• Title/Summary/Keyword: 보안역량

Search Result 168, Processing Time 0.022 seconds

An Analysis of Research Trends in Information Security Education (정보보호 교육에 대한 연구 동향 분석)

  • Kim, Kunwoo;Kim, Jungduk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.489-499
    • /
    • 2016
  • Nowadays the importance of information security has been increased because there are many benefits and threats like information leakage caused by rapid growth of information technology. It is important to apply technical solution, however enhancing security capability is more important to respond evolving security threats. Information security education is one of typical way to enhance security capability and there are various efforts at the dimension of nation, company and academic community. However it is required to analyze previous research until now and derive future research direction for long-term development plan. In this study, we analyzed a publication status about 177 papers related to information security, training and awareness from 4 foreign journals and 2 Korean journals. Additionally, we analyzed in detail about 70 papers related to information security education. As a result, the most part of study is about curriculum, and in the future, it is required to expand educational area as well as study about effectiveness measurement of information security education by experimental research.

Design and Verification Standard for Safety and Cybersecurity of Autonomous Cars: ISO/TR 4804 (자율주행자동차의 안전 및 보안을 위한 설계 및 검증 표준: ISO/TR 4804)

  • Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.571-577
    • /
    • 2021
  • This paper describes ISO/TR 4804, an international standard to describe how to design and verify autonomous cars to ensure safety and cybersecurity. Goals of ISO/TR 4804 are (1) positive risk balance and (2) avoidance of unreasonable risk. It also 12 principles of safety and cybersecurity to achieve these goals. In the design procedures, it describes (1) 13 capabilities to achieve these safety and cybersecurity principles, (2) hardware and software elements to achieve these capabilities, and (3) a generic logical architecture to combine these elements. In the verification procedures, it describes (1) 5 challenges to ensure safety and cybersecurity, (2) test goals, platforms, and solutions to achieve these challenges, (3) simulation and field operation methods, and (4) verification methods for hardware and software elements. Especially, it regards deep neural network as a software component and it describe design and verification methods of autonomous cars.

Proposals for GCI Indicators to Improve a National Cybersecurity Level (국가 사이버보안 수준 향상을 위한 GCI의 지표개선 방안)

  • Kim, Dae kyung;Lee, Ju hyeon;Kim, Ye young;Hyeon, Da eun;Oh, Heung-Ryong;Chin, Byoung moon;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.289-307
    • /
    • 2022
  • The Global Cybersecurity Index (GCI) developed by the International Telecommunication Union (ITU) is used to diagnose a country's cybersecurity development level and to strengthen its cybersecurity capabilities. This paper analyzes GCI and tries to suggest a way to strengthen its effectiveness. In addition, we analyze the GCI version 1~GCI version 4 evaluation index in advance, and examine the development plan through SWOT analysis. Through this, basic principles for GCI improvement and utilization will be established, and new indicators related to the GCI version 5 questionnaire will be discovered and suggested. This paper is expected to be used as basic data for GCI performance analysis and improvement plan. In addition, it is intended to contribute to enhance the effectiveness of GCI and the nation's cybersecurity capabilities by proposing more advanced proactive and reactive indicators to be applied to the future GCI evaluations. This paper is an improvement and development for the research result of [1].

Perceptions of Information Technology Competencies among Gifted and Non-gifted High School Students (영재와 평재 고등학생의 IT 역량에 대한 인식)

  • Shin, Min;Ahn, Doehee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.2
    • /
    • pp.339-358
    • /
    • 2015
  • This study was to examine perceptions of information technology(IT) competencies among gifted and non-gifted students(i.e., information science high school students and technical high school students). Of the 370 high school students surveyed from 3 high schools(i.e., gifted academy, information science high school, and technical high school) in three metropolitan cities, Korea, 351 students completed and returned the questionnaires yielding a total response rate of 94.86%. High school students recognized the IT professional competence as being most important when recruiting IT employees. And they considered that practice-oriented education was the most importantly needed to improve their IT skills. In addition, the most important sub-factors of IT core competencies among gifted academy students and information science high school students were basic software skills. Also Technical high school students responded that the main network and security capabilities were the most importantly needed to do so. Finally, the most appropriate training courses for enhancing IT competencies were recognized differently among gifted and non-gifted students. Gifted academy students responded that the 'algorithm' was the mostly needed for enhancing IT competencies, whereas information science high school students responded that 'data structures' and 'computer architecture' were mostly needed to do. For technical high school students, they responded that a 'programming language' course was the most needed to do so. Results are discussed in relations to IT corporate and school settings.

A study on the Development of Personnel Security Management for Protection against Insider threat (내부 정보보호를 위한 인원보안 관리 방안 연구)

  • Cha, In-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.210-220
    • /
    • 2008
  • Insider threat is becoming a very serious issue in most organizations and management is responsible for security implementation. This study is to develop a personnel security management indicators in the areas of Personnel Assurance, Personnel Competence, and Security Environment and protection against insider threats. In this study, the information security management system and related papers are examined by reviewing the existing researches and cases. Proposed indicators are verified by pilot test, empirically analyzed to expose experts' perception and the validity, importance, and risk level of each indicators through a questionnaire. Result were encouraging, but additional study focused on personnel security management using factor analysis is needed in the future.

  • PDF

A Study on Development of the Digital Competence Measurement Tool for University Student

  • Kim, Dong-Man;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.191-199
    • /
    • 2019
  • In this paper, we propose to develop a diagnosis tool for measuring digital competence for university student. To this end, 223 students participated for the survey research. Based on the survey by 6 domain and 40 questions, 6 factors and 18 questions for digital competence measurement were drawn throughout the factors analysis. The results of the confirmatory factor analysis showed the fact that 6 factors and 18 questions that satisfied the model-fit indexes statistically were finally confirmed. And the developed tool demonstrated good results in reliability and validity verification, which were suitable for measuring digital competence for university students. The developed measurement tool of digital competence for university students consisted of 6 sub-components such digital device operation, communication and collaboration, information searching, processing, and management, problem solving and learning, security, digital ethics. The digital competence measuring tool developed in this study is expected to be used to identify the current level of competences for university student, and to enhance their own digital competences through educational supports.

A Scheme of Training the MND Information Security Manpower (국방 정보보호 인력 양성 방안)

  • 박상서;최운호
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.69-81
    • /
    • 2001
  • As soon as possible, our military have to trainning the information security manpower for Cyber Warfare, it should be block the foreign infowarrior to go by way of other country from our system. An emergency, we can protect our military information system and this thesis provide checkpoint about how we consider about trainning the infowarrior for future war.

  • PDF

An Empirical Research on Human Factor Management Indicators for Information Security (정보보호를 위한 인적자산 관리지표 실증 연구)

  • Cha, In-Hwan;Kim, Jung-Duk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.153-160
    • /
    • 2009
  • This study is to develop a human resource (HR) security framework, and related HR security indicators in the context of information security. The HR security framework consists of three constructs, personnel assurance, personnel competence, and personnel security control. Based on the framework, HR security management indicators are derived as 26 indicators in 9 items out of 3 categories. An empirical research has been performed to verify the relevance and consistency between the indicators by conducting a questionnaire-based survey. Also, interrelationships between the proposed indicators and HR related security level were analyzed by the multiple regression analysis. As a result, the proposed hypothesis were mostly accepted, showing the significant relationships between the indicators and security level.

A Exploratory Study on R&D Strategies Industrial Technology Security (산업기술 보호를 위한 기술적 보안의 탐색적 연구)

  • Kim, Kyung-Kyu;Choi, Seo Yun;Hur, Sunghye
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.120-125
    • /
    • 2009
  • To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analysed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial security technology development program in a aspect of government and analysed the current status of the technical security technology for developing security technology and increasing leaks of the advanced industrial technology.

  • PDF

A Study on National Cyber Capability Assessment Methodology (국가 사이버 역량 평가 방법론 연구)

  • Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1039-1055
    • /
    • 2012
  • It is required for us to enhance the national cyber capability as the worldwide countries have been doing effort to strengthen their cyber capabilities. However, we are encountering the difficulty in estimating national cyber capability due to the absence of any cyber capability assessment methodology. This paper presents the national cyber capability assessment methodology which is used for settle up national cyber policy. We also introduce the result of five major nations(US, China, Japan, Russia, Korea)' cyber capability assessment using the proposed methodology. The methodology is developed using open data and includes three areas; base capability, attack capability and defense capability. The assessment result shows the in the order of US, China, Korea, Russia, Japan. As the analysis of that result, in order to enhance the our cyber capability, we recommend that first, cyber budget and human resources for the base capability should be more invested, second, the strategy for attack capability enhancement is strongly required and lastly, the patch ratio and security monitoring level should be upgraded.