Skip to main content
Log in

Development of cyber information security education and training system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Due to recent expansion of internet, use of personal internet banking and E-commerce is rapidly increasing. Additionally, services and marketing in corporations, government and banks are rapidly increasing mostly at the internet shopping malls and web sites. Accordingly, there are increasing number of cyber attacks like intelligent and high-tech APT attack, cyber intrusion access and digitalized information. However, countermeasures, operation exercise and security education about these security accidents are not executed properly. Therefore, this study is to develop cyber information security training system based on the internet. Additionally, in order to deal with security accidents caused by malicious emails and attaching files that frequently occur at public institutions and private companies, information security education is tried to be executed targeting affiliated employees and education and training subjects using the system. Through this, security accidents caused by malicious emails could be prevented in advance and economic loss could be minimized by preventing information loss or paralysis state in computer system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Barnett SF (1996) Computer security training and education:a needs analysis. IEEE Symposium on Security and Privacy, pp 26–27

  2. Brancheau JC, Janz BD, Weatherbe JC (1996) Key issues in information systems management: 1994–95 SIM Delphi results. MIS Q 20(2):225–242

    Article  Google Scholar 

  3. Denning D (1986) An intrusion detection system. Proc. Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., pp 118–131

  4. Dutta A, Roy R (2008) Dynamics of organizational information security. Syst Dyn Rev 24(3):349–375

    Article  Google Scholar 

  5. Harrison M, Ruzzo W, Ullman J (1976) Protection in operating systems. Commun ACM 19(8):461–471

    Article  MATH  Google Scholar 

  6. Jung TS, Lim MS, Lee JB (2012) A development of comprehensive framework for continuous information security. Journal of Korean Digital Policy & Management Society 10(2):1–10

    Google Scholar 

  7. Kim SH, Park SY (2011) Influencing factors for compliance intention of information security policy. Journal of Korean Electronic Business Society 16(4):33–51

    Google Scholar 

  8. Loch KD, Carr HH, Warkentin ME (1992) Threats to information systems: today’s reality, yesterday’s understanding. MIS Q 16(2):173–186

    Article  Google Scholar 

  9. National Cyber Safety Center (2013) Information security management conditions evaluation introduction. Journal of Korean Information Security Society 23(5):9–11

    Google Scholar 

  10. Park JY (2012) An analysis on training curriculum for educating information security experts. Journal of Korean Management Information Society 31(1):149–165

    Google Scholar 

  11. Rhee HS, Kim C, Ryu YU (2009) Self-efficacy in information security: its influence on users’ information security practice behavior. Computer & Security 28:816–826

    Article  Google Scholar 

  12. Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proc IEEE 63(9):1278–1308

    Article  Google Scholar 

  13. Shin SJ (2013) Your innovation by security. L Company Publications

  14. Straub DW, Welke RJ (1998) Coping with systems risk: security planning models for management decision making. MIS Q 22(4):441–469

    Article  Google Scholar 

  15. Wood CC (2000) Integrated approach includes information security. Security 37(2):43–44

    Google Scholar 

  16. Yang DI (2013) Information security introduction. Hanbit Academy Publications

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sang-Young Oh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, BH., Kim, KC., Hong, SE. et al. Development of cyber information security education and training system. Multimed Tools Appl 76, 6051–6064 (2017). https://doi.org/10.1007/s11042-016-3495-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3495-y

Keywords

Navigation