SlideShare a Scribd company logo
1 of 49
고려대학교정보보호대학원
마스터 제목 스타일 편집
고려대학교정보보호대학원CODEBLUE2015@Tokyo,Japan
How South Korea Invests in
Human Capital for Cyber-Security
This research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea,
under the ITRC(Information Technology Research Center) support program (IITP-2015-R0992-15-1006)
supervised by the IITP(Institute for Information & communications Technology Promotion)
고려대학교정보보호대학원
마스터 제목 스타일 편집
2
 Who am I?
 Cyber Security Situation
 Government
 Non-Profit Private Organization
 Regular School Education (Univ. & Colleges)
 Other (Non-Regular) Education Programs
 University Security Clubs
 Hacking Contests/Conferences
 Conclusions & Future Works
Contents
고려대학교정보보호대학원
마스터 제목 스타일 편집
3
Who am I?
고려대학교정보보호대학원
마스터 제목 스타일 편집
4
 2000. 03. : Founded Graduate School of
Information Security (情報保護大學院)
domestically for the first time
 2009. 12. & 2010. 08. : Successively won
DC3 Digital Forensic Challenge 2009 &
2010
 2012. 03 : Established Undergraduate
Dept. of Cyber Defense (Cyber國防學科)
 2015. 05 : Came in 3rd at the ACM
International Collegiate Programming
Contest, one of the largest international
programming contests
 2015. 08. : Won DEFCON CTF 2015
Korea University
고려대학교정보보호대학원
마스터 제목 스타일 편집
5
 Leading institution in research and education in
cybersecurity of Korea
 17 full-time professors + 2 adjunct professors +
8 visiting professors
 Having turned out 1,000+ Ms.D/Ph.D security
experts
 Having published 520+ papers on SCI(E) journals
over the last 15 years
 Former president of Graduate School of
Information Security, Jong In Lim, was
appointed as ’President’s Special Adviser for
the National Security (靑瓦臺 安保特別補佐官)’
Korea University (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
6
 金 昇 柱 (Nick : Pr0xy5kim), 1971
 1999. 02 : Ph.D on Cryptography @
Sungkyunkwan Univ.
 1997.6~1997.8 : Visiting Researcher @ Prof.
Shigeo Tsujii's Lab. of the Chuo University,
Tokyo, Japan
 1998.12~2004.02 : Director @ KISA (Korea
Internet & Security Agency)
 2004.03~2011.02 : Assistant Professor &
Associate Professor @ Sungkyunkwan Univ.
 2011.03~Now : Associate Professor & Full
Professor @ Graduate School of
Information Security, Korea Univ.
Prof. Dr. Seungjoo (Gabriel) Kim
고려대학교정보보호대학원
마스터 제목 스타일 편집
7
 From 2011, Co-Founder/Advisory
Director of a hacker group, HARU
and an international security &
hacking conference, SECUINSIDE.
Prof. Dr. Seungjoo (Gabriel) Kim (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
8
 Founded in 2011
 Acronym of ”HAckers’ Re-Union” or ”HAckers aRe
Us”
 One of the biggest association of underground hacking
groups and communities in Korea
 President :
 8+ Honorable Members :
 BLACK.PERL (www.bpsec.co.kr), CNSECURITY
(www.cnsec.co.kr), FlyHigh, GRAYHASH (BEISTLAB,
www.grayhash.com), Hackerschool
(www.hackerschool.org), iNET COP (www.inetcop.net),
NSHC (www.nshc.net), SEWORKS (Wowhacker,
www.seworks.co), etc.
[Note] HARU
고려대학교정보보호대학원
마스터 제목 스타일 편집
9
 Also, a head of SANE(Security Analysis
aNd Evaluation, 保安性分析評價) Lab.
Prof. Dr. Seungjoo (Gabriel) Kim (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
10
 Also, a head of SANE(Security Analysis
aNd Evaluation, 保安性分析評價) Lab.
Prof. Dr. Seungjoo (Gabriel) Kim (Cont.)
Ryan Beist Silverdel
Jack2
고려대학교정보보호대학원
마스터 제목 스타일 편집
11
Cyber Security Situation
고려대학교정보보호대학원
마스터 제목 스타일 편집
12
 In Korea, cyber warfare has become real,
not a virtual one. North Korea continues to
expand its cyber warfare capabilities.
 South Korean National Intelligence Service
(NIS, Korean CIA) officially reported 75,472
cyber-attacks launched against the
government and public agencies from 2010
until October 2014.
 North Korea attempts millions of indiscriminate
cyber-attack attempts on government agencies
and private corporations in South Korea.
Cyber Security Situation in KR
고려대학교정보보호대학원
마스터 제목 스타일 편집
13
 Especially, five years ago, South Korea was
hit by a computer virus that took over
20,000 computers and had them attack
banks, television stations and its ministry of
defense.
 Korean government believes that North
Korean General Bureau of Reconnaissance
(偵察總局), specifically Unit 121, dedicates
6,000+ full-time hackers who create
malicious computer codes.
 1,700 experts and 5,100 supportive members
Cyber Security Situation in KR (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
14
 To narrow the gap with the North,
recently South Korean government has
been devoting itself to raise more
cyber security experts.
Cyber Security Situation in KR (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
15
Government
고려대학교정보보호대학원
마스터 제목 스타일 편집
16
 Blue House National Security Office (國家安保室)
as Control Tower
 NIS (National Intelligence Service (Korean CIA),
國家情報院) for Public Sector
 NSR (National Security Research Institute) for Technical
Support
 MSIP (Ministry of Science, ICT & Future Planning,
未來創造科學部) for Private Sector
 KISA (Korea Internet & Security Agency) for Technical
Support
 Cyber Security Research Division of ETRI (Electronics and
Telecommunications Research Institute) for Development
of Fundamental Security Technologies
 KCC (Korea Communications Commission, 放送通信
委員會) for the Citizens’ Personal Information
Protection
Cyber Security Related Government
고려대학교정보보호대학원
마스터 제목 스타일 편집
17
 MOI (Ministry of the Interior, 行政自治部) for E-
Gov.
 FSC (Financial Services Commission, 金融委員會)
& FSS (Financial Supervisory Service, 金融監督院)
for Financial Sector
 FSI (Financial Security Institute) for Technical
Support
 MOD (Ministry of Defense, 國防部) & Cyber
Command for Military Sector
 ADD (Agency for Defense Development) for
Technical Support
 SPO (Supreme Prosecutors' Office, 大檢察廳) &
NPA (National Police Agency, 警察廳) for Cyber
Crime
Cyber Security Related Government
고려대학교정보보호대학원
마스터 제목 스타일 편집
18
Non-Profit Private Organizations
고려대학교정보보호대학원
마스터 제목 스타일 편집
19
 NISA (National Information Security Alliance,
2002)
 KIISC (Korea Institute of Information Security &
Cryptology, 1990.12.) for Promoting Academic
Research (e.g., ICISC, WISA, etc.)
 www.kiisc.or.kr
 KCSA (Korea Convergence Security Association,
2001)
 www.kocosa.org
 KISIA (Korea Information Security Industry
Association, 1997.7.) as Representative Body for
157+ Information Security Companies
 www.kisia.or.kr
 CONCERT (CONsortium of Computer Emergency
Response Teams, 1996)
 www.concert.or.kr
Non-Profit Private Organizations
고려대학교정보보호대학원
마스터 제목 스타일 편집
20
 Korea Council of Chief Information Security
Officers (2009)
 www.cisokorea.org
 OPA (Korea Online Privacy Association, 2011)
 www.opa.or.kr
 KCPPI (The Korean Council on the
Protection of Personal Information, 2010)
 www.kcppi.or.kr
 Korea Chief Privacy Officers' FORUM (2007)
 www.cpoforum.or.kr
 HARU (HAckers’ Re-Union, 2011)
 www.h4ru.com
Non-Profit Private Organizations
고려대학교정보보호대학원
마스터 제목 스타일 편집
21
Regular School Education
(Universities & Colleges)
고려대학교정보보호대학원
마스터 제목 스타일 편집
22
 # of Departments of Undergraduate
schools to offer cyber security programs of
study : 36 (increased 28.6% from year-ago)
 # of Undergraduate Students on the register :
5,701 (increased 15.8% from year-ago)
 # of Departments of Graduate schools to
offer cyber security programs of study : 32
 # of Graduate Students on the register : 1,241
(increased 24.6% from year-ago)
Universities (in 2014)
고려대학교정보보호대학원
마스터 제목 스타일 편집
23
 Since Joongbu Univ. established the first
cyber security undergraduate program in
1996, it has been growing quickly every
year.
 Recently, joint educational programs
with security companies are on the
increase.
 Full Scholarship over Guaranteed
Employment
Universities (in 2014) (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
24
 # of Departments of Colleges to offer
cyber security programs of study : 8
 # of students on the register : 568
(increased 34.6% from year-ago)
Colleges (in 2014)
고려대학교정보보호대학원
마스터 제목 스타일 편집
25
 Established in 2012
 In 2016, we will graduate 30 students for
the first time.
 Joint educational programs with Korea
Army (Cyber Command)
 Full Scholarship over Guaranteed
Employment
 Upon graduation, they are to be commissioned
as second lieutenants and must serve in the
military for seven years
 Accept top 1% of students in the
national college entrance exam
Dept. of CYDF @ Korea Univ.
고려대학교정보보호대학원
마스터 제목 스타일 편집
26
 Inspired by Israel's Talpiot program
 “Talpiot” means “best of the best” in Hebrew
 Israel set up the Talpiot program in 1979 to
train the nation's most promising high-
school graduates to become technological
innovators for the military
 Members of program, called “Talpions”,
spend 3 years in study, followed by 6 years
of military service focused on improving the
Israeli military's technological edge rather
than serving in combat units
 Giving financial support for start-ups
Dept. of CYDF @ Korea Univ. (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
27
 Curriculum deals with :
 Cryptology & Steganography
 Cyberlaw
 Cyberpsychology
 Hacking
 Digital forensics
 Information assurance
 Basic military studies, etc
 Also embedded some programs in the
curriculum to inculcate students with
patriotism and a strong work ethic
Dept. of CYDF @ Korea Univ. (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
28
 In 2015, "DEFKOR," the team comprised
of 8 students from Dept. of CYDF at
Korea University and 3 from Korea-based
IT security solution provider Raonsecure,
and 2 Korean students studying in the
U.S. won the TOP prize at the DEFCON
CTF 23!
 In this year, 4,000+ teams
qualified, 15 teams made
finalists!
Dept. of CYDF @ Korea Univ. (Cont.)
고려대학교정보보호대학원
마스터 제목 스타일 편집
29
Other (Non-Regular)
Education Programs
고려대학교정보보호대학원
마스터 제목 스타일 편집
30
 Public Sector & Government-Run Cyber
Security Education Programs
 Education and Training for Public Officers
 NSR’s CSTEC, KIA Academy
 Education and Training for Non-Officers
 KISA’s K-Shield, KITRI’s BoB, KISA’s Online
Information Security Training Lab., ITRC
 Private Sector-Run Cyber Security
Education Programs
 In 2014, 25 private cyber security training
institutes
Other Education Programs
고려대학교정보보호대학원
마스터 제목 스타일 편집
31
 CSTEC (Cyber Security Training and
Exercise Center)
 Opened at Daejeon, Oct. 2014.
 Organized by NSR (National Security
Research Institute)
 KISA Academy
 Opened at Seoul, May 2009.
 Organized by KISA (Korea Internet &
Security Agency)
Public Programs for Public Officers
고려대학교정보보호대학원
마스터 제목 스타일 편집
32
 K-Shield
 Since 2013.
 Organized by KISA
 Aimed at : Raising very highly skilled cyber
security experts
 Until 2017, plan to produce 5,000 certified
experts
 Applicant’s requirement : Security staffs in
public or private sector
Public Programs for Non-Officers
고려대학교정보보호대학원
마스터 제목 스타일 편집
33
 BoB (Best of the Best)
 Since 2012.
 Organized by KITRI (Korea Information
Technology Research Institute)
 Aimed at : Raising very highly skilled cyber
security experts
 Running strong peer-to-peer mentoring
program for professional development.
 Mentors : Almost all members of HARU, Other well-
known security experts, etc.
 Applicant’s requirement : Students (high
school, undergraduate and graduate)
Public Programs for Non-Officers
고려대학교정보보호대학원
마스터 제목 스타일 편집
34
 BoB (Best of the Best)
 Courses :
 About 8 month course
 Survival program
 The final 6 students will get around $17,000 each
 1st Semester : Learning about information
security (crypto, network, OS, ethics and so on)
from professionals
 2nd Semester : Projects with mentors
 3rd Semester : Advanced researches
Public Programs for Non-Officers
고려대학교정보보호대학원
마스터 제목 스타일 편집
35
 BoB (Best of the Best)
 Among 13 DEFKOR members, 10 are from
BoB students(8) or mentors(2)!
Public Programs for Non-Officers
고려대학교정보보호대학원
마스터 제목 스타일 편집
36
 Online Information Security Training
Lab.
 Since 2001.
 Organized by KISA
 www.sis.or.kr
Public Programs for Non-Officers
고려대학교정보보호대학원
마스터 제목 스타일 편집
37
 ITRC (University Information
Technology Research Center)
 Since 2000.
 Supported by the MSIP (Ministry of Science,
ICT & Future Planning)
 During 2000~2014, KRW 415.72 billion (= USD
363,709,536.31 = JPY 43,699,740,358.03) was
funded (121 centers of 45 universities) for the
enhancement of IT research capabilities of
universities
 Including ITRC for cyber security field
Public Programs for Non-Officers
고려대학교정보보호대학원
마스터 제목 스타일 편집
38
University Security Clubs
고려대학교정보보호대학원
마스터 제목 스타일 편집
39
 At school, lots of information security clubs
in Korea
 Since 2006, KISA & MSIP have been
encouraging and supporting security clubs
at universities
 In 2014, 45 clubs are selected & supported
 Awards and Money
 Some clubs are famous at the world class
CTFs
 CyKor (Korea Univ.), GoN (KAIST), PLUS
(Postech)
University Clubs of Information Security
고려대학교정보보호대학원
마스터 제목 스타일 편집
40
Hacking Contests/Conferences
고려대학교정보보호대학원
마스터 제목 스타일 편집
41
 10+ hacking contests/conferences per year
 International
 SECUINSIDE by HARU, Korea Univ., KISA(MSIP),
NSR(NIS), and KOSCOM
 CODEGATE by SOFTFORUM and KISA(MSIP)
 POC (Power Of Community) by HNS company
 Domestic
 HDCON (Hacking Defence CONtest) by
KISA(MSIP)
 White-Hat Hacker Contest by Ministry of
Defense and the NIS
 FISCON (Financial Information Security
CONference) by FSI(FSS)
 INC0GNITO by 10 University Security Clubs
Hacking Contests/Conferences
고려대학교정보보호대학원
마스터 제목 스타일 편집
42
 Since 2011.
 Hosted by HARU, Korea Univ.,
KISA(MSIP), NSR(NIS), and KOSCOM
 SECUINSIDE CTF winners are pre-
qualified for DEFCON CTF
 From 2015, they began Pwn2Own
contest (named as 'Capture The Bug')
for the first time in Korea
 www.secuinside.com
SECUINSIDE
고려대학교정보보호대학원
마스터 제목 스타일 편집
43
 Since 2008.
 Hosted by SOFTFORUM and KISA(MSIP)
 The first international hacking
contests/conferences in Korea
 CODEGATE CTF winners are pre-qualified
for DEFCON CTF
 www.codegate.org
CODEGATE
고려대학교정보보호대학원
마스터 제목 스타일 편집
44
 Since 2004.
 Hosted by KISA(MSIP)
 The oldest hacking contests/conferences
in Korea
HDCON
고려대학교정보보호대학원
마스터 제목 스타일 편집
45
 Korea is probably most activated infosec
country in East Asia! However, we should
move …
 From quantitative growth to qualitative
growth
 Can get a good job after graduation
 From information security-oriented
education to information assurance-
oriented education
 (e.g.) U.S.’s NIAETP (National Information
Assurance Education and Training Program)
Conclusions & Future Works
고려대학교정보보호대학원
마스터 제목 스타일 편집
46
[Note] Information Assurance
고려대학교정보보호대학원
마스터 제목 스타일 편집
47
 Computer Security Era (the early 1960s
~)
 Information Security Era (the 1980s ~)
 Information Assurance Era (1998 ~)
[Note] Information Assurance
고려대학교정보보호대학원
마스터 제목 스타일 편집
48
 Originated in the U.S. DoD in the late
1990's.
 IA is more than just IS!
[Note] Information Assurance
(Source : Algirdas Avizÿ ienis et al., "Fundamental Concepts of Dependability", UCLA CSD Report no. 010028)
고려대학교정보보호대학원
마스터 제목 스타일 편집
고려대학교정보보호대학원CODEBLUE2015@Tokyo,Japan
How South Korea Invests in
Human Capital for Cyber-Security
This research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea,
under the ITRC(Information Technology Research Center) support program (IITP-2015-R0992-15-1006)
supervised by the IITP(Institute for Information & communications Technology Promotion)

More Related Content

What's hot

Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolJude Rainer
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authenticationpaperpublications3
 

What's hot (10)

Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))27 5 jun17 28apr 15859 ammar final (edti ari baru))
27 5 jun17 28apr 15859 ammar final (edti ari baru))
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
An organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate SchoolAn organized and Secured Local Area Network in Naval Post Graduate School
An organized and Secured Local Area Network in Naval Post Graduate School
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Security for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP AuthenticationSecurity for Hard AI Problems Using CaRP Authentication
Security for Hard AI Problems Using CaRP Authentication
 

Viewers also liked

Five year plans of south korea
Five year plans of south koreaFive year plans of south korea
Five year plans of south koreaWPP
 
2017년도 고려대학교 사이버국방학과 입시설명 자료
2017년도 고려대학교 사이버국방학과 입시설명 자료2017년도 고려대학교 사이버국방학과 입시설명 자료
2017년도 고려대학교 사이버국방학과 입시설명 자료Seungjoo Kim
 
Economic Development of South Korea under Park Chung Hee (1961-79)
Economic Development of South Korea under Park Chung Hee (1961-79)Economic Development of South Korea under Park Chung Hee (1961-79)
Economic Development of South Korea under Park Chung Hee (1961-79)Philip Cho
 
International Business Management (IBM) Focus Study: South Korea
International Business Management (IBM) Focus Study: South KoreaInternational Business Management (IBM) Focus Study: South Korea
International Business Management (IBM) Focus Study: South KoreaAziza Zaldarriaga Sadain
 
The Republic Of South Korea
The Republic Of South KoreaThe Republic Of South Korea
The Republic Of South Koreaorangetreeworks
 

Viewers also liked (6)

Five year plans of south korea
Five year plans of south koreaFive year plans of south korea
Five year plans of south korea
 
2017년도 고려대학교 사이버국방학과 입시설명 자료
2017년도 고려대학교 사이버국방학과 입시설명 자료2017년도 고려대학교 사이버국방학과 입시설명 자료
2017년도 고려대학교 사이버국방학과 입시설명 자료
 
Economic Development of South Korea under Park Chung Hee (1961-79)
Economic Development of South Korea under Park Chung Hee (1961-79)Economic Development of South Korea under Park Chung Hee (1961-79)
Economic Development of South Korea under Park Chung Hee (1961-79)
 
International Business Management (IBM) Focus Study: South Korea
International Business Management (IBM) Focus Study: South KoreaInternational Business Management (IBM) Focus Study: South Korea
International Business Management (IBM) Focus Study: South Korea
 
South Korea Presentation
South Korea PresentationSouth Korea Presentation
South Korea Presentation
 
The Republic Of South Korea
The Republic Of South KoreaThe Republic Of South Korea
The Republic Of South Korea
 

Similar to How South Korea Invests in Human Capital for Cyber-Security

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...CODE BLUE
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsSeungjoo Kim
 
ORCID Activities in Korea
ORCID Activities in KoreaORCID Activities in Korea
ORCID Activities in KoreaORCID, Inc
 
Network Separation Policy in Korea
 Network Separation Policy in Korea Network Separation Policy in Korea
Network Separation Policy in KoreaSeungjoo Kim
 
Calit2 – Increasing Interaction Between Industry and University Researchers
Calit2 – Increasing Interaction Between Industry and University ResearchersCalit2 – Increasing Interaction Between Industry and University Researchers
Calit2 – Increasing Interaction Between Industry and University ResearchersLarry Smarr
 
Training and international speaking (jul2019)
Training and international speaking (jul2019)Training and international speaking (jul2019)
Training and international speaking (jul2019)TBSS Group
 
“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...
“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...
“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...Jim "Brodie" Brazell
 
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...Seungjoo Kim
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Developing a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVDeveloping a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVSeungjoo Kim
 
Internship resources & Sample companies
Internship resources & Sample companiesInternship resources & Sample companies
Internship resources & Sample companiessmwortman
 
JECRC engineering college
JECRC engineering collegeJECRC engineering college
JECRC engineering collegeAmit Kumar
 
WebEngLab_In-YoungKo_201807
WebEngLab_In-YoungKo_201807WebEngLab_In-YoungKo_201807
WebEngLab_In-YoungKo_201807KAISTWebEng
 
Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTNUS-ISS
 
CILogon and InCommon: Technical Update
CILogon and InCommon: Technical UpdateCILogon and InCommon: Technical Update
CILogon and InCommon: Technical Updatejbasney
 

Similar to How South Korea Invests in Human Capital for Cyber-Security (20)

How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabri...
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
 
ORCID Activities in Korea
ORCID Activities in KoreaORCID Activities in Korea
ORCID Activities in Korea
 
Network Separation Policy in Korea
 Network Separation Policy in Korea Network Separation Policy in Korea
Network Separation Policy in Korea
 
Calit2 – Increasing Interaction Between Industry and University Researchers
Calit2 – Increasing Interaction Between Industry and University ResearchersCalit2 – Increasing Interaction Between Industry and University Researchers
Calit2 – Increasing Interaction Between Industry and University Researchers
 
OCR cybersecurity
OCR cybersecurityOCR cybersecurity
OCR cybersecurity
 
Training and international speaking (jul2019)
Training and international speaking (jul2019)Training and international speaking (jul2019)
Training and international speaking (jul2019)
 
“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...
“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...
“5th World: Texas Industry Cluster Initiative and 21st-Century Science, Techn...
 
Ti 5thworld
Ti 5thworldTi 5thworld
Ti 5thworld
 
Ti 5thworld
Ti 5thworldTi 5thworld
Ti 5thworld
 
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Developing a Protection Profile for Smart TV
Developing a Protection Profile for Smart TVDeveloping a Protection Profile for Smart TV
Developing a Protection Profile for Smart TV
 
Internship resources & Sample companies
Internship resources & Sample companiesInternship resources & Sample companies
Internship resources & Sample companies
 
JECRC engineering college
JECRC engineering collegeJECRC engineering college
JECRC engineering college
 
WebEngLab_In-YoungKo_201807
WebEngLab_In-YoungKo_201807WebEngLab_In-YoungKo_201807
WebEngLab_In-YoungKo_201807
 
Fixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoTFixing the Last Missing Piece in Securing IoT
Fixing the Last Missing Piece in Securing IoT
 
CILogon and InCommon: Technical Update
CILogon and InCommon: Technical UpdateCILogon and InCommon: Technical Update
CILogon and InCommon: Technical Update
 
WebEng_202010
WebEng_202010WebEng_202010
WebEng_202010
 

More from Seungjoo Kim

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리Seungjoo Kim
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. SyllabusSeungjoo Kim
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto BlockchainSeungjoo Kim
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart ContractSeungjoo Kim
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and MetaverseSeungjoo Kim
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other AltcoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark CoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Seungjoo Kim
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCSeungjoo Kim
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessSeungjoo Kim
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Seungjoo Kim
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Seungjoo Kim
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -Seungjoo Kim
 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Seungjoo Kim
 

More from Seungjoo Kim (20)

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0
 

Recently uploaded

How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceApostolos Syropoulos
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlDr. Bruce A. Johnson
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustSavipriya Raghavendra
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTDR. SNEHA NAIR
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 

Recently uploaded (20)

How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
EBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting BlEBUS5423 Data Analytics and Reporting Bl
EBUS5423 Data Analytics and Reporting Bl
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational TrustVani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
Vani Magazine - Quarterly Magazine of Seshadripuram Educational Trust
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 

How South Korea Invests in Human Capital for Cyber-Security

  • 1. 고려대학교정보보호대학원 마스터 제목 스타일 편집 고려대학교정보보호대학원CODEBLUE2015@Tokyo,Japan How South Korea Invests in Human Capital for Cyber-Security This research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2015-R0992-15-1006) supervised by the IITP(Institute for Information & communications Technology Promotion)
  • 2. 고려대학교정보보호대학원 마스터 제목 스타일 편집 2  Who am I?  Cyber Security Situation  Government  Non-Profit Private Organization  Regular School Education (Univ. & Colleges)  Other (Non-Regular) Education Programs  University Security Clubs  Hacking Contests/Conferences  Conclusions & Future Works Contents
  • 4. 고려대학교정보보호대학원 마스터 제목 스타일 편집 4  2000. 03. : Founded Graduate School of Information Security (情報保護大學院) domestically for the first time  2009. 12. & 2010. 08. : Successively won DC3 Digital Forensic Challenge 2009 & 2010  2012. 03 : Established Undergraduate Dept. of Cyber Defense (Cyber國防學科)  2015. 05 : Came in 3rd at the ACM International Collegiate Programming Contest, one of the largest international programming contests  2015. 08. : Won DEFCON CTF 2015 Korea University
  • 5. 고려대학교정보보호대학원 마스터 제목 스타일 편집 5  Leading institution in research and education in cybersecurity of Korea  17 full-time professors + 2 adjunct professors + 8 visiting professors  Having turned out 1,000+ Ms.D/Ph.D security experts  Having published 520+ papers on SCI(E) journals over the last 15 years  Former president of Graduate School of Information Security, Jong In Lim, was appointed as ’President’s Special Adviser for the National Security (靑瓦臺 安保特別補佐官)’ Korea University (Cont.)
  • 6. 고려대학교정보보호대학원 마스터 제목 스타일 편집 6  金 昇 柱 (Nick : Pr0xy5kim), 1971  1999. 02 : Ph.D on Cryptography @ Sungkyunkwan Univ.  1997.6~1997.8 : Visiting Researcher @ Prof. Shigeo Tsujii's Lab. of the Chuo University, Tokyo, Japan  1998.12~2004.02 : Director @ KISA (Korea Internet & Security Agency)  2004.03~2011.02 : Assistant Professor & Associate Professor @ Sungkyunkwan Univ.  2011.03~Now : Associate Professor & Full Professor @ Graduate School of Information Security, Korea Univ. Prof. Dr. Seungjoo (Gabriel) Kim
  • 7. 고려대학교정보보호대학원 마스터 제목 스타일 편집 7  From 2011, Co-Founder/Advisory Director of a hacker group, HARU and an international security & hacking conference, SECUINSIDE. Prof. Dr. Seungjoo (Gabriel) Kim (Cont.)
  • 8. 고려대학교정보보호대학원 마스터 제목 스타일 편집 8  Founded in 2011  Acronym of ”HAckers’ Re-Union” or ”HAckers aRe Us”  One of the biggest association of underground hacking groups and communities in Korea  President :  8+ Honorable Members :  BLACK.PERL (www.bpsec.co.kr), CNSECURITY (www.cnsec.co.kr), FlyHigh, GRAYHASH (BEISTLAB, www.grayhash.com), Hackerschool (www.hackerschool.org), iNET COP (www.inetcop.net), NSHC (www.nshc.net), SEWORKS (Wowhacker, www.seworks.co), etc. [Note] HARU
  • 9. 고려대학교정보보호대학원 마스터 제목 스타일 편집 9  Also, a head of SANE(Security Analysis aNd Evaluation, 保安性分析評價) Lab. Prof. Dr. Seungjoo (Gabriel) Kim (Cont.)
  • 10. 고려대학교정보보호대학원 마스터 제목 스타일 편집 10  Also, a head of SANE(Security Analysis aNd Evaluation, 保安性分析評價) Lab. Prof. Dr. Seungjoo (Gabriel) Kim (Cont.) Ryan Beist Silverdel Jack2
  • 12. 고려대학교정보보호대학원 마스터 제목 스타일 편집 12  In Korea, cyber warfare has become real, not a virtual one. North Korea continues to expand its cyber warfare capabilities.  South Korean National Intelligence Service (NIS, Korean CIA) officially reported 75,472 cyber-attacks launched against the government and public agencies from 2010 until October 2014.  North Korea attempts millions of indiscriminate cyber-attack attempts on government agencies and private corporations in South Korea. Cyber Security Situation in KR
  • 13. 고려대학교정보보호대학원 마스터 제목 스타일 편집 13  Especially, five years ago, South Korea was hit by a computer virus that took over 20,000 computers and had them attack banks, television stations and its ministry of defense.  Korean government believes that North Korean General Bureau of Reconnaissance (偵察總局), specifically Unit 121, dedicates 6,000+ full-time hackers who create malicious computer codes.  1,700 experts and 5,100 supportive members Cyber Security Situation in KR (Cont.)
  • 14. 고려대학교정보보호대학원 마스터 제목 스타일 편집 14  To narrow the gap with the North, recently South Korean government has been devoting itself to raise more cyber security experts. Cyber Security Situation in KR (Cont.)
  • 16. 고려대학교정보보호대학원 마스터 제목 스타일 편집 16  Blue House National Security Office (國家安保室) as Control Tower  NIS (National Intelligence Service (Korean CIA), 國家情報院) for Public Sector  NSR (National Security Research Institute) for Technical Support  MSIP (Ministry of Science, ICT & Future Planning, 未來創造科學部) for Private Sector  KISA (Korea Internet & Security Agency) for Technical Support  Cyber Security Research Division of ETRI (Electronics and Telecommunications Research Institute) for Development of Fundamental Security Technologies  KCC (Korea Communications Commission, 放送通信 委員會) for the Citizens’ Personal Information Protection Cyber Security Related Government
  • 17. 고려대학교정보보호대학원 마스터 제목 스타일 편집 17  MOI (Ministry of the Interior, 行政自治部) for E- Gov.  FSC (Financial Services Commission, 金融委員會) & FSS (Financial Supervisory Service, 金融監督院) for Financial Sector  FSI (Financial Security Institute) for Technical Support  MOD (Ministry of Defense, 國防部) & Cyber Command for Military Sector  ADD (Agency for Defense Development) for Technical Support  SPO (Supreme Prosecutors' Office, 大檢察廳) & NPA (National Police Agency, 警察廳) for Cyber Crime Cyber Security Related Government
  • 18. 고려대학교정보보호대학원 마스터 제목 스타일 편집 18 Non-Profit Private Organizations
  • 19. 고려대학교정보보호대학원 마스터 제목 스타일 편집 19  NISA (National Information Security Alliance, 2002)  KIISC (Korea Institute of Information Security & Cryptology, 1990.12.) for Promoting Academic Research (e.g., ICISC, WISA, etc.)  www.kiisc.or.kr  KCSA (Korea Convergence Security Association, 2001)  www.kocosa.org  KISIA (Korea Information Security Industry Association, 1997.7.) as Representative Body for 157+ Information Security Companies  www.kisia.or.kr  CONCERT (CONsortium of Computer Emergency Response Teams, 1996)  www.concert.or.kr Non-Profit Private Organizations
  • 20. 고려대학교정보보호대학원 마스터 제목 스타일 편집 20  Korea Council of Chief Information Security Officers (2009)  www.cisokorea.org  OPA (Korea Online Privacy Association, 2011)  www.opa.or.kr  KCPPI (The Korean Council on the Protection of Personal Information, 2010)  www.kcppi.or.kr  Korea Chief Privacy Officers' FORUM (2007)  www.cpoforum.or.kr  HARU (HAckers’ Re-Union, 2011)  www.h4ru.com Non-Profit Private Organizations
  • 21. 고려대학교정보보호대학원 마스터 제목 스타일 편집 21 Regular School Education (Universities & Colleges)
  • 22. 고려대학교정보보호대학원 마스터 제목 스타일 편집 22  # of Departments of Undergraduate schools to offer cyber security programs of study : 36 (increased 28.6% from year-ago)  # of Undergraduate Students on the register : 5,701 (increased 15.8% from year-ago)  # of Departments of Graduate schools to offer cyber security programs of study : 32  # of Graduate Students on the register : 1,241 (increased 24.6% from year-ago) Universities (in 2014)
  • 23. 고려대학교정보보호대학원 마스터 제목 스타일 편집 23  Since Joongbu Univ. established the first cyber security undergraduate program in 1996, it has been growing quickly every year.  Recently, joint educational programs with security companies are on the increase.  Full Scholarship over Guaranteed Employment Universities (in 2014) (Cont.)
  • 24. 고려대학교정보보호대학원 마스터 제목 스타일 편집 24  # of Departments of Colleges to offer cyber security programs of study : 8  # of students on the register : 568 (increased 34.6% from year-ago) Colleges (in 2014)
  • 25. 고려대학교정보보호대학원 마스터 제목 스타일 편집 25  Established in 2012  In 2016, we will graduate 30 students for the first time.  Joint educational programs with Korea Army (Cyber Command)  Full Scholarship over Guaranteed Employment  Upon graduation, they are to be commissioned as second lieutenants and must serve in the military for seven years  Accept top 1% of students in the national college entrance exam Dept. of CYDF @ Korea Univ.
  • 26. 고려대학교정보보호대학원 마스터 제목 스타일 편집 26  Inspired by Israel's Talpiot program  “Talpiot” means “best of the best” in Hebrew  Israel set up the Talpiot program in 1979 to train the nation's most promising high- school graduates to become technological innovators for the military  Members of program, called “Talpions”, spend 3 years in study, followed by 6 years of military service focused on improving the Israeli military's technological edge rather than serving in combat units  Giving financial support for start-ups Dept. of CYDF @ Korea Univ. (Cont.)
  • 27. 고려대학교정보보호대학원 마스터 제목 스타일 편집 27  Curriculum deals with :  Cryptology & Steganography  Cyberlaw  Cyberpsychology  Hacking  Digital forensics  Information assurance  Basic military studies, etc  Also embedded some programs in the curriculum to inculcate students with patriotism and a strong work ethic Dept. of CYDF @ Korea Univ. (Cont.)
  • 28. 고려대학교정보보호대학원 마스터 제목 스타일 편집 28  In 2015, "DEFKOR," the team comprised of 8 students from Dept. of CYDF at Korea University and 3 from Korea-based IT security solution provider Raonsecure, and 2 Korean students studying in the U.S. won the TOP prize at the DEFCON CTF 23!  In this year, 4,000+ teams qualified, 15 teams made finalists! Dept. of CYDF @ Korea Univ. (Cont.)
  • 29. 고려대학교정보보호대학원 마스터 제목 스타일 편집 29 Other (Non-Regular) Education Programs
  • 30. 고려대학교정보보호대학원 마스터 제목 스타일 편집 30  Public Sector & Government-Run Cyber Security Education Programs  Education and Training for Public Officers  NSR’s CSTEC, KIA Academy  Education and Training for Non-Officers  KISA’s K-Shield, KITRI’s BoB, KISA’s Online Information Security Training Lab., ITRC  Private Sector-Run Cyber Security Education Programs  In 2014, 25 private cyber security training institutes Other Education Programs
  • 31. 고려대학교정보보호대학원 마스터 제목 스타일 편집 31  CSTEC (Cyber Security Training and Exercise Center)  Opened at Daejeon, Oct. 2014.  Organized by NSR (National Security Research Institute)  KISA Academy  Opened at Seoul, May 2009.  Organized by KISA (Korea Internet & Security Agency) Public Programs for Public Officers
  • 32. 고려대학교정보보호대학원 마스터 제목 스타일 편집 32  K-Shield  Since 2013.  Organized by KISA  Aimed at : Raising very highly skilled cyber security experts  Until 2017, plan to produce 5,000 certified experts  Applicant’s requirement : Security staffs in public or private sector Public Programs for Non-Officers
  • 33. 고려대학교정보보호대학원 마스터 제목 스타일 편집 33  BoB (Best of the Best)  Since 2012.  Organized by KITRI (Korea Information Technology Research Institute)  Aimed at : Raising very highly skilled cyber security experts  Running strong peer-to-peer mentoring program for professional development.  Mentors : Almost all members of HARU, Other well- known security experts, etc.  Applicant’s requirement : Students (high school, undergraduate and graduate) Public Programs for Non-Officers
  • 34. 고려대학교정보보호대학원 마스터 제목 스타일 편집 34  BoB (Best of the Best)  Courses :  About 8 month course  Survival program  The final 6 students will get around $17,000 each  1st Semester : Learning about information security (crypto, network, OS, ethics and so on) from professionals  2nd Semester : Projects with mentors  3rd Semester : Advanced researches Public Programs for Non-Officers
  • 35. 고려대학교정보보호대학원 마스터 제목 스타일 편집 35  BoB (Best of the Best)  Among 13 DEFKOR members, 10 are from BoB students(8) or mentors(2)! Public Programs for Non-Officers
  • 36. 고려대학교정보보호대학원 마스터 제목 스타일 편집 36  Online Information Security Training Lab.  Since 2001.  Organized by KISA  www.sis.or.kr Public Programs for Non-Officers
  • 37. 고려대학교정보보호대학원 마스터 제목 스타일 편집 37  ITRC (University Information Technology Research Center)  Since 2000.  Supported by the MSIP (Ministry of Science, ICT & Future Planning)  During 2000~2014, KRW 415.72 billion (= USD 363,709,536.31 = JPY 43,699,740,358.03) was funded (121 centers of 45 universities) for the enhancement of IT research capabilities of universities  Including ITRC for cyber security field Public Programs for Non-Officers
  • 39. 고려대학교정보보호대학원 마스터 제목 스타일 편집 39  At school, lots of information security clubs in Korea  Since 2006, KISA & MSIP have been encouraging and supporting security clubs at universities  In 2014, 45 clubs are selected & supported  Awards and Money  Some clubs are famous at the world class CTFs  CyKor (Korea Univ.), GoN (KAIST), PLUS (Postech) University Clubs of Information Security
  • 40. 고려대학교정보보호대학원 마스터 제목 스타일 편집 40 Hacking Contests/Conferences
  • 41. 고려대학교정보보호대학원 마스터 제목 스타일 편집 41  10+ hacking contests/conferences per year  International  SECUINSIDE by HARU, Korea Univ., KISA(MSIP), NSR(NIS), and KOSCOM  CODEGATE by SOFTFORUM and KISA(MSIP)  POC (Power Of Community) by HNS company  Domestic  HDCON (Hacking Defence CONtest) by KISA(MSIP)  White-Hat Hacker Contest by Ministry of Defense and the NIS  FISCON (Financial Information Security CONference) by FSI(FSS)  INC0GNITO by 10 University Security Clubs Hacking Contests/Conferences
  • 42. 고려대학교정보보호대학원 마스터 제목 스타일 편집 42  Since 2011.  Hosted by HARU, Korea Univ., KISA(MSIP), NSR(NIS), and KOSCOM  SECUINSIDE CTF winners are pre- qualified for DEFCON CTF  From 2015, they began Pwn2Own contest (named as 'Capture The Bug') for the first time in Korea  www.secuinside.com SECUINSIDE
  • 43. 고려대학교정보보호대학원 마스터 제목 스타일 편집 43  Since 2008.  Hosted by SOFTFORUM and KISA(MSIP)  The first international hacking contests/conferences in Korea  CODEGATE CTF winners are pre-qualified for DEFCON CTF  www.codegate.org CODEGATE
  • 44. 고려대학교정보보호대학원 마스터 제목 스타일 편집 44  Since 2004.  Hosted by KISA(MSIP)  The oldest hacking contests/conferences in Korea HDCON
  • 45. 고려대학교정보보호대학원 마스터 제목 스타일 편집 45  Korea is probably most activated infosec country in East Asia! However, we should move …  From quantitative growth to qualitative growth  Can get a good job after graduation  From information security-oriented education to information assurance- oriented education  (e.g.) U.S.’s NIAETP (National Information Assurance Education and Training Program) Conclusions & Future Works
  • 46. 고려대학교정보보호대학원 마스터 제목 스타일 편집 46 [Note] Information Assurance
  • 47. 고려대학교정보보호대학원 마스터 제목 스타일 편집 47  Computer Security Era (the early 1960s ~)  Information Security Era (the 1980s ~)  Information Assurance Era (1998 ~) [Note] Information Assurance
  • 48. 고려대학교정보보호대학원 마스터 제목 스타일 편집 48  Originated in the U.S. DoD in the late 1990's.  IA is more than just IS! [Note] Information Assurance (Source : Algirdas Avizÿ ienis et al., "Fundamental Concepts of Dependability", UCLA CSD Report no. 010028)
  • 49. 고려대학교정보보호대학원 마스터 제목 스타일 편집 고려대학교정보보호대학원CODEBLUE2015@Tokyo,Japan How South Korea Invests in Human Capital for Cyber-Security This research was supported by the MSIP(Ministry of Science, ICT and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2015-R0992-15-1006) supervised by the IITP(Institute for Information & communications Technology Promotion)