1 |
Ignacio Sanchez, Apostolos Malatras, Iwen Coisel, "A security analysis of email communications," JRC TECHNICAL REPORT, pp. 33-38, Dec. 2015
|
2 |
Hang Hu and Gang Wang, "Revisiting Email Spoofing Attacks," arXiv: 1801.00853v1 [cs.CR] 2, pp. 2, Jan. 2018
|
3 |
Korea Internet Security Agency, "In-depth analysis of new vulnerability of convergence industry," pp. 26-27, Dec. 2017
|
4 |
Tripti Sharma and Rahul Yadav, "Security in Virtual private network Computer," International Journal of Innovations & Advancement in Computer Science IJIACS ISSN 2347-8616, Vol. 4, special issue, pp. 669-675, Mar. 2015
|
5 |
Ritika kajal and Deepshikha Saini and Kusum Grewal, "Virtual Private Network," International Journal of Advanced Research in Computer Science and Software Engineering Vol. 2, no. 10, pp. 428-432, Oct. 2012
|
6 |
Baljot Kaur Chawla and O.P. Gupta, B. K. Sawhney, "A Review on IPsec and SSL VPN," International Journal of Scientific & Engineering Research, Vol. 5, no. 11, pp. 21-24, Nov. 2014
|
7 |
Jemal Mohammed Tahir, "Testing Virtual Private Network (VPN) Interoperability," Metropolia university of applied sciences, pp. 35, May. 2015
|
8 |
S. Kent, "IP Authentication Header," https://tools.ietf.org/html/rfc4302, Dec. 2005
|
9 |
S. Kent, "IP Encapsulating Security Payload (ESP)," https://tools.ietf.org/html/rfc4303, Dec. 2005
|
10 |
Munhui Kang and Taemung Jung, "VPN technology overview," Conference Proceedings of the Korea Institute of Information Security and Cryptology, 9(4), pp. 6, 1999
|
11 |
Korea Internet Security Agency, "Client Service Security," pp. 18, 2017
|
12 |
Microsofte Azure, "Azure Security documentation," https://docs.microsoft.com/ko-kr/azure/security/, May. 2019
|
13 |
Seung Ik Baek and Ji Yeon Shin and Jong Woo Kim, "Exploring the Korean Government Policies for Cloud Computing Service," The Journal of Society for e-Business Studies, 18(3), pp. 2, Aug. 2013
|
14 |
Hye-Ji Do, "A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach," The Journal of Society for e-Business Studies, 22(4), pp. 40, Nov. 2017
|
15 |
Bosung Lee and Beomsoo Kim, "Protection of Personal Information on Cloud Service Models," Journal of The Korea Institute of Information Security & Cryptology 25(5), pp. 1245-1255, Oct. 2015
DOI
|
16 |
O-shik Kwon, "A study on consignee/consigned party management system enhancement for information technology outsourcing," Conference on Information and Communication Equipment, pp. 1-3, Sep. 2016
|
17 |
Taehyun Son and Jungsun Park, "A Study on Improving Information Security Implementation of IT Brokerage Company," Korea Safety Management Science Conference Fall Conference, pp. 357-365, Sep. 2014
|
18 |
Youngdai-dai Ko and Sang-jin Lee, "A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information," Journal of The Korea Institute of Information Security & Cryptology, 25(2), pp. 383-393, Apr. 2015
DOI
|
19 |
Jun Hyun Park and Jae Sung Park, "Enterprise Hybrid Cloud Technology and Security Trends," Journal of The Korea Institute of Information Security & Cryptology, 26(1), pp. 81-91, Feb. 2016
DOI
|
20 |
"Report on site inspection results of consignors in the first half of 2018," Jun. 2018.
|
21 |
AWS, "Identity and Access Management for AWS Security Hub," https://docs.aws.amazon.com/securityhub/latest/userguide/security-iam.html, May. 2019
|
22 |
"60% of companies hacked through business partners...Launched BitSite service to confirm security to partner companies," TECH M, Jun. 2019
|