1 |
2015 National Information Security White Book, pp. 300, May 2015.
|
2 |
Information Security Management System(ISMS), http://isms.kisa.or.kr/
|
3 |
SECUrity Assessment for Readiness (SECU-STAR), The Korea Federation of ICT Organizations, Nov. 2014.
|
4 |
NIST, "The Economic Impacts of Inadequate Infrastructure for Software Testing", May 2002.
|
5 |
Security Development Lifecycle, http://www.microsoft.com/security/sdl/about/benefits.aspx
|
6 |
NIST Special Publication 800-160, "Systems Security Engineering-An Integrated Approach to Building Trustworthy Resilient Systems", May 2014.
|
7 |
2014 National Information Security White Book, pp. 300, May 2015.
|
8 |
Keun-Ho Lee, "A Study of Pre-inspection for Information Security in Information System", Journal of Digital Convergence, 12(2), pp.513-518, 2014.
DOI
|
9 |
NIA-PAG(NIA's IT Project Auditing Guideline)v2.0-2013.08, NIA, 2013.
|
10 |
PIA(Privacy Impact Assessment), KISA, 2011.
|
11 |
DHS(Department of Homeland Security),Security in the Software Lifecycle Making Software Development Processes - and Software Produced by Them-More Secure, 2006.
|
12 |
ISO/IEC DIS 27036-3, Guidelines for ICT supply chain security, 2013.
|
13 |
NIST, Notional Supply Chain Risk Management Practices for Federal Information Systems, October 2012.
|
14 |
ISA Security, NIST Cybersecurity Framework ISCI Response to Request for Information, ISASecure, 2013.
|