• Title/Summary/Keyword: security training

Search Result 1,010, Processing Time 0.032 seconds

Comparison of Security Education Program of Woman Information Security Majors of Seoul Region (서울지역 여성 정보보호전공의 보안교육 프로그램 비교)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.107-113
    • /
    • 2020
  • With the development of IT technology, along with the expansion of women's participation in society, the education training of information security women's workforce is becoming a very important issue. Therefore, it is important to analyze the relevant curriculum to identify the direction of fostering women's information security workforce. Therefore, in this paper, the education and training programs of the department for training women's information security workforce based in Seoul area of the Korean metropolitan area were analyzed. The main research objective of this paper is to review whether the education and training system, which consists of the department of women's information security human resources development, is in line with the direction of NIST's human resources development. The research focus was on what the women's information security department organizes courses with each security major and what task training is interested in. In addition, in this paper, we were confirmed that the curriculum of the relevant major is based on the NIST Human Resources Development Framework, and that the majors of the relevant universities have an education and training system that conforms to the relevant task. In conclusion, the related majors are judged to be focused on the development of certification evaluation personnel of convergence industry security or information security development personnel, and general cyber security personnel.

A need assessment on the key tasks of convergence security specialists (융합보안전문가의 핵심과업 요구분석 - 방위산업체 보안전문가를 중심으로 -)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.87-98
    • /
    • 2016
  • As the informative society becomes intensified, the rise of the convergence security offers an alternative strategic correspondence to the technology leaks that are becoming more advanced, complex, and intelligent. In order to the convergence security to provide its efficacy, training convergence security specialists is essential. However, research on the subject has yet to be considered sufficient. Thus this research focuses on defense industry security specialists to define the duty and analze critical task as well as drawn and therefore the required academic level of the critical task was examined. These research work contributes to the competence development of convergence security specialists and further enhancement on convergence security training process of academic institutions and job training institutions.

A Study on the Change of Capability and Behavior against Phishing Attack by Continuous Practical Simulation Training (지속적 실전형 모의훈련을 통한 피싱공격 대응역량 및 행동변화에 관한 연구)

  • Yoon, Duck-sang;Lee, Kyung-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.267-279
    • /
    • 2017
  • This study emulated unscheduled phishing e-mails over a long period of time by imitating the manner in which external hackers attacked a group of employees in a company. We then measured and analyzed the recipient's ability to identify and respond to phishing e-mails as training progressed. In addition, we analyzed the changes in participants' response behavior when changing the external control condition between the training. As a result of the analysis, it was confirmed that the training duration had a positive (+) relationship with the employees' ability to identify phishing e-mails and the infection rate, and more employees read emails and infected with phishing attacks using social issues and seasonal events. It was also confirmed that reinforcement of internal control policy on infected persons affects positively (+) on the phishing attack response behavior of employees. Based on these results, we would like to suggest the right training method for each organization to enhance the ability of employees to cope with phishing attacks.

A Study on Human Vulnerability Factors of Companies : Through Spam Mail Simulation Training Experiments (스팸메일 모의훈련 현장실험을 통한 기업의 인적 취약요인 연구)

  • Lee, Jun-hee;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.847-857
    • /
    • 2019
  • Recently, various cyber threats such as Ransomware and APT attack are increasing by e-mail. The characteristic of such an attack is that it is important to take administrative measures by improving personal perception of security because it bypasses technological measures such as past pattern-based detection The purpose of this study is to investigate the human factors of employees who are vulnerable to spam mail attacks through field experiments and to establish future improvement plans. As a result of sending 7times spam mails to employees of a company and analyzing training report, It was confirmed that factors such as the number of training and the recipient 's gender, age, and workplace were related to the reading rate. Based on the results of this analysis, we suggest ways to improve the training and to improve the ability of each organization to carry out effective simulation training and improve the ability to respond to spam mail by awareness improvement.

The Trends of Domestic and Overseas Cyber Security Training (국내외 사이버보안 훈련 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.857-860
    • /
    • 2021
  • The 21st century society has entered the fourth industrial society of machine to machine from the information society of human to machine. Accordingly, countries around the world are always operating efficient crisis management systems that can quickly respond to disasters or crises. As cyber attacks such as cyber warfare are actually progressing, countries around the world are conducting defense training in response to cyber attacks, and reflecting the results of simulation attacks in improving or building security systems. In this paper, we would like to consider the future cyber training development guide by comparing and analyzing the trends of cyber training in domestic and foreign countries.

A Thesis on the Improvement of Basic Skills of Body Guards (경호원의 기본기량 향상에 관한 연구)

  • Kim, Pyeong-Seob
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.73-98
    • /
    • 1997
  • The thesis suggests the proper ftaining methods and their future direction in order for bodyguards to have a general idea of basic skills of escort and develop them. What is meant by basic skills are the basic abilities of bodyguards for escort indluding physical strength, martial arts, and manipulation of equipment. The equipment in the thesis is confined to guns. The following are the requircments for the training of basic skills; 1, A bodyguard should be careful not to expose any equipment he uses his basic skills so that he does not make others feel uncomfortable. 2. He should be trained to give the safety of the person(s) escorted the first priority. 3. He should have the ability to take care of at least one attacker. 4. He should be trained to be able to evaluate the trend of attacks and keep up with it. Training fo basic skills are divided into three parts-physical training, martial arts and use of equipment. Each part is divided into basic training, applied training, and professional training, which again are integrated in one master training program. Especially, development of equipment which helps to take care of attacker(s) quickly without casualties and learning to use the equipment efficiently will accelerate the improvement of basic skills. The author of the thesis worked for Presidential Security Service for fourteen years and suggests the most efficient, protection-oriented way of training based on his experience.

  • PDF

The Study on the Private Security Employee' Education and Training System for the Emergency Management (민간경비원의 위기관리 능력 제고를 위한 교육훈련 시스템 개선방안)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.129-146
    • /
    • 2008
  • When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasure services should be carried out for that purpose. In theses contexts, private security should develop and maintain a educational program to meet their responsibilities to provide the protection and safety of the clients. Conclusionally, private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients.

  • PDF

Improving Adversarial Robustness via Attention (Attention 기법에 기반한 적대적 공격의 강건성 향상 연구)

  • Jaeuk Kim;Myung Gyo Oh;Leo Hyun Park;Taekyoung Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.621-631
    • /
    • 2023
  • Adversarial training improves the robustness of deep neural networks for adversarial examples. However, the previous adversarial training method focuses only on the adversarial loss function, ignoring that even a small perturbation of the input layer causes a significant change in the hidden layer features. Consequently, the accuracy of a defended model is reduced for various untrained situations such as clean samples or other attack techniques. Therefore, an architectural perspective is necessary to improve feature representation power to solve this problem. In this paper, we apply an attention module that generates an attention map of an input image to a general model and performs PGD adversarial training upon the augmented model. In our experiments on the CIFAR-10 dataset, the attention augmented model showed higher accuracy than the general model regardless of the network structure. In particular, the robust accuracy of our approach was consistently higher for various attacks such as PGD, FGSM, and BIM and more powerful adversaries. By visualizing the attention map, we further confirmed that the attention module extracts features of the correct class even for adversarial examples.

An Awareness of Security Guard Supervisors for Improvement of Security Guard Supervisor System (경비지도사 자격제도 개선에 대한 경비지도사의 인식)

  • Kim, Il Gon
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.167-176
    • /
    • 2013
  • This study was analysis that first, a problem of security guard supervisor system, second, a problem of on the job training, third, a problem of basic and refresher training for improvement of security guard supervisor system that among security guard supervisor by NVivo 10. It was suggestion what improvement about problem.

A Study of Improving Plan of Security Guard's Sixth Sense Utilization (경호원의 제육감(第六感)활용 향상방안에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.305-319
    • /
    • 2008
  • There are always possibilities for conflicts among individuals, between individuals and groups, and among groups because of the complex and diverse nature of contemporary society. Some form of bodyguard is required to protect oneself from this constant possibility of conflicts and thus the concept of security was developed to meet the needs of one's safety. Furthermore, the increase in the number of crime and intellectual crimes now threatens not only the people with power, fortune, reputation but also all citizens. Meeting the need for safety became a challenging task for the world and a security-related industry as well as security-related careers were born. Therefore, schools and security institutions must provide education and training to nurture morality and stable psychological condition for their students/trainees. In order to offer them such working and educational environments, utilizing the sixth-sense the five senses is recommended and it is called security psychology training. This study identifies the psychology, the five senses, and the sixth sense of bodyguards while on duty and explores the training and education contents to utilize the sixth sense.

  • PDF