References
- M. G. Kang and S. S. Kim, "Design and Implementation of Security Solution Structure to Enhance Inside Security in Enterprise Security Management System," Journal of the Korea Contents Association, vol. 5, no. 6, pp. 360-367, Dec. 2005.
- K. Y. Kim, S. W. Lee, and J. H. Kim, "A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure," Journal of the Institute of Electronics Engineers of Korea, vol. 50, no. 2, pp. 60-69, Feb. 2013. https://doi.org/10.5573/ieek.2013.50.2.060
- Y. J. Kim, S. Y. Lee, H. Y. Kwon, and J. I. Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Journal of the Korea Institute of Information Security and Cryptology, vol. 19, no. 1, pp. 103-111, Feb. 2009.
- KISA, "A Manual of Establishing and Managing a CERT," KISA Guide, no. 2010-13, Jan. 2010.
- Y. T. Kim, O. J. Kwon, J. M. Lee, and T. S. Kim, "Implementation and Design of Policy Based Security System for Integration Management," Journal of the Korea Multimedia Society, vol. 10, no. 8, pp. 1052-1059, Aug. 2007.
- G. J. Mun, Y. M. Kim, and B. N. Noh "A Performance Comparison of Network Attacks based on Selecting Statistical Criterion," Review of KIISC, vol. 19, no. 2, pp. 16-25, Apr. 2009.
- G. H. Lee and C. G. Lee, "A Risk Evaluation and Real-time Alert Alarm Generation for Responding Cyber Attacks in the Cyber Environment," Review of KIISC, vol. 18, no. 5, pp. 112-124, Oct. 2008.
- J. H. Yoo, J. H. Kim, G. R. Kim, and J. C. Na, "A Standardization Status of the Integrated Security Management and Cyber Trace Technologies," TTA Journal, no. 118, Aug. 2008.
- Cisco, "Integrated Security Architecture Framework," White paper.
- J. C. Ahn, "A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-base Security Policy," Journal of the Korea Institute of Information Security and Cryptology, vol. 14, no. 6 pp. 91-103, Dec. 2004.
- H. H. Choi and T. M. Chung, "Study on Generalization of Security Policies for Enterprise Security Management System," The KIPS Transactions, vol. 9, no. 6, pp. 823-830, Aug. 2002. https://doi.org/10.3745/KIPSTC.2002.9C.6.823
- J. D. Kim, K. W. Kim, and Y. D. Lee, "The Concept and Approach of Convergence Security," Review of KIISC, vol. 19, no. 6, pp. 68-74, Dec. 2009.
- W. S. Seo and M. S. Jun, "A Study on Building an Optimized Defense System According to the Application of Integrated Security Policy Algorithm," Journal of the Korea Institute of Information Security and Cryptology, vol. 21, no. 4, pp. 39-46, Aug. 2011.
- W. S. Jang, J. Y. Choi, and J. I. Lim, "A study on method of setting up the defense integrated security system," Journal of the Korea Institute of Information Security and Cryptology, vol. 22, no. 3, pp. 575-584, Jun. 2012.
Cited by
- The rating model of corporate information for economic security activities pp.1743-4645, 2019, https://doi.org/10.1057/s41284-019-00171-z