1 |
Ahn, S. J., Lee, K. H., and Park, W. H., "Security Monitering and Control," Ehanmidia, pp. 212-244, 2014.
|
2 |
Center for Strategic and International Studies, "Net Losses : Estimating the Global Cost of Cybercrime," Mcafee, 2014. 6. 9.
|
3 |
Han, C. H., Chai, S. W., and Yoo, B.-J., "A Quantitative Assessment Model of Private Information Breach," Journal of Society for e-Business Studies, Vol. 16, No. 4, pp. 17-31, 2011.
과학기술학회마을
DOI
|
4 |
Hyun, T. W., "Attack Method and Countermeasure using SNMP Vulnerability," Dongseo University CNSL, 2009.
|
5 |
Inca Internet Inc. Ltd, "2014 year security report," 2013. 11. 29.
|
6 |
Kim, C. H., "Security Threat and Countermeasure of financial transactions," Privacy Security Conference, 2010.
|
7 |
KISA, "Internet Incident Response Report," 2014.
|
8 |
Korea Technology and Information Promotion Agency for SMBs, "2013 Small and Medium Business Technology Security and Research," 2013.
|
9 |
Lee, Y. and Larsen, K. R., "Threat of Coping Appraisal : Determinants of SMB Executives' Decision to Adopt Anti-Malware Software," European Journal of Information Systems, Vol. 18, pp. 177-187, 2009.
DOI
ScienceOn
|
10 |
Nho, M. S. and Lee, S. Y., "Industrial Security of Small and Medium Business Research," Korea Association for Public Administration, Vol. 44, No. 3, pp. 239-259, 2013.
|
11 |
Park, S. T., "2013 year Main Incident Case and Response," 2013 Hacking Defance Work shop, 2013.
|