model that handles education of operation in general for training IoT-related education for five months to experts of convergence training describe the contents. Course is the basic ability of the process, core competence course, is divided into real-life capability process and on-site training course, was constructed in a total of 10 stages of the process details. Curriculum, it was designed to learn sensing technology, network technology, security, and content production technology. This educational model is utilized for job creation human resource training project of 2015 Ministry of Employment and Labor, it demonstrated the utility to contribute in order to achieve a high completion and the employment rate. Applicable to future university education plans to expand the curriculum, including courses that complement the Java.

A study on the appropriateness of utilizing retired persons to military education and training sector (군사 교육훈련분야의 예비역 활용 적정성에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.14 no.3_1
    • /
    • pp.27-34
    • /
    • 2014
  • This study is changing day by day in Korea, which reinforce the security environment and other advanced weapon systems and operate to secure it in excellent staff Reserves are being utilized in each group for the service pipe work required to determine the appropriateness of the Job Title, Retired military expertise and experience in utilizing the scarce human resources contribute to the improvement of the reinforcement of Power, Reserves required by each group's employment services and the need to normalize operations and annual operating plan objectives for determining the adequacy of the data to provide you with. In particular, the group has a direct impact on attack power can be trained to perform combat missions need to empower bag in bag research focuses on methods to improve and complement suggested.

On the Study of National Security and Corresponding Strategies gainst Inside Enemies - A Case Study of German Unification Process - (국가안보와 내부의 적 대응방안 연구 -독일 통일과정 사례를 중심으로-)

  • Kim, Gyu Nam
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.11-18
    • /
    • 2013
  • What is national security? National security is reduced for state national security. At present, national security threats can be divided into main enemies and potential ones and main enemies are separated inside and external ones. Arnold Toynbee said, "The destruction of the state is starting not from outside but from inside". This means we must be aware of inside enemies. How much do we know of the internal enemies who are trying to divide the people and overthrow the state? This paper focuses on corresponding strategies to depend our democratic state against inside enemies who penetrate all sectors of society and fabricate rumors, incite violence, and even try to overthrow our legitimate state with the base on the lessons of past West Germany case.

Proposal of University-Community associated with MNU Coin Using Blockchain Technology (블록체인을 활용한 대학-지역 연계 코인 제안)

  • Minwook Oh;Gyeongseok Oh;Yungang Kim;Wontae Jung;Kyungroul Lee
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.271-272
    • /
    • 2023
  • 목포대학교 교내 장학금 제도인 MNU핵심역량포인트의 문제점을 설문을 통하여 확인한 결과, 취득조건, 공지 가시성 부족, 20대의 행사참여율 저조, 실용성의 부족과 같은 총 4가지 문제점을 분석하였다. 이러한 문제점은 사용자 친화적인 UI 제공 및 무결성과 보안성 제공을 통하여 해결할 수 있으며, 본 논문에서는 무결성과 보안성을 제공하기 위하여 블록체인을 사용하였다. 대학생들의 지역방문을 활성화하기 위하여, 지역의 특정한 장소를 대상으로 미션을 수행하는 기능을 제안하였으며, React-Native와 연동하여 객체 인식하기 위하여, YOLO와 OpenCV를 활용함으로써 미션 수행 결과를 확인한다. 제안하는 방안 및 미션 기능을 통하여, 대학생들의 지역행사 및 교내 행사 참여율이 높아질 것으로 기대되며, 전국 대학교의 장학금제도가 발전할 것으로 사료된다.

Research on Cyber Kill Chain Models for Offensive Cyber Operations (공세적 사이버 작전을 위한 사이버 킬체인 모델 연구)

  • Seong Bae Jo;Wan Ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.71-80
    • /
    • 2023
  • Cyberspace has emerged as the fifth domain of warfare, alongside land, sea, air, and space. It has become a crucial focus for offensive and defensive military operations. Governments worldwide have demonstrated their intent to engage in offensive cyber operations within this domain. This paper proposes an innovative offensive cyber kill chain model that integrates the existing defensive strategy, the cyber kill chain model, with the joint air tasking order (ATO) mission execution cycle and joint target processing procedure. By combining physical and cyber operations within a joint framework, this model aims to enhance national cyber operations capabilities at a strategic level. The integration of these elements seeks to address the evolving challenges in cyberspace and contribute to more effective jointness in conducting cyber operations.

A Study on establishing the Role of Intelligence Agency on Cybersecurity - Focusing on Revision or Enactment of Cybersecurity related Bill - (정보기관의 사이버안보 역할 정립에 관한 연구 -사이버안보관련 법안 제·개정안을 중심으로-)

  • Yoon, Oh Jun;Kim, So Jeong;Jeong, Jun Hyeon
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.45-52
    • /
    • 2018
  • As the era of the 4th Industrial Revolution has progressed and the information and communication technologies have developed dramatically, the cyber threats will gradually become more intelligent and sophisticated. Therefore, in order to take systematic and prompt action in case of an accident while preparing measures against the threat, the role of intelligence agency is important. However, Korea is having difficulty in responding to the threats due to the lack of support for the national cybersecurity bill or the amendment bill of the National Intelligence Service. In this paper, I examine the cybersecurity function of the intelligence agency, the recent debate trends, and implications for the role of intelligence agency in our current situation. And then I intend to suggest some measures such as concentration on information gathering and analysis, enhancement of cyber threat prediction and response capacity, and strengthening of legal basis as a way to establish the role of intelligence agency for reinforcement of cybersecurity performance system.

  • PDF

A Study on the Derivation of SME-based Evaluation Items in ISMS-P Authentication Systems (정보보호 및 개인정보보호 관리체계(ISMS-P) 인증 제도에서 중소기업 기반 평가항목 도출에 관한 연구)

  • Park, Hyuk Gyu;Kang, Wan Seok;Shin, Kwang Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.578-579
    • /
    • 2021
  • According to a survey on the infringement of SMEs, the level of technology protection capability is improving every year, but technology leaks and damage continue to occur. This shows that there is a need for a security management and supervision system that can strengthen the security awareness of SME executives and employees and maintain the security level continuously. The Personal Information & Information Security Management System(ISMS-P) authentication systems is the latest related standard, which has the problem of applying the same certification criteria without considering the types of certification target organizations such as ISPs, IDC, hospitals and schools, and SMEs.. In this paper, 73 evaluation items that can be specialized and applied to SMEs were derived by referring to ISMS-P certification and Personal Information Protection Management System (PIMS) certification. The results of the study show that the number of evaluation items decreased by 28.4% compared to the existing ISMS-P certification.

  • PDF