1 |
National Cyber Security Center, National Cyber Security Manual, Jan. 2012.
|
2 |
Choi, M.G., Management of Internet Enterprise, iumbooks, 5112p, 2013
|
3 |
National Cyber Security Center, The Explanation of Information Security Management Evaluation(Public Institution), pp. 3-7, 2013
|
4 |
National Cyber Security Center, The Explanation of Information Security Management Evaluation(National Institution), pp. 3-7, 2013
|
5 |
Youn, O.J., "The Methodology of Information Asset", M.S, Konkuk University, Aug. 2013.
|
6 |
KISA, The Development of Information Security Managment Systems, pp. 8-24, Jun. 2009
|
7 |
KISA, The Method and the Criteria in Information Security Management, pp. 94-147, Sep. 2010
|
8 |
KISA, The Guide of Information Security Grade, 2010.3
|
9 |
http://vlex.com/vid/sec-definitions-19256373
|