Browse > Article

미국 정부의 사이버 공격에 대한 보안 전략  

Lee, Dongbum (순천향대학교 정보보호학과 정보보호응용및보증연구실)
Kwak, Jin (순천향대학교 정보보호학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.nsa.gov/academia/nat_cae_cyber_ops/
2 http://www.dhs.gov/our-mission
3 http://www.dhs.gov/office-cybersecurity-and-com munications
4 https://www.dhs.gov/about-national-cybersecurity -communications-integration-center
5 http://www.fbi.gov/about-us/investigate/
6 http://www.fbi.gov/about-us/investigate/cyber/ncijtf
7 http://www.fbi.gov/about-us/investigate/cyber/cyb er-task-forces-building-alliances-to-improve-the-n ations-cybersecurity-1
8 http://www.fbi.gov/news/stories/2008/march/cybergroup_ 031708
9 http://www.fbi.gov/news/stories/2006/march/cats0 30606
10 http://www.reuters.com/article/2011/08/03//us-cyberattacks- idUSTRE7720HU20110803
11 http://www.foreignaffairs.com/articles/66552/william- j-lynn-iii/defending-a-new-domain
12 http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm
13 http://www.reuters.com/article/2012/02/09/21/us-i ran-cyberattacks-idUSBRE88K12H20120921
14 http://www.fiercetelecom.com/story/att-reports-dd os-attack-its-dns-servers/2012-08-16?utm_mediu m=nl&utm_source=internal
15 http://www.zdnet.com/u-s-power-plants-combat-usb-malware-infections-7000009871/
16 http://online.wsj.com/article/SB100014241278873 23926104578276202952260718.html?mod=WSJ ASIA_hpp_LEFTTopWhatNews
17 http://news.cnet.com/8301-1009_3-57567831-83/c hinese-still-hacking-us-says-wall-street-journal-o wner/
18 http://bits.blogs.nytimes.com/2013/02/01/twitter-h acked-data-for-250000-users-stolen/
19 http://bits.blogs.nytimes.com/2013/02/15/facebook- admits-it-was-hacked/
20 http://bits.blogs.nytimes.com/2013/02/19/apple- computers-hit-by-sophisticated-cyberattack/
21 http://www.networkworld.com/news/2013/020613 -us-federal-reserve-admits-to-266472.html?source =nww_rss
22 http://us.gizmodo.com/5981998/the-federal-reserve- said-it-was-hacked
23 http://www.computerworld.com/s/article/9235721/ MIT_to_probe_its_role_in_Aaron_Swartz_suicide
24 http://www.defense.gov/home/features/2010/0410 _cybersec/docs/USCC_Trifold-v13.pdf
25 http://www.defense.gov/news/d20110714cyber. pdf
26 http://www.washingtonpost.com/world/national-se curity/pentagon-to-boost-cybersecurity-force/2013 /01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_ story.html
27 http://www.dc3.mil/
28 http://www.nsa.gov/
29 http://news.cnet.com/8301-1023_3-57560644-93/r evealed-nsa-targeting-domestic-computer-systems -insecret-test
30 http://www.verizonenterprise.com/resou rces/reports/es_data-breach-investigations-report- 2012_en_xg.pdf
31 http://www.mcafee.com/us/resources/white-papers/ wp-protecting-critical-assets.pdf
32 Tankard, Colin. "Advanced Persistent threats and how to monitor and deter them" Network security 2011.8 pp.16-19, 2011.
33 de Vries, J. A., et al. "An analysis framework to aid in designing advanced persistent threat detection systems" 2012.
34 http://www.mcafee.com/us/resources/white-papers/ wp-operation-shady-rat.pdf
35 Koch, R., Golling, M., Dreo, G., "Attracting Sophisticated Attacks to Secure Systems:A new Honeypot Architecture", Communications and Network Security (CNS), 2013 IEEE Conference on, pp. 409 - 410, 14-16 Oct. 2013.
36 http://blogs.mcafee.com/archive/global-energy-industry- hit-in-night-dragon-attacks
37 Bill M., Dale R., "A survey SCADA of and critical infrastructure incidents", RIIT '12 Proceedings of the 1st Annual conference on Research in information technology, pp. 51-56, 2012.
38 http://spectrum.ieee.org/telecom/security/the-real-st ory-of-stuxnet