Development of Network Cyber Attack Training Curriculum for Security Staff

被引:0
|
作者
Kim, Guk-Il [1 ]
Kim, Jonghyeon [2 ]
机构
[1] Ajou Univ, Grad Sch Informat & Commun Technol, Suwon, South Korea
[2] Ajou Univ, Informat & Commun Technol, Suwon, South Korea
关键词
Network cyber attack training; Security information; VIRTUALIZATION ENVIRONMENT; SYSTEM;
D O I
10.1007/978-981-10-7605-3_35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the frequency of cyber attacks targeting the information assets of firms or institutions is continuously increasing. Although there are measures such as reinforcement of security policies, regulations, information protection organizations and physical security in addition to replacement of security equipments for protecting the assets, the core of the cyber security is responding to the security breaches. For this reason, producing well-trained security personnel (computer emergency responders) is essential. Although there are many publications dealing with the theories of cyber security, the learning materials that can be referred by the security personnel mainly for practices are somehow in short supply. Thus, in this study, a curriculum for network cyber attack training has been developed for the security personnel. The curriculum focuses on actual implementation of network-attacking environments, simulated attacking methods, attack pattern analysis and countermeasures.
引用
收藏
页码:210 / 214
页数:5
相关论文
共 50 条
  • [31] Development of a Training Curriculum for Hospital Security About Autism Spectrum Disorder
    Christiansen, Audrey
    Harstad, Elizabeth
    Sideridis, Georgios
    Weissman, Laura
    JOURNAL OF DEVELOPMENTAL AND BEHAVIORAL PEDIATRICS, 2021, 42 (03): : 191 - 197
  • [32] Mission-Centricity in Cyber Security: Architecting Cyber Attack Resilient Missions
    Jakobson, Gabriel
    2013 5TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON), 2013,
  • [33] CSAAES: An Expert System for Cyber Security Attack Awareness
    Rani, Cheshta
    Goel, Shivani
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 242 - 245
  • [34] Survey of Attack Projection, Prediction, and Forecasting in Cyber Security
    Husak, Martin
    Komarkova, Jana
    Bou-Harb, Elias
    Celeda, Pavel
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 640 - 660
  • [35] Cyber range design framework for cyber security education and training
    Katsantonis, M. N.
    Manikas, A.
    Mavridis, I.
    Gritzalis, D.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1005 - 1027
  • [36] Cyber range design framework for cyber security education and training
    M. N. Katsantonis
    A. Manikas
    I. Mavridis
    D. Gritzalis
    International Journal of Information Security, 2023, 22 : 1005 - 1027
  • [37] Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
    Park, Y. S.
    Choi, C. S.
    Jang, C.
    Shin, D. G.
    Cho, G. C.
    Kim, Hwa Soo
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 115 - 118
  • [38] Computer network security and cyber ethics
    Cervone, H. Frank
    PORTAL-LIBRARIES AND THE ACADEMY, 2007, 7 (02) : 249 - 250
  • [39] Development of a network attack packet generator for security system tests using a network processor
    Soh, W
    Seo, D
    Proceedings of the Third International Symposium on Magnetic Industry (ISMI'04) & First International Symposium on Physics and IT Industry (ISITI'04), 2005, : 258 - 261
  • [40] The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis
    Delwar, Tahesin Samira
    Aras, Unal
    Mukhopadhyay, Sayak
    Kumar, Akshay
    Kshirsagar, Ujwala
    Lee, Yangwon
    Singh, Mangal
    Ryu, Jee-Youl
    SENSORS, 2024, 24 (19)