• Title/Summary/Keyword: Cyber training

Search Result 226, Processing Time 0.025 seconds

Development of a Cybersecurity Workforce Management System (사이버 보안 분야 전문가 프로파일 관리 시스템 연구)

  • Ahn, Jun-young;Lee, Seung-hun;Park, Hee-min;Kim, Hyun-chul
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • According to the trend of increasingly sophisticated cyber threats, the need for technology research that can be applied to cyber security personnel management and training systems is constantly being raised not only overseas but also in Korea. Previously, the US and UK have already recognized the need and have been steadily conducting related research from the past. In the United States, by encouraging applications based on related research (NICE Cybersecurity Workforce Framework) and disclosing successful use cases to the outside, it is laying the groundwork for profiling cyber security experts. However in Korea, research on cyber security expert training and profiling is insufficient compared to other countries. Therefore, in this study, in order to create a system suitable for the domestic situation, research and analysis of cases in the United States and the United Kingdom were conducted over the past few years, and based on this, a prototype was produced for the study of profiling technology for domestic cyber security experts.

Design and Implementation of Web-Based Cyber Training System (웹기반 가상연수 시스템 설계 및 구현)

  • Lee, Yong-Hoon;Han, Pan-Am
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2920-2929
    • /
    • 2000
  • In this paper, a cyber training institute system suitable for teachers' training is designed and implemented, and it is applied to and evaluated on the actual spot. While general purpose cyber education systems have too much unnecessary functions and are inconvenient to operate, this system removes the unnecessary functions and has only useful functions. This system is much concerned with the interaction among learners, instructors, administrators and contents. This system is characterized by having menu items such as Searching Learners, Taking Attendance, Information for Learners, Assignment Hand out, Group Debate, Cyber Cafe and Access Statistic to promote the interaction. The result of the application of this system to 554 teachers for two years is that the ratio of completion was 95%.

  • PDF

A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations (국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구)

  • Kim, Minsu;Park, Ki Tae;Kim, Jongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.197-208
    • /
    • 2020
  • Based on the network infrastructure advanced in the information knowledge society, the structure of computer net work is operated by establishing the composition of network in various forms that have secured the security. In case of computer network of national/public organizations, it is necessary to establish the technical and managerial securit y environment even considering the characteristics of each organization and connected organizations. For this, the im portance of basic researches for cyber training by analyzing the technical/managerial vulnerability and cyber threats based on the classification and map of cyber threats according to the characteristics of each organization is rising. T hus, this study aims to analyze each type of external/internal cyber threats to computer network of national/public o rganizations established based on the dualistic infrastructure network of internet and national information network, a nd also to present the cyber threat framework for drawing the elements of cyber security training, by drawing and analyzing the actual elements of cyber threats through the case-based scenario.

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

An Ensemble Approach for Cyber Bullying Text messages and Images

  • Zarapala Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.59-66
    • /
    • 2023
  • Text mining (TM) is most widely used to find patterns from various text documents. Cyber-bullying is the term that is used to abuse a person online or offline platform. Nowadays cyber-bullying becomes more dangerous to people who are using social networking sites (SNS). Cyber-bullying is of many types such as text messaging, morphed images, morphed videos, etc. It is a very difficult task to prevent this type of abuse of the person in online SNS. Finding accurate text mining patterns gives better results in detecting cyber-bullying on any platform. Cyber-bullying is developed with the online SNS to send defamatory statements or orally bully other persons or by using the online platform to abuse in front of SNS users. Deep Learning (DL) is one of the significant domains which are used to extract and learn the quality features dynamically from the low-level text inclusions. In this scenario, Convolutional neural networks (CNN) are used for training the text data, images, and videos. CNN is a very powerful approach to training on these types of data and achieved better text classification. In this paper, an Ensemble model is introduced with the integration of Term Frequency (TF)-Inverse document frequency (IDF) and Deep Neural Network (DNN) with advanced feature-extracting techniques to classify the bullying text, images, and videos. The proposed approach also focused on reducing the training time and memory usage which helps the classification improvement.

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

Participant Characteristic and Educational Effects for Cyber Agricultural Technology Training Courses (사이버농업기술교육 참가자의 특성과 교육효과)

  • Kang, Dae-Koo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.1
    • /
    • pp.35-82
    • /
    • 2014
  • It was main objectives to find the learners characteristics and educational effects of cyber agricultural technology courses in RDA. For the research, it was followed by literature reviews and internet based survey methods. In internet based survey, two staged stratified sampling method was adopted from cyber training members database in RDA along with some key word as open course or certificate course, and enrollment years. Instrument was composed through literature reviews about cyber education effects and educational effect factors. And learner characteristics items were added in survey documents. It was sent to sampled persons by e-mail and 316 data was returned via google survey systems. Through the data cleaning, 303 data were analysed by chi-square, t-test and F-test. It's significance level was .05. The results of the research were as followed; First, the respondent was composed of mainly man(77.9%), and monthly income group was mainly 2,000,000 or 3,000,000 won(24%), bachelor degree(48%), fifty or forty age group was shared to 75%, and their job was changed after learning(12.2%). So major respondents' job was not changed. Their major was not mainly agriculture. Learners' learning style were composed of two or more types as concrete-sequential, mixing, abstract-random, so e-learning course should be developed for the students' type. Second, it was attended at 3.2 days a week, 53.53 minutes a class, totally 172.63 minutes a week. They were very eager or generally eager to study, and attended two or more subjects. The cyber education motives was for farming knowledge, personal competency development, job performance enlarging. They selected subjects along with their interest. A subject person couldn't choose more subjects for little time, others, non interesting subject, but more subject persons were for job performance benefits and previous subjects effectiveness. Most learner was finished their subject, but a fourth was not finished for busy (26.7%). And their entrying behavior was not enough to learn e-course and computer or internet using ability was middle level as software using. And they thought RDA cyber course was comfort in non time or space limit, knowledge acquisition, and personal competency development. Cyber learning group was composed of open course only (12.5%), certificate only(25.7%), both(36.3%). Third, satisfaction and academic achievement of e-learning learners were good, and educational service offering for doing job in learning application category was good, but effect of cyber education was not good, especially, agricultural income increasing was not good because major learner group was not farmer, so they couldn't apply their knowledge to farming. And content structure and design, content comprehension, content amount were good. The more learning subject group responded to good in effects, and both open course and certificate course group satisfied more than open course only group. Based on the results, recommendation was offered as cyber course specialization before main course in RDA training system, support staff and faculty enlargement, building blended learning system with local RDA office, introducing cyber tutor system.

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

A Case Study on Cyber Counseling for University Students' Date (대학생의 이성교제에 관한 사이버 상담 사례 연구)

  • Kim Jin-Hee
    • Journal of Families and Better Life
    • /
    • v.23 no.3 s.75
    • /
    • pp.137-151
    • /
    • 2005
  • This study was designed to analyze the cyber counseling cases on the university students' date in order to identify the problems they encounter in dating and seek for a direction for education and consulting program to help them solve the problems. A total of 253 cases in cyber counseling about date were analyzed. The findings demonstrated that the university students were short of interpersonal relationship still needed for expressing Intimacy and maintaining the relationship, and poorly coping with the negative emotions such as conflict, anxiety, and boredom. Thus, a variety of human relations training programs needs to be established in the universities to help the students stay in good terms with the counterpart. Plus, cyber counseling and e-mail counseling needs to be activated so as to allow the university students to easily access when they come to face a problem in dating.