1 |
KISA, '2006 정보시스템 해킹.바이러스 현황 및 대응,' pp. 5-6, 2006년 12월
|
2 |
ZDNet Korea, '해킹의 프로화 (명예보다 돈이 좋아),' http:;/www.zdnet.co.kr/ArticleView.asp?articejd =00000039131366, 2004년 11월
|
3 |
Sophos, 'Security threat report: 2009-State-sponsored cybercrime,' p. 13, Dec. 2008
|
4 |
G. Conti, 'Countering Denial of Information Attacks,' Blackhat 2005 & Defcon 13, http://www.defcon.org/html/defcon-13/dc13- speakers.html#Conti, July 2005
|
5 |
G. Conti and M. Ahamad, 'A Framework for Countering Denial of Information Attacks,' IEEE Security & Privacy November/December 2005, vol. 5, no. 6, pp. 50-56, Nov. 2005
|
6 |
H. Kratt, 'The Inside Story: A Disgruntled Employee Gets His Revenge,' SANS, pp. 6-7, Dec. 2004
|
7 |
Cybenko, A. Giani, and P. Thompson, 'Cognitive Hacking: A Battle for the
Mind,' IEEE Computer, vol. 35, no. 8, pp. 50-56, Aug. 2002
DOI
ScienceOn
|
8 |
U.S. Department of Justice, Computer Crime & Intellectual Property Section, http://www.cybercrime.gov/index.html
|
9 |
국가사이버안전센터(NCSC). '인터넷 신종 사기 기법, 파밍(Pharming),' http://www1.ncsc.go.kr(동향분석정보 #44), 2005년 3월
|
10 |
B. Schneier, 'The Psychology of Security,' http://www.schneier.com/essay-155.html, Jan. 2008
|
11 |
경찰청, 2008 경찰백서, pp. 138-141, 2008년 9월
|
12 |
A. Litan, 'Increased Phishing and Online Attacks Cause Dip in Customer Confidence,' Gartner, http://www.gartner.com/DisplayDocument?doc_cd=129146, June 2005
|
13 |
M. Libicki, 'The Mesh and the net: Speculations on armed conflict in an age of free silicon,' McNair Paper no. 28, National Defense University, 1994
|
14 |
경찰청 사이버테러대응센터(HNETAN), http://www.netan.go.kr/indexjsp
|
15 |
네이버 백과사전, 두산 백과사전, http://l00.naver.com/l00.nhn?docid = 775269
|
16 |
KK Arthur, M.S. Oliver, H.S. Venter, and J.H.P. Eloff, 'Consideration Towards a Cyber Crime Profiling System,' The third International Conference on Availability, Reliability and Security, IEEE, pp. 1388-1393, Mar. 2008
DOI
|
17 |
J. Kee, 'Social Engineering: Manipulating the Source,' SANS, pp. 5-7, Apr. 2008
|
18 |
G. Takama, M. Association, and Papan, 'Security, Privacy Data Protection, and Perspectives of Counter Cyber Crime,' CodeGate Conference, Seoul, pp. 64-66, Apr. 2008
|
19 |
이대원, '정훈 교육과 심리전.' 육군 제132호, pp. 22-30, 2005년 7월
|
20 |
P. Thompson, Semantic Hacking and Intelligence and Security Informatics, Springer Berlin/Heidelberg, Jan. 2003
|
21 |
행정안전부 개인정보과, '개인정보 이해와 해설.' pp. 3-11, 2008년 6월
|
22 |
K Mitnick, The Art of Deception, John Wiley & Sons Inc., Oct. 2003
|
23 |
윤희영, '국경 없는 조폭 맥 마피아.' 디지틀 조선일보, http://news.chosun.com/site/datal htmLdir/2008/05/26/2008052601148.html, 2008년 5월
|
24 |
M. Allen, 'Social Engineering,' SANS, pp. 2-8, June 2006
|
25 |
Symantec, 'Underground economy July 07-June 08,' pp. 1-2, Nov. 2008
|