Multimedia Tools and Applications

, Volume 76, Issue 4, pp 6051–6064 | Cite as

Development of cyber information security education and training system

  • Bong-Hyun Kim
  • Ki-Chan Kim
  • Sung-Eon Hong
  • Sang-Young Oh
Article
  • 539 Downloads

Abstract

Due to recent expansion of internet, use of personal internet banking and E-commerce is rapidly increasing. Additionally, services and marketing in corporations, government and banks are rapidly increasing mostly at the internet shopping malls and web sites. Accordingly, there are increasing number of cyber attacks like intelligent and high-tech APT attack, cyber intrusion access and digitalized information. However, countermeasures, operation exercise and security education about these security accidents are not executed properly. Therefore, this study is to develop cyber information security training system based on the internet. Additionally, in order to deal with security accidents caused by malicious emails and attaching files that frequently occur at public institutions and private companies, information security education is tried to be executed targeting affiliated employees and education and training subjects using the system. Through this, security accidents caused by malicious emails could be prevented in advance and economic loss could be minimized by preventing information loss or paralysis state in computer system.

Keywords

Information security Cyber security education Training web server Monitoring and reporting server Virtual security web server 

References

  1. 1.
    Barnett SF (1996) Computer security training and education:a needs analysis. IEEE Symposium on Security and Privacy, pp 26–27Google Scholar
  2. 2.
    Brancheau JC, Janz BD, Weatherbe JC (1996) Key issues in information systems management: 1994–95 SIM Delphi results. MIS Q 20(2):225–242CrossRefGoogle Scholar
  3. 3.
    Denning D (1986) An intrusion detection system. Proc. Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., pp 118–131Google Scholar
  4. 4.
    Dutta A, Roy R (2008) Dynamics of organizational information security. Syst Dyn Rev 24(3):349–375CrossRefGoogle Scholar
  5. 5.
    Harrison M, Ruzzo W, Ullman J (1976) Protection in operating systems. Commun ACM 19(8):461–471CrossRefMATHGoogle Scholar
  6. 6.
    Jung TS, Lim MS, Lee JB (2012) A development of comprehensive framework for continuous information security. Journal of Korean Digital Policy & Management Society 10(2):1–10Google Scholar
  7. 7.
    Kim SH, Park SY (2011) Influencing factors for compliance intention of information security policy. Journal of Korean Electronic Business Society 16(4):33–51Google Scholar
  8. 8.
    Loch KD, Carr HH, Warkentin ME (1992) Threats to information systems: today’s reality, yesterday’s understanding. MIS Q 16(2):173–186CrossRefGoogle Scholar
  9. 9.
    National Cyber Safety Center (2013) Information security management conditions evaluation introduction. Journal of Korean Information Security Society 23(5):9–11Google Scholar
  10. 10.
    Park JY (2012) An analysis on training curriculum for educating information security experts. Journal of Korean Management Information Society 31(1):149–165Google Scholar
  11. 11.
    Rhee HS, Kim C, Ryu YU (2009) Self-efficacy in information security: its influence on users’ information security practice behavior. Computer & Security 28:816–826CrossRefGoogle Scholar
  12. 12.
    Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proc IEEE 63(9):1278–1308CrossRefGoogle Scholar
  13. 13.
    Shin SJ (2013) Your innovation by security. L Company PublicationsGoogle Scholar
  14. 14.
    Straub DW, Welke RJ (1998) Coping with systems risk: security planning models for management decision making. MIS Q 22(4):441–469CrossRefGoogle Scholar
  15. 15.
    Wood CC (2000) Integrated approach includes information security. Security 37(2):43–44Google Scholar
  16. 16.
    Yang DI (2013) Information security introduction. Hanbit Academy PublicationsGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Bong-Hyun Kim
    • 1
  • Ki-Chan Kim
    • 2
  • Sung-Eon Hong
    • 3
  • Sang-Young Oh
    • 4
  1. 1.Academia-Industrial Convergence ResearchDaejeon MetropolitanRepublic of Korea
  2. 2.Department of Eletrical EngineeringHanbat National UniversityDaejeon-siRepublic of Korea
  3. 3.Department of Land ManagementCheongju UniversityCheongwon-guRepublic of Korea
  4. 4.Department of Business AdministrationYoungdong UniversityYoungdong-gunRepublic of Korea

Personalised recommendations