1 |
"Reform agenda for the department of homeland security," Forbes, https://www.forbes.com/sites/realspin/2017/01/27/reform-agenda-for-the-department-of-homeland-security/#7d416ed62a31, Jan. 27, 2017. [Retrieved from 6th April, 2019]
|
2 |
Jiyeon Yoo and Nayoung Jeong, "A study on the policy direction of critical infrastructure risk response in the changing digital environment: a comparative study of the USA's policy," Journal of Security Engineering, 14(1), pp. 59-76, 2017.
DOI
|
3 |
"NPPD, under the U. S. department of homeland security, is one of the nation's overall security officers," Boan News, https://www.boannews.com/media/view.asp?idx=58589, Dec. 13, 2017. [Retrieved from 6th July, 2019]
|
4 |
U. S. Department of Homeland Security, "Factsheet: cybersecurity and infrastructure security agency," The Department of Homeland Security: Washington, DC., 2018.
|
5 |
The White House, "Cyberspace policy review: assuring trusted and resilient information and communications infrastructure," The White House: Washington, DC., 2009.
|
6 |
Eunji Song and Wonyoung Kang, "U. S. Obama administration's second term cybersecurity policy," Internet & Security Focus: KISA, 2014.
|
7 |
"Obama's government manages cybersecurity directly," Etn News, http://www.etnews.com /200902110180, Feb. 12, 2009. [Retrieved from 6th July, 2019]
|
8 |
"Cyber-attacks against U. S. government," Digital Times, http://cyberbureau.police.go.kr/board/boardView.do?board_id=cyber&id=3593&page=15&mid=030201, Feb. 18, 2009. [Retrieved from 11th July, 2019]
|
9 |
U. S. Department of Homeland Security, "Blueprint for a secure cyber future: the cybersecurity strategy for the homeland security enterprise," The Department of Homeland Security: Washington, DC., 2011.
|
10 |
B. H. Obama, "Executive order 13636: improving critical infrastructure cybersecurity," The White House: Washington, DC., 2013.
|
11 |
B. H. Obama, "Presidential policy directive 21: critical infrastructure security and resilience (PPD-21)," The White House, Office of the Press Secretary: Washington, DC., 2013.
|
12 |
Sangbae Kim, "International comparison of national cyber security strategies: examples of four countries around the Korean peninsula and three major European countries," Institute of International Studies at Seoul National University: Seoul, 2017.
|
13 |
"Obama's cyber legacy: he did (almost) everything right and it still turned out wrong," Nextgov, https://www.nextgov.com/cybersecurity/2017/01/obamas-cyber-legacy he-did-almost-everything-right-and-it-still-turned-out-wrong/134612/, Jan. 27, 2017. [Retrieved from 2th August, 2019]
|
14 |
"Obama's cybersecurity legacy: good intentions, good efforts, limited result," CSO, https://www.csoonline.com/article/3162844/security/obamas-cybersecurity-legacy-good- intentions-good-efforts-limited-results.html, Apr. 2, 2017. [Retrieved from 27th July, 2019]
|
15 |
U. S. Department of Homeland Security, "U. S. department of homeland security cybersecur ity strategy," The Department of Homeland Security: Washington, DC., 2018.
|
16 |
"Obama's cybersecurity plan is mean to secure his legacy," WIRED, https://www.wired.com/2016/02/obamas-cybersecurity-plan-is-meant-to-secure-his-legacy/, Feb. 10, 2016. [Retrieved from 11th August, 2019]
|
17 |
"Sidetracked: Obama's cybersecurity legacy," World Politics Review, https://www.worldpoliticsreview.com/articles/17468/sidetracked-obama-s-cybersecurity-legacy, Dec. 15, 2015. [Retrieved from 11th August, 2019]
|
18 |
D. J. Trump, "Executive order 13800: strengthening the cybersecurity of federal networks and critical infrastructure," The White House: Washington, DC., 2017.
|
19 |
"White house issues cybersecurity order," Norton Rose Fulbright: Data Protection Report, https://www.dataprotectionreport.com/2017/05/ white-house-issues-cybersecurity-order/, May. 11, 2017. [Retrieved from 2th August, 2019]
|
20 |
"Trump administration plans a new cybersecurity strategy," Boan New, https://www.boannews.com/media/viewasp?idx=57811, Nov. 1, 2017. [Retrieved from 12th July, 2019]
|
21 |
"Many DHS 'unity' initiatives to continue under 2017 NDAA," Federal News Network, https://federalnewsnetwork.com/legislation/2016/12/many-dhs-unity-initiatives-continue-2017-ndaa/, Dec. 27, 2016. [Retrieved from 12th July, 2019]
|
22 |
U. S. Congress, Public Law 114-328, "National Defense Authorization Act for Fiscal Year 2017," The US Congress: Washington, DC., 2016.
|
23 |
D. J. Trump, "National cyber strategy of the United States of America," The White House: Washington, DC., 2018.
|
24 |
"New national cyber strategy message: deterrence through U. S. strength," Government Technology, http://www.govtech.com/blogs/lohrmann-on-cybersecurity/new-national-cyber-strategy-message-deterrence-through-us-strength.html, Sep. 29, 2018. [Retrieved from 6th April, 2019]
|
25 |
The White House, "National security strategy of the United States of America," The White House: Washington, DC., 2017.
|
26 |
National Disaster Management Research Institute, "Research topics on developing the national intergrated resonse system in Korea - Focused on emergency response," National Disaster Management Research Institute: Seoul, 2009.
|
27 |
"DHS releases its cybersecurity strategy," Wiley Rein, https://www.wileyrein.com/newsroom-articles-DHS_Releases_Its_ Cybersecurity _Strategy.html, May. 16, 2018. [Retrieved from 4th August, 2019]
|
28 |
"US department of homeland security unveils new cyber security strategy," Computing, https://www.computing.co.uk/ctg/news /3032492/us-department-of-homeland-security-unveils-new-cyber-security-strategy, May. 17, 2018. [Retrieved from 4th August, 2019]
|
29 |
U. S. Department of Defense, "Cyber strategy," The Department of Defense: Washington, DC., 2018.
|
30 |
"DHS on the passage by congress of the FY 2017 NDAA (Learn More)," American Security Today, https://americansecuritytoday.com/dhs-passage-congress-fy-2017-ndaa-learn/, Dec. 27, 2016. [Retrieved from 6th April, 2019]
|
31 |
LIG consulting, "A study on the operation of the central countermeasures headquarters and establishment of the role system," The Ministry of Public Administration and Security: Seoul, 2011.
|
32 |
"A cybersecurity agenda for the 45th president," Center for Strategic & International Studies, https://www.csis.org/news/cybersecu rity-agenda-45th-president, 2017. [Retrieved from 22th December, 2018]
|
33 |
"President Trump releases national cybersecurity strategy," Becker's Hospital Review, https://www.beckershospital review.com/hospital-management-adminis tration/president-trump-releases-national-cybersecurity-strategy.html, Sep. 24, 2018. [Retrieved from 3th August, 2019]
|
34 |
"Trump launches new national cyber strategy," AXIOS, https://www.axios.com/trump-national-cyber-strategy-9b6604a1-2521-4543-8d61-64c0f785e118.html, Sep. 21, 2018. [Retrieved from 2th August, 2019]
|
35 |
U. S. Congress, Public Law 115-278, "Cybersecurity and Infrastructure Security Agency Act of 2018," The US Congress: Washington, DC., 2018.
|
36 |
"US cybersecurity and infrastructure agency: Trump signs bill to place new agency under DHS," Hashed Out. https://www.thesslstore.com/blog/us-cybersecurity-and-infrastructure-agency-trump-signs-bill-to-place-new-agency-under-dhs/, Nov. 19, 2018. [Retrieved from 5th August, 2019]
|
37 |
"The cybersecurity 202: Trump set to make a new DHS agency the top federal cyber cop," The Washington Post, https://www.washingtonpost.com/news/powerpost/paloma/ the-cybersecurity202/2018/11/16/the-cybersecurity-202-trump-set-to-make-a-new-dhs-agency-the-top-federal-cyber-cop/5bedb9a71b326b3929054867/?utm_term=.92c3b366fd3e, Nov. 16, 2018. [Retrieved from 2th August, 2019]
|
38 |
Taeyong Yoon, "Border security system and the role of national intelligence," The Korea Association of National Intelligence Studies, (6)1, pp. 85-128, 2012.
|
39 |
Sanghyun Lee, "Cybersecurity laws in the U. S.: focusing on responses from the legislative, the judicial, and the executive body," Internet and information Security, (3)1, pp. 109-131, 2012.
|
40 |
"Unity of effort key to DHS' new cybersecurity strategy," Federal News Network, https://federalnewsnetwork.com/hearings-oversight/2018/05/unity-of-effort-key-to-dhs-new-cybersecurity-strategy/, May. 15, 2018. [Retrieved from 8th March, 2019]
|
41 |
"Ali Mayorkas on leading a unity of effort at DHS," Govloop, https://www.govloop.com/community/blog/ali-mayorkas-leading-unity-effort-dhs/, Oct. 26, 2015. [Retrieved from 8th March, 2019]
|