• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) »çÀ̹öº¸¾È Àü¹®°¡ ¾ç¼ºÀ» À§ÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) The Research for Cyber Security Experts
ÀúÀÚ(Author) ±è½½±â   ¹Ú´ë¿ì   Seul-gi Kim   Dea-woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 06 PP. 1137 ~ 1142 (2017. 06)
Çѱ۳»¿ë
(Korean Abstract)
»çÀ̹ö ÇØÅ·°ø°Ý°ú »çÀ̹öÅ×·¯´Â ±¹¹Î »ýÈ°¿¡ ÇÇÇظ¦ ÁÖ°í, °á±¹¿£ ±¹°¡ ¾Èº¸°¡ À§ÇùÀ» ´çÇÏ°í ÀÖ´Ù. »çÀ̹ö ÇØÅ·°ø°ÝÀ¸·Î ¿øÀÚ·Â ³Ã°¢½Ã½ºÅÛ ¼³°èµµ¸éÀÌ À¯ÃâµÇ¾úÀ¸¸ç, û¿Í´ë ȨÆäÀÌÁöÀÇ ÇØÅ·, KBS ¹æ¼Û±¹ ÇØÅ· µî »çÀ̹ö»ç°í°¡ ¹ß»ýÇÏ¿´´Ù. Á¤º¸Åë½Å±â¹Ýº¸È£¹ý, Á¤º¸Åë½Å¸ÁÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü, °³ÀÎÁ¤º¸º¸È£¹ýÀÌ »çÀ̹ö°ø°ÝÀÇ Ã¥ÀÓÀ» Áö¿ì°í ÀÖÀ¸³ª, »õ·Î¿î ±â¼ú·Î ¹«ÀåÇÑ ÇØÄ¿ÀÇ °ø°ÝÀ» ¸·±â´Â ¾î·Æ´Ù. º» ³í¹®Àº »çÀ̹ö¾Èº¸¸¦ À§ÇÑ »çÀ̹öº¸¾È Àü¹®°¡ ¾ç¼ºÀ» ¿¬±¸ÇÑ´Ù. »çÀ̹öº¸¾È Àü¹®°¡¸¦ À§ÇÑ Áö½Ä µ¥ÀÌÅͺ£À̽º¸¦ ±¸ÃàÇÑ´Ù. À¥ ÇØÅ·, ½Ã½ºÅÛ ÇØÅ·, ³×Æ®¿öÅ© ÇØÅ·ÀÇ ±â¼ú°ú Æò°¡¸¦ ÅëÇØ »çÀ̹öº¸¾È Àü¹®°¡ ÀÚ°ÝÁõ Á¦µµ¸¦ µµÀÔÇÑ´Ù. »çÀ̹öº¸¾È Àü¹®°¡ ÀÚ°ÝÁõ ¿î¿µ°ú Ãëµæ¹æ¾È¿¡ °üÇÑ ¿¬±¸¸¦ ÅëÇØ, ±¹°¡ »çÀ̹ö¾Èº¸¸¦ À§ÇÑ »çÀ̹öº¸¾È Àü¹®°¡¸¦ À°¼ºÇϴµ¥ µµ¿òÀÌ µÇ°íÀÚÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.
Å°¿öµå(Keyword) »çÀ̹öº¸¾È   »çÀ̹öÅ×·¯   Àü¹®°¡   ÀÚ°ÝÁõ   Áö½Ä   Cybersecurity   Cyber terror   Expert   Certification   Knowledge  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå