Digital Library
Search: "[ author: 홍순좌 ]" (8)
A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation
홍순좌,
최영한,
강정민,
박한진,
Vol. 30, No. 6, pp. 1167-1187,
Dec.
2020
10.13089/JKIISC.2020.30.6.1167
Keywords: Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R, Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R
10.13089/JKIISC.2020.30.6.1167
Keywords: Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R, Cybersecurity Competency, AMCJT, CtrJC, CtrJC-R
Design and Implementation of Cyber Range for Cyber Defense Exercise Based on Cyber Crisis Alert
최영한,
장인숙,
황인택,
김태균,
홍순좌,
박인성,
양진석,
권영재,
강정민,
Vol. 30, No. 5, pp. 805-821,
Oct.
2020
10.13089/JKIISC.2020.30.5.805
Keywords: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training
10.13089/JKIISC.2020.30.5.805
Keywords: Cyber defense exercise, Cyber Security Training, Cyber defense exercise, Cyber Security Training
A Study on the Laws and Regulations in Korea through the Analysis of Cybersecurity Workforce Developing Laws and Regulations in U.S.
Soonjwa Hong,
Joonsoo Kim,
Vol. 30, No. 1, pp. 123-139,
Feb.
2020
10.13089/JKIISC.2020.30.1.123
Keywords: Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act, Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act
10.13089/JKIISC.2020.30.1.123
Keywords: Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act, Computer Security Act, FISMA 2002&2014, Federal Cybersecurity Workforce Assessment Act
A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S.
Soonjwa Hong,
Vol. 28, No. 1, pp. 249-267,
Feb.
2018
10.13089/JKIISC.2018.28.1.249
Keywords: ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training, ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training
10.13089/JKIISC.2018.28.1.249
Keywords: ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training, ATE, NICE, FISMA, Cybersecurity Act, CSSIA, CSEC, NCC, CWW, ACE, Cybersecurity Training
Software Security Testing using Block-based File Fault Injection
Young-Han Choi,
Hyoung-Chun Kim,
Soon-Jwa Hong,
Vol. 17, No. 4, pp. 3-10,
Aug.
2007
10.13089/JKIISC.2007.17.4.3
Keywords: Software Testing, fault injection, file fuzzing
10.13089/JKIISC.2007.17.4.3
Keywords: Software Testing, fault injection, file fuzzing
A Design and Implementation of ROAD(RPC Object vulnerability Automatic Detector)
Jin-Seok Yang,
Tae-Ghyoon Kim,
Hyoung-Chun Kim,
Soon-Jwa Hong,
Vol. 17, No. 2, pp. 51-60,
Apr.
2007
10.13089/JKIISC.2007.17.2.51
Keywords: Software Testing, Fuzzing, Fuzzer, RPC, Windows XP SP2, Vulnerability
10.13089/JKIISC.2007.17.2.51
Keywords: Software Testing, Fuzzing, Fuzzer, RPC, Windows XP SP2, Vulnerability
The Study on the Effective Prevention Mechanism of Masquerade Attacks on Wireless Ad hoc Network
Soon-Jwa Hong,
Hyun-Dong Park,
Vol. 16, No. 6, pp. 135-150,
Dec.
2006
10.13089/JKIISC.2006.16.6.135
Keywords: ad hoc network, wireless network, survivability, masquerade packet attack
10.13089/JKIISC.2006.16.6.135
Keywords: ad hoc network, wireless network, survivability, masquerade packet attack
On Design of the Recoverable Cryptosystem in Public Key Infrastructure
,
,
,
,
Vol. 12, No. 1, pp. 11-20,
Feb.
2002
10.13089/JKIISC.2002.12.1.11
Keywords: auto-recovery auto-cerificate cryptosystem, RSA, software key escrow
10.13089/JKIISC.2002.12.1.11
Keywords: auto-recovery auto-cerificate cryptosystem, RSA, software key escrow