1 |
J. H. Lee and H. Y. Kwon, "A Study on Human Vulnerability Factors of Companies : Through Spam Mail Simulation Training Experiments," The Journal of Korea Institute Of Information Security And Cryptology, vol. 29, no. 4, pp. 847-857, Aug. 2019.
DOI
|
2 |
S. Rose, O. Bor, S. Mit, and S. Con, "Zero Trust Architecture," National Institute of Standards and Technology Special Publication 800-207, Aug. 2020.
|
3 |
S. Bal, C. Cun, and P. Cer, "Five Steps To A Zero Trust Network : Zero Trust Is The Blueprint For Your Security Architecture," Forrester Research Report, Oct. 2018.
|
4 |
Korea Financial Information Service, Cyber-threat information and statistics [Internet]. Available: https://kpfis.or.kr/ko/major_biz/cyber_safety_oper/attack_info/notice_issue?articleSeq=1898.
|
5 |
M. H. Kim, The advent of the era of Zero Trust, Doubt and Investigate everything [Internet]. Available:http://www.itdaily.kr/news/articleView.html?idxno=95035.
|
6 |
S. W. Ha and H. J. Kim, "The Effects of User's Security Awareness on Password Security Behavior," The Journal of Digital Contents Society, vol. 14, no. 2, pp. 179-189, Jun. 2013.
DOI
|
7 |
H. G. Moon and S. C. Park, "Establishment of an integrated management system for diagnosing vulnerabilities to strengthen corporate security," The Journal of The Korean Institute of Communication Sciences, vol. 31, no. 5, pp. 39-45, Apr. 2014.
|
8 |
D. W. Kim. "Security threats from Remote work" Is your company safe? [Internet]. Available:http://www.aitimes.com/news/articleView.html?idxno=137844.
|
9 |
T. H. Kim and D. H. Won, "A Study on the Modeling of Internal Critical Information Leakage Detections and Security Monitoring," The Korean Institute of Information Scientists and Engineers, pp. 791-793, Dec. 2019.
|