참고문헌
- Date Breach QuickView: An Executive's Guide to Data Breach Trends in 2012, Risk Based Security, Inc., February 2013.
- H. Susanto, M. N. Almunawar and Y. C. Tuan, "Information Security Management System Standards: A Comparative Study of the Big Five", International Journal of Electrical & Computer Sciences, 11(5), pp. 23-29, October 2011.
- 조희준, IT 거버넌스 프레임워크 코빗 - COBIT 4.1을 중심으로, 인포더북스, 2010.
- R. Sheikhpour and N. Modiri, "An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls", International Journal of Security and Its Applications, 6(2), pp. 13-28, April 2012.
- T. Mataracioglu and S. Ozkan, "Governing Information Security in Conjuction with COBIT and ISO 27001", Computing Research Repository, 2011, http://arxiv.org/abs/1108.2150
- COBIT 4.1, IT Governance Institute, 2007, www.isaca.org
- ISO/IEC 27002:2005 Information Technology - Security Techniques - Code of practice for information security management, ISO/IEC, Switzerland, 2005.
- ISO/IEC 27001:2005 Information Technology - Security Techniques - Information security management systems - Requirements, ISO/IEC, Switzerland, 2005.
- Aligning CobiT(R) 4.1, ITIL(R) V3 and ISO/IEC 27002 for Business Benefit, IT Governance Institute, 2008.
- COBIT(R) 5 for Information Security, ISACA, 2012.
- B. von Solms, "Information Security governance: COBIT or ISO 17799 or both?", Computers & Security, 24(2), pp. 99-104, March 2005. https://doi.org/10.1016/j.cose.2005.02.002
- ISO/IEC FDIS 27001 Information technology - Security techniques - Information security management systems - Requirements, ISO/IEC, 2013, http://www.iso.org/