1 |
Pilyong Kang, "Security Risk Evaluation Scheme for Effective Threat Management", Journal of KIISE:Information Networking", Vo.36, No.5, pp.380-386, 2009
|
2 |
S. Drew, "Reducing Enterprise Risk with Effective Threat Management," Information Systems Security, vol.13, Jan. 2005, pp.37-42.
DOI
|
3 |
G. Stonebumer, A. Goguen, and A. Feringa, "RiskManagement Guide for Information Technology Systems," NIST SP 800-30, NIST, 2002
|
4 |
DHS Security in the Software 라이프사이클, 2006
|
5 |
ISO/IEC 27036:Information Security for supplier relationships
|
6 |
ISA Security Compliance Institute(ISCI), Security Development 라이프사이클 assurance, 2013
|
7 |
Keun-Ho Lee, "Analysis of Threats Factor in IT Convergence Security", Journal of the Korea Convergence Society, Vol.1, No.1, pp. 49-55, 2010
|
8 |
Keun-Ho Lee, "A Security Threats in Wireless Charger Systems in M2M", Journal of the Korea Convergence Society, Vol.4, No.1, pp. 1-5, 2013
|
9 |
Education Course of Information Security Pre-inspection, KISA, 2013.10.21-2013.10.23
|