1 |
CISCO. (2018). Annual Cyber Security Report in 2018. USA : CISCO Publishing.
|
2 |
Ministry of Science and ICT. (2019). Number of hacking accident http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1363
|
3 |
Y. R. Jae & J. W. Cho. (2007). A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility 5(1), 55-68.
|
4 |
K. H. Han. (2015). A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector. master dissertation. Korea University, Korea,
|
5 |
S. H. Kim. (2016). The Critical Information and Communication Infrastructure Technical Field Vulnerability Assessment Improvements Research. master dissertation. Konku University, Korea,
|
6 |
CIS. (2019). CIS Controls V7 in 2019. Center for Internet Security. https://www.cisecurity.org/controls/
|
7 |
S. H. Hong & J. A. Yu. (2018). Title. Ransomware attack analysis and countermeasures of defensive aspects 8(1), 139-145.
DOI
|
8 |
B. B. Jeon. (2018). A Study on the Countermeasures for Detecting Malicious Codes by Cyber Threats. master dissertation. Kongju National University, Korea,
|
9 |
L. D. Yu. (2015). Title. Threats and countermeasures of malware 5(1), 13-18.
DOI
|
10 |
S. Y. Hong. (2014). Title. Analysis and Countermeasure of Malicious Code, 4(2), 13-18.
DOI
|
11 |
M. S. Gu & Y. Z. Li. (2015). Title. A Study of Countermeasur es for Advanced Per sistent Threats attacks by malicious code, 5(4), 37-42.
DOI
|
12 |
KISA. (2018). Malicious code hidden site detection trend report Second half of 2018. Seoul : Korea Internet & Security Agency Publishing.
|
13 |
SK Infosec. (2018) Evolution of information deception and malicious code emote in 2018. http://blog.naver.com/PostView.nhn?blogId=skinfosec2000&logNo=221260804498&categoryNo=0&parentCategoryNo=0&viewDate=currentPage=1&postListTopCurrentPage=1&from=postView
|
14 |
KOREA COMMUNICATIONS COMMISSION. (2017). Virtual currency trading site Personal information leak in 2017. https://kcc.go.kr/user.do?mode=view&page=A05030000&dc=K05030000&boardId=1113&cp=1&ctx=ALL&searchKey=ALL&searchVal=%EB%B9%97%EC%8D%B8&boardSeq=45265
|
15 |
ACSC (2019). Hardening Microsoft Windows 10 in 2019. Australian Cyber Security Center. https://www.acsc.gov.au/publications/protect/hardening-win10.htm
|
16 |
S. H. Kim (2016). The Critical Information and Communication Infrastructure Technical Field Vulnerability Assessment Improvements Research. master dissertation. Konkuk University, Korea.
|
17 |
KISA. (2017). Critical Information Infrastructure Protection technical vulnerabilities analyze and evaluate Detail Guide in 2017. Seoul : Korea Internet & Security Agency Publishing.
|
18 |
STIG. (2018). Windows 10 Security Technical Implementation Guide in 2018. Security Technical Implementation Guide Viewer. https://www.stigviewer.com/stig/windows_10/
|