• 제목/요약/키워드: Cyber programs

검색결과 161건 처리시간 0.027초

충청남도 정예공무원의 사이버교육 인식과 발전방안 (The Recognition of Cyber Education and Development Plan of Chungcheongnam-do Civil Servants)

  • 송승훈;김의정
    • 한국정보통신학회논문지
    • /
    • 제21권11호
    • /
    • pp.2184-2190
    • /
    • 2017
  • 지식정보화시대를 맞이하여 사이버교육을 활용한 다양한 교육 프로그램은 학교, 기업교육, 군 장병교육, 평생교육시설은 물론 공무원 교육훈련제도까지 도입이 되었다. 국가공무원의 경우 국가공무원인재개발원 사이버교육센터의 주관으로 실시되는 교육과 지방공무원은 15개 시 도 공무원교육원 주관으로 이루어지고 있다. 2008년 공무원 상시학습제도의 도입으로 연간 일정시간 이상 교육 훈련받는 것을 의무화하였고 사이버교육이 공무원교육훈련에 활성화를 이루었다. 본 연구에서는 공무원 교육훈련제도의 관점에서 사이버교육 운영의 인식을 사이버 교육 참여했던 충청남도 정예공무원 교육생을 대상으로 한 분석결과를 바탕으로 사이버교육의 발전방안을 제언하고자 한다.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

지능형 사이버 훈련장의 기술 동향 (Technological Trends in Intelligent Cyber Range)

  • 유재학;구기종;김익균;문대성
    • 전자통신동향분석
    • /
    • 제37권4호
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권6호
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

대학생의 이성교제에 관한 사이버 상담 사례 연구 (A Case Study on Cyber Counseling for University Students' Date)

  • 김진희
    • 가정과삶의질연구
    • /
    • 제23권3호
    • /
    • pp.137-151
    • /
    • 2005
  • This study was designed to analyze the cyber counseling cases on the university students' date in order to identify the problems they encounter in dating and seek for a direction for education and consulting program to help them solve the problems. A total of 253 cases in cyber counseling about date were analyzed. The findings demonstrated that the university students were short of interpersonal relationship still needed for expressing Intimacy and maintaining the relationship, and poorly coping with the negative emotions such as conflict, anxiety, and boredom. Thus, a variety of human relations training programs needs to be established in the universities to help the students stay in good terms with the counterpart. Plus, cyber counseling and e-mail counseling needs to be activated so as to allow the university students to easily access when they come to face a problem in dating.

코로나19 관련 사이버 공격 및 대응현황 분석 (An Analysis of Cyber Attacks and Response Cases Related to COVID-19)

  • 이용필;이동근
    • 한국IT서비스학회지
    • /
    • 제20권5호
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

패션 사이버 교육(敎育)을 위한 아바타 제작(製作)및 활용(活用) - 체형(體型)에 따른 디자인요소(要素)의 착시효과(錯視效果)를 중심(中心)으로 - (Avatar Application for Fashion Cyber Education - Focused on Optical Illusion of Design Elements according to Body Shapes -)

  • 임현정;박혜원
    • 패션비즈니스
    • /
    • 제9권4호
    • /
    • pp.1-15
    • /
    • 2005
  • Interesting education which utilizes cyber visual and audio multimedia effects, we regard it as a very effective education but those programs are not prepared yet. So, the purpose of this research is to provide a new direction for cyber fashion education with the use of avatars as the multimedia factor to increase student's interest and understanding. First, we investigated the present situation of fashion cyber education and the present avatar usage situation online, and also we searched literature and the internet to investigate the general theory of design. Second, we used Adobe photoshop 7.0 to make avatars, then, we used Macromedia Flash MX to design the avatar on our web site, and to make it look more realistic. According to the research results, cyber fashion education is usually used as marketing in certain areas, and for middle school, and high school students it is mainly used as text and lecture videos. When searching for fashion sites that use avatars, we found that most fashion shopping malls use them. Because avatars can give visual effects and also increase interest and fun, they can increase concentration and understanding and can be effective in fashion cyber education.

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • 제55권6호
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

사이버 뮤지엄의 형식과 구성에 관한 고찰 -자연사 박물관 분야에 대한 해외사례를 중심으로- (A Study on the Formations and Compositions of the Cyber Museum -Focusing on the case of oversea natural history museum-)

  • 임경부;임채진
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 1999년도 춘계학술발표대회 논문집
    • /
    • pp.7-10
    • /
    • 1999
  • The organization of modern society is suddenly changing from the modern society to the ultra modern informationalized society. Various social members must satisfy cultural and artistic desires to serve museum concept and function to move the informationalized society. A lot of natural history museum in the world build cyber space exhibition lines. Audiences do not directly visit but they view but they view the exhibit, get an education, participate in the cultrue programs and earn the museum's informations. Especially, in the case of national and public museums in Korea, they do not concerned the museum architecture before processing the character and collections of the museum. Cyber museums determine museum character, policy, information, collections converge of opinion voluntary collection and grasp of location, because cyber museum can be finished be4fore the work of the future museum.

  • PDF

The Current State of Cyber-Readiness of Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.256-274
    • /
    • 2022
  • The continuous information technology and telecommunication (ICT) developments inspire several Saudi Arabia citizens to transact and interact online. However, when using online platforms, several people are likely to lose their personal information to cybercriminals. In the survey, 553 Saudi Arabia citizens and 103 information technology (IT) specialists confirm the expansion of digital economy and the need for smart cities with various services, including e-commerce and solid cyber security. 96.6% of the participants believe Saudi Arabia is digitalizing its economy; yet, 33.3% of the participants believe that residents are uninformed about living and operating in smart cities. Several people (47.29%) with medium internet speed are more aware about smart cities than those with fastest internet speed (34%). Besides, online transactions via credit cards subjected 55.5% of the participants to privacy and security issues. These findings validate the essence of cyber security awareness programs among Saudi Arabia citizens and IT professionals to boost public trust and acceptance of cybersecurity frameworks.