References
- "Cybercrime Will Cost Businesses Over $2 Trillion by 2019." Juniper Research. Accessed May 24, 2016. http://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion.
- "National Strategies Repository." ITU. Accessed May 12, 2016. http://www.itu.int/en/ITU-D/Cybersecurity/Page s/National-Strategies-repository.aspx
- "National Cyber Security Strategies (NCSSs) Map", ENISA. Accessed May 21, 2016. https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map
- "Cyber Security Strategy Documents", NATO CCDCOE. Accessed May 23, 2016. https://ccdcoe.org/strategies-policies.html.
- Newmeyer, Kevin P. "Elements of National Cybersecurity Strategy for Developing Nations." National Cybersecurity Institute Journal Volume 1, No3. (n.d.): 9-19.
- Mulligan, D. K., & Schneider, F.B., Doctrine for cybersecurity. Daedalus 140(4), 70-92. 2011.
- Luiijf, E., Besseling, K. and de Graaf, P. 'Nineteen national cyber security strategies', International journal of critical infrastructures, Vol. 9(1/2), 3-31. 2013. https://doi.org/10.1504/IJCIS.2013.051608
- 방송통신위원회, 국가 사이버위기 종합대책, 2009. 9.
- 방송통신위원회, 국가 사이버안보 마스터 플랜, 2011. 8.
- 미래부 등 관계부처 합동, 국가 사이버안보종합대책, 2013. 7.
- Moira J. West-Brown, Don Stikvoort, Klaus-Peter Kossakowski., Handbook for Computer Security Incident Response Teams (CSIRTs). CMU/SEI-2003-HB-002. Carnegie Mellon University, 2003.
- Hasna ELKHANNOUBI, Mustapha BELAISSAOUI, "A Framework for an Effective Cybersecurity Strategy Implementation." Journal of Information Assurance & Security. 2016, Vol. 11 Issue 4, p233-241.
- JungMin Kang, HyunUk Hwang, JongMoon Lee, YoungTae Yun, ByungChul Bae, and SoonYoung Jung. "A Study on National Cyber Capability Assessment Methodology." Journal of the Korea Institute of Information Security and Cryptology 22, no. 5 (2012): 1039-1055.
- Wamala, Frederick. "ITU NATIONAL CYBERSECURITY STRATEGY GUIDE," September 2011. http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-national-cybersecurity-guide.pdf.
- Wamala, Frederick. "ITU NATIONAL CYBERSECURITY STRATEGY GUIDE," September 2011. http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-national-cybersecurity-guide.pdf.
- Loukas, George. Cyber-Physical Attacks: A Growing Invisible Threat. Butterworth-Heinemann, 2015.
- "Cyber Security Strategy Documents", NATO CCDCOE. Accessed May 23, 2016. https://ccdcoe.org/strategies-policies.html.
- "National Cyber Security Strategies : Practical Guide on Development and Execution." ENISA, December 2012.
- Liveri, Dimitra, Anna Sarri, An Evaluation Framework for National Cyber Security Strategies, ENISA, 2014. http://bookshop.europa.eu/uri?target=EUB:NOTICE:TP0714017:EN:HTML.
- "National Cyber Security Strategies : Practical Guide on Development and Execution." ENISA, December 2012.
- "Cybersecurity Policy Making at a Turning Point : Analysing a New Generation of National Cybersecurity Strategies for the Internet Economy", OECD, 2012.
- "Framework for Improving Critical Infrastructure Cybersecurity." NIST, February 2014.
- Demchak, Chris, Jason Kerben, Jennifer McArdle, and Francesca Spidalieri., "CYBER READINESS INDEX 2.0," 2015. http://potomacinstitute.org/images/CRIndex2.0.pdf.
- "Recommendation of the Council on the Protection of Critical Information Infrastructures." OECD, June 2008.