1 |
NIS, "Security Requirements for DB Encryption Product," 2010.04
|
2 |
KISA, "The Guide and Standard of Private Information Risk Analysis," 2012.03
|
3 |
FSA, "The Technical Analysis Report of Recent Trend DB Encryption and Security Technique," 2012.09
|
4 |
Ministry of Government Legislation, http://www.law.go.kr, Act on Promotion of Information and Communication Network Utilization and Information Protection
|
5 |
Ministry of Government Legislation, http://www.law.go.kr, Personal Information Protection Act
|
6 |
NIA, "The guide of Information System Audit and Check," V2.0, 2007.2
|
7 |
KISA, "The Guide to Using Encryption," 2010. 01
|
8 |
KISA, "The Guide to Using Cryptographic Algorithm and Key Sizes," 2010.01
|
9 |
KISA, "The Guide to Managing of Private Information DB Encryption," 2010.01
|
10 |
KISA, "The Guide to Establishment of Encryption Policy in order to Protect IT Information Assets of Company," 2010.01
|