1 |
ISO 28000:2007, http://www.iso.org/iso/catalogue_detail?csnumber=44641, ISO
|
2 |
Raul Roldan, http://www.zdnet.com/article/fbi-counterfeit-cisco-routers-risk-it-subversion/, ZDNET, 2008.
|
3 |
Andover Test for Real/Fake Cisco, http://www.andovercg.com/services/cisco-counterfeit-wic-1dsu-t1.shtml, Andover.
|
4 |
Zeriva Anti-Counterfeit Process, http://www.zeriva.com/cisco-refurb/refurb-process/zerivaanti-counterfeit-process/, Zeriva.
|
5 |
Dept. of Homeland Security. https://www.dhs.gov/, US Government.
|
6 |
Robert McMillan, http://www.infoworld.com/article/2650800/security/seagate-ships-virus-laden-hard-drives.html, Infoworld, 2007.
|
7 |
Michael Lee, http://www.zdnet.com/article/aldi-sells-hard-drives-with-malware-inside/, ZDNET, 2011.
|
8 |
Darren Pauli, http://www.crn.com.au/news/aldi-recalls-conficker-infected-hard-drives-265264, CRN, 2011.
|
9 |
Virus Bulletin, https://www.virusbulletin.com/blog/2008/04/hp-ships-infected-usb-keys, Virus Bulletin, 2008.
|
10 |
HP 고객지원센터, http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_nac01404119, HP, 2008.
|
11 |
Anonymous, http://blog.irreverence.co.uk/?p=509, 2008.
|
12 |
Associated Press, https://www.theguardian.com/technology/2012/sep/14/malware-installed-computers-factories-microsoft, TheGuardian, 2012.
|
13 |
정병호, "기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구," 디지털산업정보학회 논문지, 제12권, 제2호, pp. 73-86.
|
14 |
Robert Charette, http://spectrum.ieee.org/riskfactor/computing/it/thumb_drive_security _peril_at, IEEE Spectrum, 2008.
|
15 |
성상훈, http://www.ittoday.co.kr/news/articleView.html?idxno=58403, 아이티투데이, 2015.
|
16 |
Swati Khandelwal, http://thehackernews.com/2016/09/xiaomi-android-backdoor.html, The Hacker News, 2016.
|
17 |
김정은, 김성준, "정보보호관리체계(ISMS)를 이용한 중소기업 기술보호 개선방안 연구," 디지털 산업정보학회 논문지, 제12권, 제3호, pp. 33-54.
|