DOI QR코드

DOI QR Code

The Research for Cyber Security Experts

사이버보안 전문가 양성을 위한 연구

  • Kim, Seul-gi (Department of Convergence Technology, Hoseo Graduate School of Venture) ;
  • Park, Dea-woo (Department of Convergence Technology, Hoseo Graduate School of Venture)
  • Received : 2016.12.19
  • Accepted : 2017.01.02
  • Published : 2017.06.30

Abstract

Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

사이버 해킹공격과 사이버테러는 국민 생활에 피해를 주고, 결국엔 국가 안보가 위협을 당하고 있다. 사이버 해킹공격으로 원자력 냉각시스템 설계도면이 유출되었으며, 청와대 홈페이지의 해킹, KBS 방송국 해킹 등 사이버사고가 발생하였다. 정보통신기반보호법, 정보통신망이용촉진 및 정보보호 등에 관한 법률, 개인정보보호법이 사이버공격의 책임을 지우고 있으나, 새로운 기술로 무장한 해커의 공격을 막기는 어렵다. 본 논문은 사이버안보를 위한 사이버보안 전문가 양성을 연구한다. 사이버보안 전문가를 위한 지식 데이터베이스를 구축한다. 웹 해킹, 시스템 해킹, 네트워크 해킹의 기술과 평가를 통해 사이버보안 전문가 자격증 제도를 도입한다. 사이버보안 전문가 자격증 운영과 취득방안에 관한 연구를 통해, 국가 사이버안보를 위한 사이버보안 전문가를 육성하는데 도움이 되고자한다.

Keywords

References

  1. D. W. Park, "Analysis of Mobile Smishing Hacking Trends and Security Measures," Journal of the Korea Institute of Information and Communication Engineering, vol. 19, no. 11, pp.2615-2622, Nov. 2015. https://doi.org/10.6109/jkiice.2015.19.11.2615
  2. S. O. Yun, "A Study on the Classification of Risks Caused by Big Data," Journal of Korean Association for Regional Information Society, vol. 16, no.2, pp.93-122, Jun. 2013.
  3. The Open Web Application Security Project. The Ten Most Critical Web Application Security Risks [Internet]. Available: https://www.owasp.org/images/f/f8/OWASP_Top_10_-_2013.pdf.
  4. J. C. Moon, S. J. Cho, "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development," korean society of computer information, vol. 17, no. 2, pp. 127-137, Feb. 2012.
  5. B. J. Kang, K. S. Han, E. G. Im, "Malicious code status and Detection technologies," Korean Institute of Information Scientists and Engineers, vol. 30, no. 1, pp. 44-53, Jan. 2012.
  6. B. H. Kim, D. W. Cho, "Network security technology trends and prospects," Korean Institute of Communications and Information Sciences, vol. 31, no. 4, pp. 99-106, Mar. 2014.
  7. S. G. Kim, D. W. Park, "The Research for Cyber Security Experts," in Proceeding of Conference on Korea Institute of Information and Communication Engineering, KOREA, vol. 20, no. 1, pp. 182, May 2016.