1 |
Jang-gyun Lee, "Let's build a system for monitoring of cyber terrorism" Hyundai Research Institute, Pending issue Reference, 2009.
|
2 |
KISA, 2013 National Information Security Whitepaper, 2013.
|
3 |
Ministry of National Defense, 2012 Military Whitepaper, ch. 6, pp. 136-140, 2013.
|
4 |
Telecommunications Technology Association. [Internet]. Available: http://word.tta.or.kr.
|
5 |
Kyoung-yun Ahn, "Design of Digital Forensics Control System based on ISMS Control Item," M.S. dissertation, Dongguk University, Seoul, 2011.
|
6 |
KISA, ISMS certification system guidebook v0.8, ch. 1, pp. 5, 2013.
|
7 |
Sang-soo Jang, "The effects of the operation of an information security management system on the performance of information security," Ph.D. dissertation, Chonnam University, Gwangju, 2011.
|
8 |
Dong-hee Park, "Probems of the Security Regulation and Improvement Measures," M.S. dissertation, Kyonggi University, Suwon, 2011.
|
9 |
S. S. Jang, B. N. Noh, and S. J. Lee, "The Effects of the Operation of an Information Security Management System on the Performance of Information Security," Journal of Korean Institue of Information Scientists and Engineers, vol. 40, no. 1, pp. 58-69, Feb. 2013.
과학기술학회마을
|
10 |
Hee-joon Cho, IT Governance Framework COBIT, ch. 2, pp. 41-46, 2010.
|
11 |
Seung-Han Ryu and Dae-Ryeong Jeong and Hoe-Kyung Jun, "Ways to establish public authorities information security governance utilizing E-government information security management system(G-ISMS)," Journal of KIICE, vol.17, no.4, pp.769-774, April 2013.
|