1 |
http://docs.media.bitpipe.com/io_10x/io_105022/item_550605/Lifecycle_of_the_Advanced_Persistent_Threat%5B1%5D.pdf
|
2 |
Kim Hyung-Wook, "0-Day Attack Protection for IBM's multi-tier pre-emptive countermeasures", IBM Security Summit, 2011.
|
3 |
"Corresponds to the current state of the 2010 virus hacking", KISA Final Research Report, KISA-RP-2010-0051
|
4 |
http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?curPage=1&menu_dist=2&seq=18487&dir_group_dist=0
|
5 |
http://www.Websense.com/assets/white-papers/whitepa per-Websense-advanced-persistent-threats-and-other-advanced-attacks-en.pdf
|
6 |
http://www.trendmicro.com/us/enterprise/challenges/ad vance-targeted-attacks/index.html#understand-an-attack
|
7 |
http://www.trendmicro.com/cloud-content/us/pdfs/busi ness/datasheets/ds_deep-discovery.pdf
|
8 |
http://www.it-win.co.kr/EMC_RSA_NetWitness.pdf
|
9 |
http://www.zdnet.co.kr/news/news_view.asp?artice_id=20120918220326&type=det
|
10 |
http://image.itstv.net/upload_files/infocenter/file32599-137302.pdf
|
11 |
http://blog.hitoos.com/radiohankook/44961
|
12 |
http://www.eurosouthkorea-ict.org/documents/forum2_ppt/mijoo_kim.pdf
|
13 |
http://epc.neograph.co.kr/kor/info/kor_info_dic_list.httml?sval=&mode=h8&page=3#
|
14 |
http://blog.daum.net/damulkan/7563870
|
15 |
http://www.isssource.com/wp-content/uploads/2012/04/040412C5_APT_ADecadeInReview.pdf
|
16 |
Lee Chang-bum, Kang Lee-Seock, "Internet Law Trends No. 22", KISA, Trends in Internet legislation 2009-07.
|
17 |
http://netsquare.kisa.or.kr/report/securityTrend/[June 3 weeks] "United States, for cyber security 'Plan X' strategy promotion" 2012-06-21.
|
18 |
Kim Il-Soo, Kang Seock-Gu, Yoon Hee-Sang And five others, "Study on the Construction of cyber security system", Korea Criminal Policy Research Institute, 2010.
|
19 |
http://yjlee.delighit.net/i/entry/75
|
20 |
http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?menu_dist=2&seq=16854
|
21 |
http://blog.daum.net/saschajin/12603
|
22 |
Nam Ki-Hyo, Kim Youn-Hong, Kwon Hwan-Woo, "Trends in information protection latest technology: APT and its corresponding", Information and communication industry Agency, 2011. 9.
|