1 |
2011 CWE/SANS Top 25.
|
2 |
Han, S. K., A Study on Cyber Threats in Control System Linkage Section, Korea University, 2011.
|
3 |
https://www.kuppingercole.com/blog/williamson/ot-ics-scada-whats-the-difference.
|
4 |
ICS-CERT, https://ics-cert.us-cert.gov.
|
5 |
Kim, K. H., Security Enhancements of Industrial Control System for National Critical Infrastructure, Korea University, 2017
|
6 |
Kim, S. J., A Case Study on the Implementation of a River Water Level Monitoring System using PLC(Programmable Logic Controller) and Public Telecommunication Network, The Journal of Society for e-Business Studies, Vol. 20, No. 4, pp. 1-17, 2015.
DOI
|
7 |
Ministry of Public Administration and Security, Web Application Development Security Guide 2010.
|
8 |
KISA Homepage Vulnerability Assessment and Removal Guide (http://kisa.or.kr)-Home page for developing and operating information system vulnerability diagnosis and removal guide, 2013.
|
9 |
KISA, Analysis of Overseas System based Evaluation Cases and Technology, 2009.
|
10 |
Lim, K. H., A Study on the Present Status and Countermeasures of Control System Security Vulnerabilities, Korea University, 2011.
|
11 |
OWASP/OWASP Top Ten Project 2013, https://www.owasp.org/index.php/Top_10_2013-Top_10.
|
12 |
Ministry of Science and Technology Ministry of Information and Communication Analysis of Technical Vulnerabilities in Information Communication Infrastructure 2017.
|
13 |
Na, J. C. and Cho, H. S., "Classification of industrial control system abnormal behavior in terms of security: 2.1 Industrial control system structure," Journal of Information Security, Vol. 23, No. 2, pp. 329-330, 2013.
|
14 |
NIS 8 Vulnerabilities-2005 National Cyber Safety Center(NCSC).
|
15 |
OWASP/OWASP Top Ten Project 2017, https://www.owasp.org/index.php/Top_10_2017-Top_10.
|
16 |
Park, D. H., A Study on the Improvement of Evaluation Criteria for Control System Management and Physical Vulnerability Analysis, Korea University, 2013.
|
17 |
SANS Top 25(http://cwe.mitre.org/top25/).
|
18 |
Security Administration and E-Government Software Development Security Software Diagnosis Guide 2013. 11, Publication Registration Number 11-1311000-000395-14.
|
19 |
Security Administration, Analysis of Technical Vulnerabilities in Major IT Infrastructure Facilities, 2014.
|
20 |
Software Development Security Guide for Security Administration, E-Government Software Development Managers 2013, Publication Registration Number 11-1311000-000330-10.
|
21 |
Software Development Security Guide for the Ministry of Government Administration and Home Affairs, e-government SW Development Managers 2017. 1, Publication Registration Number 11-1311000-000330-10.
|
22 |
SVC(SCADA Vulnerabilities & Exposures), http://www.critifence.com/sve.
|