• 제목/요약/키워드: Information Security Training

검색결과 491건 처리시간 0.022초

공공부문 정보보호 교육과정의 평가 : 사례 연구 (Evaluation of Public Information Security Training Programs : A Case Study)

  • 이송하;전효정;김태성
    • 한국IT서비스학회지
    • /
    • 제19권1호
    • /
    • pp.173-185
    • /
    • 2020
  • It is very important to evaluate training because it can systematically grasp the current status of training. Evaluation includes getting ongoing feedback from the learner, trainer and learner's supervisor, to improve the quality of the training and identify if the learner achieved the goals of the training. It also provides a justification for the implementation of training. Nonetheless, there is a lack of studies that attempt to evaluate information security training programs. In this study, we utilize the Philips model to evaluate the public training programs for the people who are in charge of the information security duties in the public sector and propose the training improvement plans. Research result has shown that it is necessary to evaluate the level of the trainees in advance and conduct training programs according to the information security skill level. In addition, it needs to conduct training according to duties such as information security management, information security operate and maintain. The limitation of this study is that each education program was not assessed individually because this study had developed an evaluation tool that could be used comprehensively.

사이버보안 교육훈련 전문 인력의 역량에 관한 연구 (A Study on the Capability of Cyber Security Education and Training Professional Personnel)

  • 엄정호
    • 디지털산업정보학회논문지
    • /
    • 제15권1호
    • /
    • pp.43-51
    • /
    • 2019
  • This research proposed the necessary capability of cyber security professional personnel for cyber security education and training. Cyber security professional personnel were required specialized capability because the curriculum of cyber security education and training is structured around practice and training. Based on the knowledge, skills, and attitudes of professors, we derive candidate capabilities and index through the results of precedent research. As a result, we derived capability such the candidate capability group as teaching qualification, expert knowledge, practical ability, lecture ability, and research ability, and detailed capability index was derived accordingly. Finally, based on the questionnaire results of the professors related to the information security, it was determined that the capability required for the cyber security education and training professional personnel were expert knowledge, practical ability, and lecture ability. Among the capabilities, executive ability means that they have to fulfil abundant executive experience due to the high proportion of practical training due to the characteristics of cyber security education and training.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권11호
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • 제27권2호
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

국내 정보보호 교육 훈련 프로그램 분석 (Analysis of Education Training Program of Information Security Man Power in Domestic)

  • 홍진근
    • 한국산학기술학회논문지
    • /
    • 제10권12호
    • /
    • pp.3725-3730
    • /
    • 2009
  • 7.7 DDoS 해킹 대란은 정보보호의 현주소와 함께 대응체계의 중요성에 대한 인식을 제고하는 기회가 되었다. 정보보호 대응방안 가운데 가장 핵심적인 요소는 정보보호 인력 수급 문제이다. 본 논문은 국내 및 국외 정보보호 프로그램을 살펴보고, 국내 대학의 주요 교과과정과 보호 분류표로부터, 국내 정보보호 인력 양성을 위해 필요한 정보보호 교육 훈련 프로그램을 분석하였다.

사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안 (Measures for Training Military Information Security Professional Personnel for Cyber Security)

  • 이광호;김흥택
    • 융합보안논문지
    • /
    • 제17권2호
    • /
    • pp.145-151
    • /
    • 2017
  • 우리 군의 사이버 공간은 적으로부터 지속적인 위협을 받고 있다. 이 같은 사이버 위협에 대응하는 수단은 결국 군(軍) 정보보호 전문인력이다. 하지만 현재 우리군의 고급 정보보호 전문인력은 소수에 불과하며 체계적인 양성계획은 미비한 상태이다. 따라서 본 논문에서는 세계 주요국인 미국, 영국, 이스라엘, 그리고 일본의 사이버 전문인력 양성정책을 조사하였다. 그리고 국내 정보보호 전문인력 양성정책을 조사하여 간략하게 제시하였다. 그리고 국방 사이버안보 전문인력 양성을 위해 4단계 전문인력 양성 및 중장기 계획 수립, 단계별 교육체계 정립, 인증제 도입을 제시하였다.

사이버보안 전문인력 획득을 위한 사이버보안 훈련생에 특화된 훈련성과 측정 모델에 관한 연구 (A Study on the Model of Training Performance Measurement Specialized to Cyber Security Trainee for Cyber Security Professionals Acquisition)

  • 김기훈;엄정호
    • 디지털산업정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.59-69
    • /
    • 2016
  • We proposed a specialized model of performance measurement to measure the training performance of the trainees in cyber practical training. Cyber security professionals are cultivating their expertise, skills, and competencies through cyber practical training in specialized education and training institutions. The our proposed process of trainee evaluation is consisted of an evaluation component discovery, evaluation item selection, evaluation index catalog, ratings and criteria decision, and calculation formula. The trainee evaluation is consisted of a formative evaluation during the training and an overall evaluation after finished training. Formative evaluation includes progress evaluation and participation evaluation, and overall evaluation includes practice evaluation and learning evaluation. The evaluation is weighted according to the importance of evaluation type. Because it is evaluated actual skills and abilities, competencies are assigned a high weight, while knowledge and attitudes are assigned a low weight. If cyber security trainees are evaluated by the proposed evaluation model, cyber security professionals can be cultivated by each skill and knowledge level and can be deployed by importance of security task.

경호비서업무의 사회적 정착과 발전방안에 관한 제언 (Research of Development and Social Settlement to the Security and Secretary)

  • 공배완
    • 한국재난정보학회 논문집
    • /
    • 제2권1호
    • /
    • pp.3-18
    • /
    • 2006
  • Recently the demand for civil bodyguards and security guards shows rapid growth by the social development and improve the quality of life. However the supply and training system have some limitations in spite of the high demand guard-secretary. The main role of secretaries has been to accompany superiors in order to maintain their dignity or trait. But the secretaries are required to play additional roles of safety managers such as a security manager, a protocol manager, an intelligence manager and a protective driver in order to overcome the domestic and the international safety environment and to elevate the quality of service as a competitive work. So, the purpose of this article is to analyse current situation of civil body and security guard training industry and to seek an educational model. For it, the following questions will be examined. First, Do the professional training organizations meet social demand for the body and security guards? Second, What kind of training has to be provide for the body and security guards? and what the qualifications of the trainers? Then, what are the differences in training courses between private organizations and universities? Is there differences in the job placement among the trainers of private organizations and universities? etc.. In summary to meet the social demand common curriculum for the body and security guard will be drawn from the analyses of diverse training organizations with different training courses in contents, training periods, educational value, and social aim.

  • PDF

정보보호 업무인력의 경력개발을 위한 재교육 방향 (A Study on Retraining for Career Development of Information Security Workforce)

  • 전효정;김태성
    • Journal of Information Technology Applications and Management
    • /
    • 제25권4호
    • /
    • pp.67-77
    • /
    • 2018
  • With the types and targets of cyber attacks expanding and with personal information leaks increasing, the quantitative demand for information security specialists has increased. The base for training the workforce has expanded accordingly, but joblessness and job-seeking still coexist. To resolve the gap between labor demand and supply, education and training systems that can supply demand quickly are needed. It takes a considerable amount of time for information security education and new manpower supply through universities and graduate schools to be reflected in the market. However, if information security retraining is carried out in terms of career development of information security and related workforce, the problem of lack of experts could be solved in a relatively short period. This paper investigates and analyzes the information security work of the information security workforce, the degree of skill level, the need for retraining, and the workplace migration experience; it also discusses the direction of career development retraining.

악성메일 훈련 모델에 관한 연구 (A Study On Malicious Mail Training Model)

  • 강영묵;이상진
    • 정보보호학회논문지
    • /
    • 제30권2호
    • /
    • pp.197-212
    • /
    • 2020
  • 가상 화폐와 전자 지갑의 등장으로 익명성을 기반으로 금전적 이득을 취할 수 있는 방법이 생김에 따라, 악성메일을 이용한 피싱과 악성코드의 전파가 지속적으로 증가하고 있다. 이에 대한 피해를 최소화하기 위해서는 인적 요소인 보안인식과 기술적 요소인 대응 능력을 고루 향상시켜야 하며, 이는 실전과 같은 악성메일 대응 훈련을 통해 향상될 수 있다. 본 연구에서는 실전과 같은 악성메일 훈련 수행을 고려한 모델을 제시하였다. 임직원들의 보안인식 향상을 위한 인식 제고 훈련과 악성메일 침투에 대한 대응 능력을 향상시키기 위한 탐지 및 대응 훈련으로 분류하여 목적에 맞는 훈련 시스템, 훈련용 악성코드의 주요 기능, 구현 및 위장 기법, 기술적 대책 우회 기법에 대해 서술하였다. 이 모델을 바탕으로 3년간 수행한 훈련 데이터를 수집하였으며, 훈련횟수, 훈련테마, 위장기법에 따른 결과 분석을 통해 훈련의 효과성을 연구하였다.