1 |
PCworld, "Sony Sued Over PSN Data Breach, Failure to Disclose", http://www.pcworld.com/article/226478/sony_sued_over_psn_data_breach_failure_to_disclose.html, Apr 27, 2011
|
2 |
Seung-Ju Kim. "Have to lead the 'Creative Security' against industry", http://www.dt.co.kr/contents.htm?article_no=2011080902012251697035, Aug 8, 2011
|
3 |
KQA, "ISO/IEC 27001:2013 Framework overview", http://kqa.co.kr/main.php, Jun 15, 2017
|
4 |
KISA, "2017 ISMS certification system briefing session", https://isms.kisa.or.kr/main/isms/notice/?boardId=bbs_0000000000000001&mode=view&cntId=48&category=%EC%9E%90%EB%A3%8C&pageIdx=1, Apr 27, 2017
|
5 |
KISA, "Detail check list of ISMS certification", https://isms.kisa.or.kr/main/isms/notice/?boardId=bbs_0000000000000001&mode=view&cntId=36&category=%EC%9E%90%EB%A3%8C&pageIdx=2, May 15, 2013
|
6 |
Haider Abbas, Christer Magnusson, Louise Yngstrom and Ahmed Hemani, "Addressing dynamic issues in information security management", Information Management & Computer Security. 19, pp. 4, Jan. 2011
|
7 |
Sang-Eun Kwon, KAIST, "Research of Information Security Management Model for Real-Time Security Level Measurement", KOASAS(KAIST open access self archving system), pp.2, 2013
|
8 |
BCS, "Why ISO27001 is not enough?", http://www.bcs.org/content/ConWebDoc/26594, IT Research Lab, pp. 1-2, 2009
|
9 |
Hee-Myung Lee and Jong-In Lim, "A Study on the Development of Corporate Information Security Level Assessment Models", Journal of the Korean Institute of Information Security and Cryptology, pp. 165-169, Jul. 2008
|
10 |
Shin-beom Kang, "A Study on the Effective Countermeasures for Preventing Computer Security Incident", pp. 71-82, Feb. 2012
|
11 |
Yu-Chan Ko, "A Study on an Improvement of Information Security Management System (ISMS) Scheme- Flexible Application of Control Items", Research Information Sharing Service(RISS), pp.42, Dec, 2013
|
12 |
Kyung-Ho Lee, "Method and Apparatus for Measurement of Information-Security-Controlling Status", Patent No.10-1616989-0000, pp. 5-6, March, 2016
|
13 |
Symantec, "Internet Security Threat Report", Volume 21, pp. 2, 2016
|
14 |
ETnews, "1 Billion PCs At Risk As Windows Error Reporting Sends Reports In Clear(Original Title)", http://www.etnews.com/201401020348, Jan 2, 2014
|
15 |
Eun-Sung Kang, "The Information Security that CxOs have to know", Hanbit Media, Seoul, 296, 2015
|
16 |
Boannews, "Exposure of domestic gas measurement system information at Shodan", http://m.boannews.com/html/detail.html?idx=49636, Feb 17, 2016
|
17 |
ETnews, "The warning of Semiconductor hacking threats. Industries preparing counteasure.", http://www.etnews.com/201401160301, Jan 16, 2014
|
18 |
Yonhapnews, "'Hacking suspicion' Chinese PC, Withdraw from British intelligence agency", http://www.yonhapnews.co.kr/bulletin/2013/07/30/0200000000AKR20130730184900085.HTML, Jul 30, 2013
|
19 |
Spiegel Online, "Documents Reveal Top NSA Hacking Unit", http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969.html, Dec 29, 2013
|
20 |
Eun-Sung Kang, "The CISO Story of Eunsung Kang", i-News24 Opinion column, http://opinion.inews24.com/php/news_view.php?g_serial=835179&g_menu=042137, Jul 11, 2014
|
21 |
Il-Jun Moon(CEO of Bitscan Company), "Is the ISMS certification company safe from hacking?", http://www.dailysecu.com/?mod=news&act=articleView&idxno=3677, Jan 23, 2013
|
22 |
NIST. "Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations." Special Publication 800-137: https://www.nist.gov. Sep 2011
|
23 |
Chae-Ho Lim(The Former Professor of KAIST University), "The need of Total ISCM strategy for continuous security monitoring", http://www.boannews.com/media/view.asp?idx=49305, Jan 25, 2016
|
24 |
Dailysecu, "Possibility of Anonymous FTP attack for Domestic NAS servers.", http://www.dailysecu.com/?mod=news&act=articleView&idxno=5930, Dec 17, 2013
|
25 |
Russia Focus, "RussiaAmendment Law Enacted in September. -Russian personal information have to save at the domestic servers", https://russiafocus.co.kr/society/2015/04/10/9_46959, Apr 10, 2015
|
26 |
The KPI Institute, "New SmartKPIs.com Report Ranks The Top IT Security KPIs of 2011- 2012", https://news.kpiinstitute.org/new-smartkpis-com-report-ranks-the-top-it-security-kpis-of-2011-2012/, May 20, 2013
|
27 |
Jung-Sik Ryu(CEO of 'In Future' Company), "Give up the unconditional trust about KPI", http://www.infuture.kr/1444, Apr 14, 2014
|
28 |
KISA, "A Study on National Information Security Evaluation Indices and their Internationalization", R&D Report, 06-1. 2006
|
29 |
KISA, "Encryption action guide of the Privacy Informations", Jan, 2017
|
30 |
Yun-hyun Kim, Tae-Seung Lee(KISA), "Main Issues and the weakness analysis of Internat Cookies", INTERNET & SECURITY FOCUS, pp. 84-85, Aug, 2014
|
31 |
ITworld,''Europe approves new data protection law-European Parliament gives massive support to stronger data protection rules", http://www.itworld.com/article/2831822/it-management/europe-approves-new-data-protection-law.html, Mar 12, 2014
|
32 |
Juniper Networks, "The Economics of Defence", from RAND Corporation's "Defender's Dilemma: Charting a Course Toward Cybersecurity", pp. 9, Aug,. 2015
|
33 |
CONCERT, "Security Consumer Report- Information Security Performance Indicator", CONCERT Homepage, pp.4-6, Nov. 2013
|
34 |
KISA, "An Analysis of economic effectiveness on ISMS Certification", Internet & Security issue, pp. 30, Mar. 2010
|
35 |
Sang-su Jang, "The Effects of the Operation of an Information Security Management System on the Performance of Information Security", Journal of the KIISE, Information Networking, Vol. 40(1), pp. 58-69, Feb. 2013
|