Abstract
Due to recent expansion of internet, use of personal internet banking and E-commerce is rapidly increasing. Additionally, services and marketing in corporations, government and banks are rapidly increasing mostly at the internet shopping malls and web sites. Accordingly, there are increasing number of cyber attacks like intelligent and high-tech APT attack, cyber intrusion access and digitalized information. However, countermeasures, operation exercise and security education about these security accidents are not executed properly. Therefore, this study is to develop cyber information security training system based on the internet. Additionally, in order to deal with security accidents caused by malicious emails and attaching files that frequently occur at public institutions and private companies, information security education is tried to be executed targeting affiliated employees and education and training subjects using the system. Through this, security accidents caused by malicious emails could be prevented in advance and economic loss could be minimized by preventing information loss or paralysis state in computer system.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig4_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig5_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig6_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig7_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig8_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig9_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig10_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig11_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig12_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig13_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig14_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-016-3495-y/MediaObjects/11042_2016_3495_Fig15_HTML.gif)
Similar content being viewed by others
References
Barnett SF (1996) Computer security training and education:a needs analysis. IEEE Symposium on Security and Privacy, pp 26–27
Brancheau JC, Janz BD, Weatherbe JC (1996) Key issues in information systems management: 1994–95 SIM Delphi results. MIS Q 20(2):225–242
Denning D (1986) An intrusion detection system. Proc. Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., pp 118–131
Dutta A, Roy R (2008) Dynamics of organizational information security. Syst Dyn Rev 24(3):349–375
Harrison M, Ruzzo W, Ullman J (1976) Protection in operating systems. Commun ACM 19(8):461–471
Jung TS, Lim MS, Lee JB (2012) A development of comprehensive framework for continuous information security. Journal of Korean Digital Policy & Management Society 10(2):1–10
Kim SH, Park SY (2011) Influencing factors for compliance intention of information security policy. Journal of Korean Electronic Business Society 16(4):33–51
Loch KD, Carr HH, Warkentin ME (1992) Threats to information systems: today’s reality, yesterday’s understanding. MIS Q 16(2):173–186
National Cyber Safety Center (2013) Information security management conditions evaluation introduction. Journal of Korean Information Security Society 23(5):9–11
Park JY (2012) An analysis on training curriculum for educating information security experts. Journal of Korean Management Information Society 31(1):149–165
Rhee HS, Kim C, Ryu YU (2009) Self-efficacy in information security: its influence on users’ information security practice behavior. Computer & Security 28:816–826
Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proc IEEE 63(9):1278–1308
Shin SJ (2013) Your innovation by security. L Company Publications
Straub DW, Welke RJ (1998) Coping with systems risk: security planning models for management decision making. MIS Q 22(4):441–469
Wood CC (2000) Integrated approach includes information security. Security 37(2):43–44
Yang DI (2013) Information security introduction. Hanbit Academy Publications
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, BH., Kim, KC., Hong, SE. et al. Development of cyber information security education and training system. Multimed Tools Appl 76, 6051–6064 (2017). https://doi.org/10.1007/s11042-016-3495-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3495-y