1 |
2013 Trustwave Global Security Report(2013), https://www.trustwave.com (accessed Aug, 04, 2014).
|
2 |
G.H. Kim, "Keylogging," http://blogsabo.ahnlab.com/m/post/1827 (accessed Aug, 01, 2014).
|
3 |
H.J Kim, J.H Kim, A. Lee, "Consideration from the Point of View of Personal Information Protection Trends and Detection Technology of Information Leakage," Korea Information Processing Society, Vol. 17, No. 2, pp. 52-58, 2010.
|
4 |
G.H Nam, H.S Kang, J.H Gil, and S.I Kim, "Data Loss Prevention(DLP) Technology Trends," National IT Industry Promotion Agency, Vol. 1413, pp. 1-9, 2009.
|
5 |
McAfee DLP Prevent(2013), http://www.mcafee.com/mx/resources/data-sheets/dsdlp-prevent.pdf (accessed Jul, 17, 2014).
|
6 |
Endpoint DLP/Discovery(2014), http://www.somansa.com/dlp/dlp_03.asp (accessed Jul, 20, 2014).
|
7 |
Symantec Data Loss Prevention(2014), http://www.symantec.com/ko/kr/data-loss-prevention (accessed Aug, 01, 2014).
|
8 |
K.K. Lee, Required of Information Leak Prevention Security Solution DLP , Network Times, pp. 178-182, 2012.
|
9 |
Concert Security Consumer Report(2011), http://www.concert.or.kr/Security_Consumer_Report.pdf (accessed Jul, 22, 2014).
|
10 |
E. Kim, Y.S. Lee, M.S. Jung, "Design and Implementation of anAuthentication System for Anti-Forgery using the Smart Card," Joutnal of Korea Multimedia Society Vol. 14, No. 2, pp. 249-257 Feb. 2011.
DOI
|