1 |
Jun-Taek Lee, "Overview of Information Protection," Dec. 2016.
|
2 |
Hu-Eul Kim and Dong-Hyun Baek, "A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish," Annual Report of Industrial Management Systems in Korea, 38(4), pp. 193-201, Dec. 2015
|
3 |
In-Hwan Cha, "(An)Empirical Research on Developing Personnel Security Management Indicators in Information Security," Thesis for the Degree of Dotor, Gwangun University, Aug. 2009.
|
4 |
Security News, "http://www.boannews.com/media/ view.asp?idx=51343," 2016. 7.27.
|
5 |
GARTNER,"Strategies for Dealing With Advanced Targeted," Aug. 2011.
|
6 |
Seong-Back Han and Sung-Kwon Hong,"Countermeasures against APT Attacks," Journal of the Korea Institute of Information Security & Cryptology, 23(1), pp. 44-53, Feb. 2013
|
7 |
Seol-Hwa Im,Jong-Su Kim," APT status and new malicious code countermeasures," Journal of the Korea Institute of Information Security & Cryptology,24(2), pp.64-70, Apr. 2014
|
8 |
Song-young Kim, "A study on the security policy improvement using the big data," Journal of the Korea Institute of Information Security & Cryptology, 23(5), pp.969-976, Oct. 2013.
DOI
|
9 |
Financial Security Sources,"Status and prospect of using behavioral detection system(FDS)," Jul. 2015.
|
10 |
Hye-Won Sin, "Methodology to analyze insider risk for the prevention of corporate data leakage," Korea Information Science Society, Jul. 2012.
|
11 |
Wikipedia, "Fourth Industrial Revolution," May. 2017.
|
12 |
KISA, "Research on the Development of Information Security Management System (ISMS)," 2009.
|
13 |
Financial Security Sources,"Training for Human Resource Surveillance Training Personnel Training(Financial IT Compliance)," Mar. 2017.
|
14 |
Security news, " measured but unprotected information protection management system ", 2016.06.02.
|
15 |
Byeong-Seol Min, " Limits and Challenges of Human Security Management," Korea Occupational Technology Protection Association, 2011.
|
16 |
Financial Supervisory Service," Electronic Financial Supervisory Regulations," 2017.
|
17 |
Chang-Woo Byun and Seog Park, "A Role-Based Access Control Model ensuring Confidentiality and Integrity," ournal of the Korea Institute of Information Security & Cryptology, 15(3), pp.13-29, Jun. 2005.
|