Research for Construction Cybersecurity Test and Evaluation of Weapon System |
Lee, Ji-seop
(Center for Information Security Technologies(CIST), Korea University)
Cha, Sung-yong (Center for Information Security Technologies(CIST), Korea University) Baek, Seung-soo (Center for Information Security Technologies(CIST), Korea University) Kim, Seung-joo (Center for Information Security Technologies(CIST), Korea University) |
1 | "Cybersecurity Test and Evaluation Guidebook", Department of Defense, 2015 |
2 | "National Defense Power Generation Business Instruction", Ordinance of the Ministry of National Defense No.2040, 2017 |
3 | "National Defense Cyber Security Instruction", Presidential Decree No. 1862, 2015 |
4 | Carl E. Landwehr, "History of US Government Investments in Cybersecurity Research", 2010 IEEE Symposium on Security and Privacy, 2010 |
5 | "Cybersecurity Policy", National Security Presidential Directive-54 /Homeland Security Presidential Directive-23, January 2008 |
6 | Wan Choung, "A Study on the Trend of Cyber-Security Legal Systems in Korean and the United States", Kyung hee Law Journal, pp.213-242, 2013 |
7 | National Cyber Security Management Regulation", Presidential decree No.316, 2013 |
8 | "Weapon system Test & Evaluation Practical Guidebook", Defense Acquisition Program Administration, 2013 |
9 | "Guide for Conducting Risk Assessment", NIST SP 800-30 Rev.1, 2012 |
10 | "Guide for Applying the Risk Management Framework to Federal Information Systems", NIST SP 800-37 Rev.1, 2010 |
11 | "Information Assurance Certification Training", DoDI 8570.01, 2012 |
12 | "Security & Privacy Controls for Federal Information Systems and Organizations", NIST SP 800-53 Rev.4, 2013 |
13 | "Guide for Assessing the Security Controls in Federal Information Systems and Organizations", NIST SP 800-53A Rev.1, 2010 |
14 | "Cybersecurity", DoDI 8500.01, 2014 |
15 | "Managing Information Security Risk", NIST SP 800-39, 2011 |
16 | Jungho Kang, Hoedong Kim, Sunsoo Kim, and Jincheol Yoo, "Cyber Warfare Countermeasures by Comparison of Cyber Warfare Strategy and Technology of North Korea and other Major Country", Journal of Security Engineering, Vol.13, No.4, pp.287-298, 2016 DOI |
17 | http://www.yonhapnews.co.kr/politics/2014/04/10/0505000000AKR20140410030651001.HTML?076fb838 |
18 | https://news.sbs.co.kr/news/endPage.do?news_id=N1003456392 |
19 | http://www.dt.co.kr/contents.html?article_no=2016120702109960813002 |
20 | "Integrated Air, Space and Missile Defense in 2025 and Beyond", Space and Missile Defense symposium, 2015 |
21 | Cybersecurity and the Risk Management Framework, Department of Defense, http://slideplayer.com/slide/4575411/ |
22 | Congressional Research Service, Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process, May 23, 2014 |
23 | "Operation of the Defense Acquisition System", DoDI 5000.02, 2013 |
24 | "Risk Management Framework for DoD IT", DoDI 8510.01, 2014 |