• Title/Summary/Keyword: 사이버역량

Search Result 109, Processing Time 0.02 seconds

A Study on Development of Evaluation Indicators for the Human Competency and Management In Managed Security Service (MSS) (보안관제 업무의 인적 역량 및 관리에 대한 평가지표 개발 연구)

  • Yang, Sung Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.6
    • /
    • pp.143-152
    • /
    • 2016
  • Currently many central administrative agencies, municipalities and public and private institutions operate Managed security services to cope with cyber security incidents. These entities exert efforts in operating efficiencies rather than introduction of services as they used to. Accordingly, quite a few policies, directions and guidelines have been established for stable operation of Managed security services. Still, Managed security is operated by individuals, whose competencies influence the quality of Managed security services to a great extent. In this respect, the present article examines Managed security technology and methods and describes evaluation methods and examples relevant to human competencies, so as to seek for some potential courses for further development as well as more efficient approaches to human resource management in terms of institutional Managed security services.

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

A Study on the Development of Information Protection Education Contents in the Maritime Using Metaverse (메타버스를 활용한 조선 해양 분야 정보보호 교육 콘텐츠 개발 방안)

  • Kim, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1011-1020
    • /
    • 2021
  • Throughout the years, cybersecurity incidents related to the shipbuilding and maritime industries are occurring more frequently as the IT industry develops. Accordingly, expertise in the information protection industry is necessary, and effective education contents on information protection are needed for this purpose. Recently, there have been more and more cases of increasing user experience by applying Metaverse technology to the educational field. Therefore, this study analyzes the existing information protection education and training and the information protection education contents in the maritime industries and proposes four directions for content development (i.e., online education and seminars, cybersecurity threat learning of virtual ships, accident reproduction, and maritime cybersecurity exhibition operation).

Improving the Efficiency of Cybersecurity Risk Analysis Methods for Nuclear Power Plant Control Systems (원전 제어시스템 사이버보안 위험 분석방법의 효율성 개선)

  • Shin-woo Lee;Jung-hee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.537-552
    • /
    • 2024
  • Domestic nuclear power plants operate under the establishment of the "Information System Security Regulations" in accordance with the Nuclear Safety Act, introducing and implementing a cybersecurity system that encompasses organizational structure as well as technical, operational, and managerial security measures for assets. Despite attempts such as phased approaches and alternative measures for physical protection systems, the reduction in managed items has not been achieved, leading to an increased burden on security capabilities due to limited manpower at the site. In the main text, an analysis is conducted on Type A1 assets performing nuclear safety functions using Maintenance Rules (MR) and EPRI Technical Assessment Methodology (TAM) from both a maintenance perspective and considering device characteristics. Through this analysis, approaches to re-evaluate the impact of cyber intrusions on asset functionality are proposed.

A Study on Industrial Structural Analysis of Senior-Friendly Food Industry (시니어 식품산업의 산업구조에 대한 분석)

  • Na, Sehee;Lee, Min Jung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.405-406
    • /
    • 2019
  • 우리나라의 고령인구 수가 점점 늘어남에 따라 시니어 식품산업에 대한 관심이 높아지고 있다. 고령친화산업에 대한 연구는 "고령친화산업진흥법"이 제정된 2006년 이후 본격화되어 시니어 소비자, 의류, 금융 등 분야에서 연구되고 있으나, 시니어 식품산업에 대한 산업구조분석 연구는 미미한 실정이다. 본 연구에서는 미래 유망 성장 산업으로 기대되는 시니어 식품산업에 대해 마이클포터의 5 forces model을 적용하여 경쟁자를 파악하고, VRIO분석을 통해 내부자원을 분석하여 실질적인 시니어 식품산업의 경쟁력을 제고할 수 있는 전략을 도출하고자 한다. 이는 향후 관련 산업의 경제적 가치와 수요에 영향을 미치는 요인, 기업 내부 역량별 시장성 분석 등을 위한 기초 자료로 활용될 것이다.

  • PDF

Study on Management Strategies of Small and Medium Distribution and Logistics Centers (중소유통물류센터의 경영전략에 대한 연구)

  • Rim, Yong Jae;Lee, Minjung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.331-332
    • /
    • 2021
  • 1990년 중반 이후 외국계 기업과 국내 대기업의 적극적인 유통산업진출은 중소 소매업을 어렵게 하고 있다. 또한 대기업 편의점의 급속한 확장 역시 골목상권 환경을 열악하게 하여, 중소 소매업 점포수의 폐점을 가속화하고 있다. 2003년 중소 소매업의 경쟁력 강화 및 자생력을 확보하고자 정부는 중소유통공동도매물류센터(이하, 중소유통물류센터)를 건립하였다. 하지만 급변하는 유통환경과 온라인 쇼핑의 급속한 발전 속에서 중소유통물류센터는 갈수록 점점 어려워지는 현상에서 중소유통물류센터의 역량강화를 위한 현상분석 및 문제점 도출을 통하여 경쟁력 강화 및 효율적 운영방안을 위한 전략을 제시하고자 한다.

  • PDF

Personalized Cover Letter Creation Service Based on GPT-4 for Job Postings (GPT-4 기반 채용공고별 AI 자기소개서 작성 가이드 개인화 서비스)

  • Ruo Lee;Yoonki Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.430-431
    • /
    • 2023
  • 본 논문에서는 GPT-4 기반의 채용공고별 AI 자소서 작성 가이드 개인화 서비스를 제안한다. 이 서비스는 지원자들에게 시간 절약과 효율적으로 작성된 글을 제공하며, 기업의 요구사항과 지원자의 역량을 최대한 반영한 경쟁력 있는 자기소개서를 작성할 수 있다. 본 연구는 기존의 템플릿 기반 글 작성 서비스의 한계를 극복하고, 인공지능 기반의 GPT-4 를 활용하여 개인화된 글 작성을 가능하게 한다. 시스템 구현을 통해 최적화된 프롬프트를 연구하며, 이 방법론은 자기소개서 외 다양한 분야의 글 작성에도 활용될 수 있다. 이 서비스의 활용으로 지원자들의 경쟁력이 높아지고, 기업들은 더 적합한 인재를 찾는 데 도움을 받을 수 있을 것으로 기대된다.

A Study on the Design of Re-training Courses for Nurturing Cybersecurity Professionals from Other Occupational Groups (타 직업군으로부터의 사이버보안 전문인력으로의 직무전환을 위한 재교육과정 설계 연구)

  • Ji, Juyeon;Park, Sangho;Yu, Harang;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.43-60
    • /
    • 2018
  • Recently, with the arrival of the 4th industrial revolution, the security risks are converging and complexly changing, and the demand of cybersecurity experts is increasing. Therefore, in this paper, it is the largest of the domestic educational institutions, it has the largest number of emissions talent, and selects the representative major field of humanities and society. Then, after analyzing the common curriculum in each major field, compare it with the training course of cybersecurity experts derived through existing previous research. Through analysis results, we try to design a retraining course for cybersecurity professional human resources. Utilizing the results of this research, it is expected that it will be used as the basic material necessary for the subjects of the re-curriculum education. It is also expected to contribute to resolving the supply-demand gap of cybersecurity professionals.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

The 23rd Best Brand & Package Design Awards (제23회 베스트브랜드& 패키지디자인어워즈)

  • (사)한국포장협회
    • The monthly packaging world
    • /
    • s.298
    • /
    • pp.63-67
    • /
    • 2018
  • 국내 최고의 브랜드와 상품 패키지디자인을 선정해 시상하는 '제23회 베스트브랜드&패키지디자인어워즈(The 23rd Best Brand & Package Design Awards)' 시상식이 지난해 12월 27일 서울사이버대학교 차이코프스키홀에서 개최됐다. (사)한국상품문화디자인학회(회장 김윤배)와 한국경제신문사의 공동주최로 진행된 이날 시상식에서는 (사)한국백합생산자중앙연합회의 '백합화장품'이 베스트패키지 종합대상을 수상했다. 베스트브랜드&패키지디자인어워즈는 브랜드와 패키지 디자인에 관한 연구와 학술활동을 지속해온 한국상품문화디자인학회에서 기업들의 상품개발 의욕과 디자인 역량 강화를 위해 1995년부터 수행해온 행사이다. 다음에 '제23회 베스트브랜드&패키지디자인어워즈' 수상작을 살펴보도록 한다.

  • PDF