• Title/Summary/Keyword: 사이버 역량

Search Result 112, Processing Time 0.023 seconds

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

The 23rd Best Brand & Package Design Awards (제23회 베스트브랜드& 패키지디자인어워즈)

  • (사)한국포장협회
    • The monthly packaging world
    • /
    • s.298
    • /
    • pp.63-67
    • /
    • 2018
  • 국내 최고의 브랜드와 상품 패키지디자인을 선정해 시상하는 '제23회 베스트브랜드&패키지디자인어워즈(The 23rd Best Brand & Package Design Awards)' 시상식이 지난해 12월 27일 서울사이버대학교 차이코프스키홀에서 개최됐다. (사)한국상품문화디자인학회(회장 김윤배)와 한국경제신문사의 공동주최로 진행된 이날 시상식에서는 (사)한국백합생산자중앙연합회의 '백합화장품'이 베스트패키지 종합대상을 수상했다. 베스트브랜드&패키지디자인어워즈는 브랜드와 패키지 디자인에 관한 연구와 학술활동을 지속해온 한국상품문화디자인학회에서 기업들의 상품개발 의욕과 디자인 역량 강화를 위해 1995년부터 수행해온 행사이다. 다음에 '제23회 베스트브랜드&패키지디자인어워즈' 수상작을 살펴보도록 한다.

  • PDF

The 24th Best Brand & Package Design Awards (제24회 베스트브랜드&패키지디자인어워즈)

  • (사)한국포장협회
    • The monthly packaging world
    • /
    • s.310
    • /
    • pp.71-75
    • /
    • 2019
  • 국내 최고의 브랜드와 상품 패키지디자인을 선정해 시상하는 '제24회 베스트브랜드 & 패키지디자인어워즈(The 24th Best Brand & Package Design Awards)' 시상식이 지난해 12월21일 서울사이버대학교에서 개최됐다. (사)한국상품문화디자인학회(회장 김윤배)와 한국경제신문사의 공동주최로 진행된 이날 시상식에서는 교과서부터 스마트러닝까지 교육의 미래를 선도하고자 하는 천재교육의 우등생(해법시리즈)이 베스트브랜드&패키지 종합대상을 수상했다. 베스트브랜드&패키지디자인어워즈는 브랜드와 패키지 디자인에 관한 연구와 학술활동을 지속해온 한국상품문화디자인학회에서 기업들의 상품개발 의욕과 디자인 역량 강화를 위해 1995년부터 수행해온 행사이다. 다음에 '제24회 베스트브랜드&패키지디자인어워즈' 수상작을 살펴보도록 한다.

  • PDF

BlockChain Technology Core Principle Education of Elementary School Student Using Gamification (게이미피케이션을 활용한 초등학생 블록체인기술 핵심원리 교육 탐구)

  • Kim, Jinsu;Park, Namje
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.2
    • /
    • pp.141-148
    • /
    • 2019
  • We proposed a curriculum that can learn the principle of blockchain by using the gamification which can bring up the interest and concentration of the students by connecting the contents of the class with the game. The proposed method is to educate the blockchain in a game format and to solve the problem that can be easily accessed in everyday life by applying the blockchain. By strengthening the thinking ability of computing, By growing information processing capacity, communication capacity, and community capacity, students can naturally enhance their education capacity. It is expected that the blockchain curriculum using the proposed gamification can be used to improve the information curriculum.

The Effect of Business and Digital Capabilities of Small Businesses on Business Satisfaction : The Moderating Effect of Personal Media Education Performance (소상공인의 사업역량과 디지털역량이 사업만족도에 미치는 영향 : 1인 미디어 교육성과의 조절효과)

  • Park, Jung-ok;Ha, Kyu-soo
    • Journal of Venture Innovation
    • /
    • v.5 no.4
    • /
    • pp.75-90
    • /
    • 2022
  • This study was conducted to empirically analyze the relationship between business and digital capabilities of small businesses on business satisfaction. To this end, business capabilities were subdivided into industry expertise and customer management expertise. Digital capabilities were subdivided into SNS activity, ease of ICT usability, and business utilization of ICT. At the same time, we examined how the moderating effect of performance of personal media education. A survey was conducted to empirically analyze this, and 200 sample who received personal media education were analyzed. SPSS 24.0 and Macro Process 4.0 were used for statistical analysis. As a result of the empirical analysis of this study, industry expertise, customer management expertise, SNS activity, and business utilization of ICT, all had a positive (+) significant effect on business satisfaction. On the other hand, the significant influence relationship on the ease of ICT usability was not tested. Industry expertise and business utilization of ICT were found to be variables that had a great influence. It was analyzed that personal media education performance plays a moderating role between SNS activity, business utilization of ICT and business satisfaction. The results of this study are meaningful in that they empirically analyze that these capabilities affect business satisfaction even for small businesses at a time when the importance of digital capabilities increases.

The Effectiveness of Information Protection and Improvement Plan Based on SMEs Consulting Case

  • Kim, Jae-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.201-208
    • /
    • 2019
  • In the phono-sapiens era of the intelligence information society, most business activities are increasingly dependent on networks and information systems. SMEs, which occupy the majority of Korean companies, are increasingly possessing the value and technology of their information assets, and their ability to protect core technologies that are the driving force of corporate growth will be the most important competitiveness of enterprises. Accordingly, the Ministry of Science and ICT and the Korea Internet & Security Agency(KISA) provides a foundation for minimizing the damage from cyber threats such as hacking and information leakage by evaluating the current information protection level of SMEs and enhancing information protection capability by supporting a high level of customized information protection consulting. In this study, we analyze the effectiveness of information protection based on the results of KISA SMEs consulting. In addition, by identifying problems and limitations derived from SMEs information protection consulting results, SMEs should propose measures to improve information security of SMEs that can manage information protection management system more efficiently and effectively.

A Study on Improvements of the Information Security Department via the Curriculum Analysis (국내 정보보호학과의 교육과정 분석을 통한 개선방안 연구)

  • Lim, Wongyu;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.71-80
    • /
    • 2014
  • Accidents for information disclosure occurred in a steady increase, so many information security department has been established recently. But there was a lack of differentiation between department of IT department and they cannot train appropriate students for companies. This research examined the Workforce framework and competencies, the related research for improving information security curriculum. And then this research analyzed status and characteristics of the curriculum to the information security department, based on the Workforce framework and competencies presented by NICE. The result of the research confirmed that the current curriculum mainly consists of courses dealing with development of products that secure information, so the curriculum is needed to improve by focusing on workforce framework competencies. The result will be utilized as fundamental research for improving the curriculum of information security major in the future.

  • PDF

A study on the integrative feedback modeling to develop pre-service teachers' competence of planning STEAM lessons (예비교사의 융합적 수업구성 역량 향상을 위한 통합적 피드백의 모델링)

  • Hong, Ye-Yoon;Im, Yeon-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.75-88
    • /
    • 2021
  • Along with the advent of the Fourth Industrial Revolution, fostering young talents with convergent mind is getting important. Moreover pre-service teachers' ability to design proper convergent classes can be a meaningful issue for high quality future education. This study proposes the role of professors' exquisite feedback is so significant for developing their competence in STEAM education, It analyzed how various theories regarding feedback support them to enhance convergent knowledge with e-learning. They participated in the 5 step group and individual activities for creating STEAM lesson plan and received suitable feedback. Lastly a survey was performed. The researchers did modeling how integrative feedback was applied to the procedure step by step according to the 'Ladder of Inference' theory. This strategic model contributed to elevating the participants' convergent knowledge, competence, achievement and satisfaction.

A Study on the Concept of Digital Environmental Rights and Reinforcement of Information Subject (디지털 환경권 개념 정립과 정보교과 교육 강화에 대한 연구)

  • Yoo, Jiyeon
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.2
    • /
    • pp.189-199
    • /
    • 2020
  • This study aims to emphasize the necessity of strengthening the information subject through the introduction of a new concept of rights called 'digital environmental rights' and proposes an improvement in the educational composition model of the information culture section in the information subject. Through the introduction of the concept of digital environmental rights, we intend to provide a logical basis for making the information subject a required subject. In addition, we intend to enhance the competencies required for living in a digital environment by improving the structure of the information culture section in the information subject. As a study on this, the logic of the concept of rights required in the digital environment is analyzed and the concept of digital environmental rights applied to it is established. Furthermore, by analyzing relevant curricula in major countries, including the United States, Australia, and Japan, which provide the main basis for digital environmental rights, an improvement plan for the educational composition in the information and culture education sector is formulated. The results of the study are as follows: First, digital environment rights are 'rights to enjoy a pleasant and safe digital environment'. Second, the components of digital environmental rights include rights for the environment (cyberethics), rights of the environment (cybersafety), and rights about the environment (cybersecurity). Third, in the major countries studied various educational structures are being implemented with regard to information-related education contents on the digital citizenship, code ethics, and new technology security.

Difficulties that Female North Korean Defector Cyber University Students Experienced in their Social Work Field Practicum and Support Plan (여성 북한이탈주민 사이버대학생이 경험한 사회복지실습의 어려움과 지원방안)

  • Bae, Jin-Hyung;Park, Mee-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.60-74
    • /
    • 2016
  • There are increasing numbers of North Korean defectors. Many of them enter universities and major in social welfare in order to get jobs. As a required course, they must participate in field practicum and many difficulties are expected. This study aims to examine the North Korean defectors' practicum experience in specific, and to support more effectively in the field work education. To achieve this purpose, female North Korean defectors who go to G cyber university and have finished their field practicums, were interviewed in an in-depth interview. The data were analyzed with the open coding through the constant comparison method as Grounded theory's initial analysis. As the result, the following was found: 49 concepts, 18 sub-categories, and 7 categories. The categories include difficulties in the process of preparation for and beginning with various obstacles; confusion due to the differences between the North Korean and South Korean culture; tasks and functions that were not expected, personal relationships which were burdensome to them; feeling a lack of professional competence; inevitable environmental circumstances, and personal problems. Based on the results, suggestions for better support in field practice education in the side of universities, community agencies, individual students and the general society were addressed.