A Study for Limitations and Improvement of Information Security Management System
![]() |
Lee, Sujin
(Korea Institute of Science and Technology Information)
Choi, Sang-Yong (Korea Advanced Institute of Science and Technology) Kim, JaeKyoung (Korea Institute of Science and Technology Information) Oh, ChungShick (Korea Institute of Science and Technology Information) Seo, Changho (Kongju National University) |
1 | Park Daewoo, "A study for problems of management security from National Agricultural Cooperative Federation case", KIECS Spring Annual Conference, 2011, 5.1: 25-28. |
2 | Hauri, "Malicious code analysis report about nateon hacking", August, 2011. |
3 | Graham Cluley, "DarkSeoul: Sophos-Labs identifies malware used in South Korean internet attack,", March, 2013. |
4 | ASEC, "detailed Aanlysis for malicious code used 6.25 DDoS attacks", June, 2013 |
5 | KENNING, M. J., "Security management standard -iso 17799/bs 7799", BT Technology Journal, 2001, 19.3: 132-136. DOI |
6 | CALDER, Alan; WATKINS, Steve. IT Governanace: A Manager's Guide to Data Security and ISO27001/ISO 27002. 2008. |
7 | "Information Security Management System(ISMS)", http://blog.naver.com/p1ngp1ng?Redirect-Log&logNo=120040448210 |
8 | KISA, "Manual for G-ISMS cretification", KISA, May, 2011 |
9 | "PIMS(Personal Information management System)", http://privacy.naver.com/80116523634 |
10 | KISA, "Diagnosis manual for personal information security management", KISA, July, 2013 |
![]() |