DOI QR코드

DOI QR Code

Enhancing Education Curriculum of Cyber Security Based on NICE

NICE 기반 사이버보안 교육커리큘럼 개선 연구

  • 박원형 (극동대학교 산업보안학과) ;
  • 안성진 (성균관대학교 컴퓨터교육학과)
  • Received : 2017.02.22
  • Accepted : 2017.05.17
  • Published : 2017.07.31

Abstract

As the cyber threats become more sophisticated and intelligent, the cases of cyber-infringement accidents are rapidly increasing. As a result, awareness of the importance of cyber security professionals has led to many cyber security-related educational programs. These programs provided with education curriculum aimed because cyber security workforce and job-based cyber security education research are not properly done. In this study, we developed a new cyber security education curriculum that defines and reflects cyber security personnel and knowledge system. In this study is not composed solely of the education contents related to the defenses emphasized in the existing education curriculum, but developed education curriculum to train a professional and balanced cyber security manpower by adding education contents in the attack field.

사이버 위협이 고도화되고 지능화되어짐에 따라 사이버 침해사고로 인한 피해사례가 급격하게 증가하고 있다. 이로 인해 사이버보안 전문인력의 중요성을 인식하여 다수의 사이버 보안관련 교육 프로그램이 운영되고 있지만 사이버보안 인력 현황 및 직무에 기반한 사이버보안 교육연구가 이루어지 않아서 교육 수요자 및 공급자가 목표한 교육과정이 제공되지 않고 있다. 이에 따라 본 연구에서는 사이버보안 인력 및 지식체계를 정의하고 이를 반영한 새로운 사이버보안 교육 커리큘럼을 개발하였다. 본 연구에서 개발한 교육 커리큘럼은 기존 교육 커리큘럼에서 강조하고 있는 방어와 관련된 교육내용만으로 구성하는 것이 아니라, 공격분야의 교육내용을 추가하여 전문적이고 균형적인 사이버보안 인력양성을 위한 교육 커리큘럼을 개발 및 개선하였다.

Keywords

References

  1. D. S. Lee, "A Study on Impact on Affect Students by Problem Solving Centric Lecture," Korean College Composition and Communication, Vol.9, pp.229-247, 2014.
  2. S. W. Seo, W. J. Oh, and H. G. Kim, "Research on cyber Warfare Manpower Training Strategy for Securing Defense Information System Using AHP Analysis," Journal of Security Engineering, Vol.12, No.2, pp.109-120, 2015. https://doi.org/10.14257/jse.2015.04.02
  3. H. W. Lim, "Security Education and Research in Accordance with the Paradigm Shift in the Industry Security," Journal of Security Engineering, Vol. 12, No. 6, pp.597-608, 2015 https://doi.org/10.14257/jse.2015.12.03
  4. H. M. Na, "Comparative Analysis on the Curriculums of Information Systems Security," Journal of The Korean Assocaition of Information Ecucation, Vol.9, No.4, pp.661-671, 2005.
  5. J. Y. Park, "An Analysis on Training Curriculum for Educating Information Security Experts," Korea Journal of Business Administration, Vol. 31, No.1, pp.149-165, 2012.
  6. C. Paulsen and E. McDuffie, "NICE: Creating a Cybersecurity Workforce and Aware Public," IEEE Security & Privacy, Vol. 10, No.3, pp.76-79, 2012.
  7. D. Manson and R. Pike "The Case for depth in cyber security education," ACM Inroads, Vol.5, No.1, pp.47-52, 2014. https://doi.org/10.1145/2568195.2568212
  8. C. Paulsen and E. Mcduffie, "NICE: Creating a Cybersecurity Workforce and Aware Public," IEEE Security & Privacy, Vol.10, No.3, pp.76-70, 2012.
  9. S. L. Pfleeger and D. D. Caputo, "Leveraging behavioral science to mitigate cyber security risk," Computers & Security, Vol.31, No.4, pp.597-611, 2012. https://doi.org/10.1016/j.cose.2011.12.010
  10. Y. Yasinsac, R. F. Erbacher, and D. G. Marks, "Computer forensics education," IEEE Security & Privacy, Vol.99, No.4, pp.15-23, 2003. https://doi.org/10.1109/MSECP.2003.1236229