참고문헌
- Herndon, Va. Ponemon Institute Discovers Majority of Business Leaders Underestimate Risk of Advanced Cyber Threats. http://www.prnewswire.com/news-releases
- Trend Micro Inc., "Spear-Phishing Email: Most Favored APT Attack Bait", Trend Micro Incorporated Research Paper, 2012
- Larry Seltzer. How the RSA SecurID Hack Worked. http://www.pcmag.com/article2/0,2817,2382970,00.asp
- FireEye, Inc. "Spear Phishing Attacks Why They are Successful and How to Stop Them", White Paper, 2012
- John H.Sawyer. How Attackers Target and Exploit Social Networking Users. http://www.darkreading.com/end-user/how-attakers-target-and-exploit-social/240160011
- IBM Software Thought Leadership, "Proactive response to today's advanced persistent threats", White Paper, 2013
- Cyveillance, (August 2010). Malware Detection Rates for Leading AV Solutions. http://www.cyveillance.com/web/
- Patrik Runald. What is Scaring Business the Most? Spear-phishing. http://community.websense.com/blogs/we bsense-insights/archive/2012/10/08/what-is-scaring-business-the-most-spear-phishing.aspx
- Dave Shackleford. Social engineering penetration testing: Four effective techniques. http://searchsecurity.techtarget.com/tip/Social-engineering-penetration-testing-Four-effective-techniques
- AhnLab Inc. TrusWatcher Brochure. http://download.ahnlab.com/kr/site/brochure/TrusWatcher_Brochure.pdf
- Trend Micro Inc. Deep Scan Brochure. http://www.trendmicro.co.kr/cloud-content/kr/pdfs/business/datasheets/deepscan.pdf
- FireEye Inc. Email Malware Protection System Brochure. http://www.fireeye.com/ko/resources/pdfs/fireeye-email-malware-protection.pdf
- Websense Inc. TRITON Web Security Gateway Anywhere. http://www.websense.com/assets/reports/websense-miercom-report.pdf
- Micor Plus Co. Symantec Endpoint Protection 12. http://www.mplsoft.co.kr/entry/
- Arun Vishwanath, Tejaswini Herath, Rui Chen, Jingguo Wang, H.Raghav Rao, "Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model", Decision Support System 51, pp. 576-586, 2011 https://doi.org/10.1016/j.dss.2011.03.002
- Boannews Inc. The shadow of Webshell behind hacking incident. http://www.boannews.com/media/view.asp?idx=37444
- Bimal Parmar, "Protecting against spear-phishing", Computer Fraud & Security, pp. 8-11, Jan. 2012
- Tracey Caldwell, "Spear-phishing: how to spot and mitigate the menace", Computer Fraud & Security, pp. 11-16, Jan. 2013
- Rebecca Greenfield. How to Avoid Getting Spear Phished by China's Hackers Who Cracked Apple. http://www.theatlanticwire.com/technology/2013/02/spear-phishing-security-advice/62304/
- Yu-seung Sohn, Kil-hyun Nam, Seung-chul Goh, "A spear phishing threat and the prevention method for the end user", KIICE Conference in Mokpo, May, 2013.