1 |
Internet Security Threat Report, Vol.24, Feb.2019, Symantec
|
2 |
https://azure.microsoft.com/en-us/services/azure-defender-for-iot/
|
3 |
IoT Common Security Guide, IoT Security Alliance, KISA 2016
|
4 |
Han S-K, Kim M-J, A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation, Convergence Security Journal, Vol.18, No.1,pp.49~58, 2018.
|
5 |
https://aws.amazon.com/ko/iot-core/
|
6 |
http://www.ddaily.co.kr/m/m_article/?no=149257
|
7 |
https://www.ksecurity.or.kr/user/extra/kisis/356/iot/iotList/jsp/LayOutPage.do
|
8 |
https://www.norma.co.kr/iot
|
9 |
https://www.psacertified.org/certified-products/
|
10 |
Yu W-Y, 'An Analysis of Research Trends in IoT Security, Convergence Security Journal, Vol.18, No.1,pp.61~67, 2018.
|
11 |
https://www.cctvnews.co.kr/news/articleView.html?idxno=201439.
|
12 |
https://aws.amazon.com/ko/iot-device-management/
|
13 |
https://aws.amazon.com/ko/iot-device-defender/features/
|
14 |
https://www.cisco.com/c/ko_kr/solutions/internet-of-things/
|
15 |
Technical Report:IoT Security Certification Scheme Part-3, Evaluation Methodology v1.2, EURSMART
|
16 |
Internet of Things (IoT) security, Guide to testing and authentication standards, Dec. 2017, KISA
|
17 |
https://azure.microsoft.com/en-us/overview/iot/security/
|
18 |
https://www.pentasecurity.co.kr/download/#1590053129868-10d07cb4-1dc4
|
19 |
https://www.pentasecurity.co.kr/iot-security/
|
20 |
https://www.psacertified.org/blog/four-steps-to-device-security/
|
21 |
https://www.psacertified.org/getting-certified/device-manufacturer/
|