Browse > Article

사회공학적 공격방법을 통한 개인정보의 유출기술 및 대응방안 분석  

최양서 (한국전자통신연구원 네트워크보안구조연구팀)
서동일 (한국전자통신연구원 네트워크보안구조연구팀)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 terms, http://www.termscokr/spyware.htm
2 NISR. 'The Pharming Guide', NGS Software Ltd., 2005
3 'Proposed Solutions to Address the Threat of Email Spoofing Scams', The Anti-Phishing Working Group, Dec. 2003
4 Gunter Ollmann, 'URL Encoded Attacks', 2002
5 인터넷침해사고대응지원센터, '피싱 사이트 악용 서버 분석 사례', KISA, 2005
6 The Open Web Application Security Project(OWASP) Foundation, http://www.owasp.org/
7 Gunter Ollmann, 'Security Best Practice: Host Naming and URL Conventions', 2005
8 Danny Allan, 'Identity Theft, Phishing and harming: Accountability & Responsibilities', OWASP AppSec, Oct. 2005
9 NORAD(The North American Aerospace Defense Command), http://www.norad.mil
10 Anti-Phishing Working Group, http://www.antiphishing.org/
11 Joe Stewart, 'DNS Cache Poisoning - The Next Generation', 2003
12 NISR, 'The Phishing Guide', NGS Software Ltd., 2004
13 APWG, 'Phishing Activity Trends Report', Nov. 2005
14 한국정보호호진흥원, '인터넷 침해사고 동향 및 분석 월보 2005년 12월', 2005. 1
15 Steven Musil, 'ISP Panix over domain hijack', CNET News.com, Jan 17, 2005
16 'Anti-Phishing Best Practices for Institutions and Consumers', McAfee, March 2004
17 인터넷침해사고대응지원센터, 'SPAM BOT을 이용한 Phishing SPAM 발송 시스템 보고서', KISA, 2005