1 |
Boannews(2018.04.17.), "Although the summit is approaching, the cyber attack, which is presumed to be North Korea, is ongoing". http://www.boannews.com/media/view.asp?idx=68529&kind=1
|
2 |
arsTECHNICA(2018.04.28.), "As two Koreas shake hands, Hidden Cobra hackers wage espionage compaign". https://arstechnica.com/tech-policy/2018/04/as-two-koreas-shake-hands-hidden-cobra-hackers-wage-espionage-campaign/
|
3 |
Stephen J. Cimbala & Roger N. McDermott, "A New Cold War? Missile Defenses, Nuclear Arms Reductions, and Cyber War", Comparative Strategy, pp.95-111, 2015
|
4 |
Sangbae Kim, "Cybersecurity Strategies of Major Powers in World Politics: From the Comparative Perspective of National Strategies", Journal of International and Area Studies, vol. 26, No. 3, pp.67-108, 2017
|
5 |
Deloitte, "2016 Deloitte Asia-Pacific Defense Outlook", 2016
|
6 |
Sangdon Park, Injung Kim, "A Study on Tasks for the Legal Imporvement for the Governance System in Cybersecurity", Convergence security journal, Vol. 13, No. 4, pp.1-3, 2013.
|
7 |
Korea Internet&Security Agency, "A Comparative Law Study on the Cybersecurity Response System", 2015
|
8 |
Ji-Hyun Kim, "Proposal of Cyber Security Control Tower System in view of Korea's Constitutional Law", Journal of Security Engineering, Vol. 11, No.1, pp.25-40, 2014
DOI
|
9 |
Sim, Kwang-ho, Lee, Cheouljoo, Park, Jae-Hyung, "Cyber Terror and Shadow Risk: A Study on the Design of Governance System for the National Cyber Security of Korea", The Journal of Political Science & Communication, Vo.16, No.1, pp.265-296, 2013
|
10 |
Jong-In Lim, "Cyber security policy proposal for the Hyper-connectivity society", Policy study of National Science and Technology Advisory Council, Vol. 2014, No. 5, 2014
|
11 |
The White House, "National Security Strategy", 2015.02.
|
12 |
The White House, "Cybersecurity National Action Plan", 2016.02. Homeland Security, "NATIONAL CYBER INCIDENT RESPONSE PLAN", 2016.12.
|
13 |
Homeland Security, "NATIONAL CYBER INCIDENT RESPONSE PLAN", 2016. 12.
|
14 |
Homeland Security, "Comprehensive National Cybersecurity Initiative", 2008.01.
|
15 |
European Commission, "Cybersecurity Strategy of the European Union : An Open, Ssfe and Secure Cyberspace", 2013.07.
|
16 |
European Parliament and of the Council, "Directive on Network Information Security", 2016.07.
|
17 |
Federal Ministry of the Interior, "Cyber Security Strategy for Germany", 2011.02.
|
18 |
Bundesministerium des Innern, "Cyber-Sicherheitsstrategie fur Deutschland", 2016.11.
|
19 |
Cabinet Office, "The UK Cyber Security Strategy 2011-2016", 2011.
|
20 |
The Department of Defense, "The DoD Cyber Strategy", 2015.04.
|
21 |
HM Government, "National Cyber Security Strategy 2016-2021", 2016.11.
|
22 |
HSCIC, "Health and Social Care Information Centre Strategy 2015-2020", 2015.03.
|
23 |
UK Cabinet Office, "A National Information Assurance Strategy", 2007.06.
|
24 |
務省,"識情報社会の実現に向けた情報通信政策の在り方", 2012. http://www.soumu.go.jp/main_content/000169616.pdf
|
25 |
Mikk Raud, "China and Cyber: Attitudes, Strategies, Organisation", CCDCOE, 2016
|
26 |
Information Security Policy Council, "Japan Cybersecurity Strategy : Towards a world-leading, resilient and vigorous cyberspace", 2013.06.10.
|
27 |
Cabinet Decision, "Japan Cybersecurity Strategy", 2015.10.04.
|
28 |
Ministry of Defense, "NATIONAL DEFENSE PROGRAM GUIDELINES for FY 2014 and beyond", 2013.12.17.
|
29 |
Youn Bonghan, "A Study on China's Cyber Security Legislation and Policy: Implications of China's New Cyber Security Law and Our Responses", Policy Study, Vol 189, 53p, 2016
|
30 |
Lindsay, Jon R., Tai Ming Cheung and Derek S. Reveron. "China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain". Oxford University Press, 2015.
|
31 |
Politburo Standing Committee, "National Cyberspace Security Strategy(國家网絡空間安全戰略)", 2016.12.
|
32 |
Ministry of Public Security, "China International strategy of Cooperation on Cyberspace", 2017.03.
|
33 |
Homeland Security, https://www.dhs.gov/national-cybersecurity-and-communications-integration-center
|
34 |
Yang. Jeong-yoon, Park. Sang-don, Kim. So-jeong, "Analysis on the U.S. Legislation Relating to Cybersecurity: Overview and Discussion of Five Acts Including National Cybersecurity Protection Act PDF icon", National Assembly Research Service, Vol 7, No.2, p.316, 2015
|
35 |
Senior National Assembly Intelligence Committee member, Review Report on the National Legislation and National Cyber Safety Management, p.3, 2014
|
36 |
Park Sangdon, "A Review on the Role Expansion of German Federal Office for Information Security(Bundesamt fur Sicherheit in der Informationstechnik, BSI) in 2017", Journal of Security Engineering, Vol.15, No.2, pp.69-80, 2018
DOI
|
37 |
EUROPEAN COMMISSION press release(2017.09.19.), "State of the Union 2017 - Cybersecurity: Commission scales up EU's response to cyber-attacks", Brussels. http://europa.eu/rapid/press-release_IP-17-3193_en.htm
|
38 |
Korea Internet Development Institute, National Institute of Security Technology, "2017 National Information Security White Paper", 2017
|