IT Security in South Korea

advertisement
IT Security in South Korea :
The Importance of Developing Knowledge and Skills
JaeDok Shim
International Programs Manager,
ICDL Korea, Korea Productivity Center
Intro to KPC | Brief history of KPC
1957
1967
1986
1998
2012
2015
Intro to KPC | What we do
 HRD Development & Training
ㆍTraining 140,000 people a year
ㆍBusiness and Soft skills
ㆍTraining employees of public services
ㆍe-learning/m-learning
 Productivity Researches
ㆍProductivity statistics
ㆍConsult government policies
ㆍNational productivity award
 Business consulting
ㆍBusiness, Production Innovation,
Customer Satisfaction, Convergence, Brand
sustainability
 Business indexes
ㆍNational Customer Satisfaction Index(NCSI), National
Brand Competitiveness Index(NBCI), Dow Jones
Sustainability Indexes(DJSI)
 Certify people to promote individual productivity
ㆍ15 qualifications in 4 different areas
ㆍPartnership with ECDL Foundation and Pearson
Intro to KPC | From Literacy to Competence
•
KPC, since its foundation in 1957, has played a pivotal role in increasing productivity of the
industries to promote the rapid growth of the national economy.
•
Over the last 20 years, KPC has contributed to boosting digital literacy in Korea through the
development of new certification programs for members of local enterprises, governments and
schools in order to enhance industrial advancement and self-development.
•
5 national authorized and endorsed IT qualifications have been administered and run by KPC. And
more than 7 million people got certified in certification programs of KPC.
Intro to KPC | From Literacy to Competence
ITQ (Information Technology
Qualification)
- Nationally authorized
certificate since 2002, around 6
million people have taken the
exam
- Word processing (Hangul, MS
Word), MS Excel, Access,
PowerPoint, Using Internet
ICDL (International Computer
Driving Licence)
- With more than 13 million
candidates participating in a
range of programs world widely
- Over 60 Korean universities
adopted ICDL as a required
certification.
GTQ (Graphic Technology
Qualification)
- Authorized certificate since
2009, implemented increasing
computer design skills
- Adobe PhotoShop, Illustrator
and Flash
ERP (Enterprise Resource
Planning) Information Manager
- Authorized certificate since 2009,
focused on boosting individual and
industrial productivity
- Accounting, Human Resource
management, Production
management, Logistics
TOPCIT(Test Of Practical
Competency in IT)
- Funded by Ministry of Science,
ICT, and future planning
- Testing IT foundational
competency required for
professionals to perform their jobs
in IT industry
Overview of ICDL Korea | ECDL / ICDL
13 Million + people worldwide have chosen ECDL / ICDL
...in 41 languages, across 150
countries, through a network of
over 24,000 test centres
ICDL Korea has been introducing
its programs to Korea since 2007.
Overview of ICDL Korea | Aims of ECDL Foundation
• Promote digital skills as the key enabler of effective use
of ICT
• Develop accessible, relevant, high-quality digital skills
certification programs
• Through National Operators, engage with private sector
and public sector (e.g. ministries of education)
• Operate in a way that supports our values of vendor
independence, quality, and social responsibility
Overview of ICDL Korea | What is ICDL/ECDL?
Digital
Literacy
Digital
Digital
Competence
Expertise
How do ICDL address IT security?
Starting point - security and safety should be embedded in the context of how technology is used.
Top-level module
objective
Specific module
goal
Deeper and more knowledge / skills above
those of “digital literacy”
• Not just awareness
• Focused conceptual knowledge
• Practical skills
Another Me, Doppelgänger
Anybody could be you with your data
Next Digital Literacy, IT Security | New wine in fresh wineskins
• Digital literacy not just about how to use technology, but how to use it safely in the era of
mobile communication
• ICDL embeds security in the context of its use (e.g. in Computer Essentials and Online
Essential).
• But may be necessary to have more focused interventions because of the importance of
the topic
• Also, the adverse effects of the internet and mobile should be dealt with IT Security
IT Security as a concern | Individuals
Actual Bank website
•
•
Phishing Bank website
Phishing site of Portal services, Pharming Scam
Malware and Spyware
IT Security as a concern | Individuals
•
•
Personal data Security
Digital Copyright
IT Security as a concern | Organisation
•
•
Customer Data Leak & Cyber Attack
Digital Code of Ethics
IT Security as a concern | Economy and Society
•
Cyberterrorism
IT Security | Purpose & Goals
“This module sets out concepts relating to the secure use of ICT in daily life and skills used to
maintain a secure network connection, use the Internet safely and securely, and manage data
and information appropriately. ”









Understand the importance of keeping information and data secure, and identify common data/privacy protection,
retention and control principles.
Recognize threats to personal security from identity theft and potential threats to data from using cloud computing.
Be able to use passwords and encryption to secure files and data.
Understand the threat of malware and be able to protect a computer, device or network from malware and address
malware attacks.
Recognize common network and wireless security types and be able to use personal firewalls and personal hotspots.
Protect a computer or device from unauthorized access and be able to safely manage and update passwords.
Use appropriate web browser settings and understand how to authenticate websites and browse the web securely.
Understand communication security issues that can arise from using e-mail, social networks, voice over Internet
protocol, instant messaging and mobile devices.
Back up and restore data to local and cloud storage locations and delete and dispose of data and devices securely.
IT Security | Syllabus Overview
• Key concepts relating to
information, data, physical security,
privacy, and identity theft
• Protecting networks and devices
from malware and unauthorised
access
• Network-specific security issues
• Secure Web and internet use,
including e-mail and IM
• Backing up, restoring, and
permanently removing data
IT Security | Design Principles for IT Security module
Empower, not just protect…
• Give individuals the knowledge and skills to make informed judgements
Secure and informed behaviour
• Responsible citizens, responsible knowledge workers
Skills and knowledge must be current and relevant
• Cloud, privacy, mobile
Learning-outcome focus
• What will I know? → Knowledge
• What will I be able to do? → Skills
IT Security | Developing the IT Security module
Review of the domain, and iterative development with subject matter expertise from
stakeholders including computer societies
Validation with broader stakeholder group of national operators and third-party providers
Development of:
• Syllabus [http://www.ecdl.org/media/ITSecurity1.pdf],
• Test specification
• Manual and automated tests
Ongoing review – Version 2.0 now release
IT Security | New criteria
AND…..
A new criterion that can accommodate another side of IT security should be included:
• Internet(Mobile) Addiction
• Internet Copyright
• Cyber Crime and Law
The Most Viewed SNS content
•
•
Employers look into SNS of future
employees.
New screening bar of job applicants
among HRD managers is SNS.
Profile
Friend list
Moral vaule
Interest on Job
0
10
20
30
40
50
60
70
Source: SaramIn
Digital Skills Education in Korea
•
•
•
•
Korea's IT education is recognized as
one of the best in the world in terms of IT
literacy.
Almost every elementary school has
extra curriculum activities of computer
and digital skills.
It is widely perceived among parents of
schoolchildren that IT or OA skills are
essential to work on school projects for
good grades in upper schools.
Young people are coming back to IT
training in order to align them with the IT
standards of employers before
graduating from college.
Evolving IT Education
• The Ministry of Science, ICT and Future Planning has decided to make computer software a
new subject to be taught from elementary to high school.
• ‘Information Ethics’ is one of the major topics of S/W education.
• The definition of IT literacy is changing and evolving in this brand new digital era.
http://www.gpjn.net/news/photo/201503/7907_13183_4513.jpg
Internet Ethics Qualification | Overview
IEQ Lv. 3
• Basic
• 40 mins
• 2 subjects
IEQ Lv. 2
• Intermediate
• 60 mins
• 6 subjects
• Internet Culture and Environment
• The adverse effect of an Internet – Addiction, Cyber crime
• Security of internet information and data – IT Security
• Theory of Education and consultation
• Education of internet use and new technology
• Protect/counterplan for an adverse effect
• Learning the use of internet in regards of new technologies
• Education and consultation (based on diagnosis)
IEQ Lv. 1
• Advanced level
for instructors
• 80 mins
• 8 subjects
Internet Ethics Qualification | Overview
Internet Ethics Mentor Officer, ROK Army
Internet Mentor Training
“Train up a child in the way he should go:
and when he is old, he will not depart from it”
Proverbs 22: 6 (KJV)
Download