참고문헌
- M. S. Todd1 and S. M. Rahman, "Complete Network Security Protection For SME'S Within Limited Resources," International Journal of Network Security & Its Applications (IJNSA), Vol. 5, No. 6, pp. 1-13, Nov. 2013. DOI: 10.5121/ijnsa.2013.5601
- K. I. Kim, G. S. Jeon and G. S. Chae, “NFC Payment System for Security Privacy and Location Information of User,” Journal of Convergence Society for SMB, Vol. 6, No. 2, pp. 21-26, June. 2015. DOI: 10.22156/CS4SMB.2015.6.2.021
- Y. S. Jeong, “Design of Prevention Model according to a Dysfunctional of Corporate Information,” Journal of Convergence Society for SMB, Vol. 4, No. 3, pp. 7-13, June. 2016. DOI: 10.22156/CS4SMB.2016.4.3.007
- J. K. Kwon and J. T. Lee, "An Empirical Study on the factors Information Protection Policy of Employee's Compliance Intention," Journal of Convergence Society for SMB, Vol. 4, No. 3, pp. 7-13, Aug. 2014. DOI: 10.22156/CS4SMB.2014.4.3.007
- Y. S. Jeong, "Design of Security Model for Service of Company Information," Journal of Convergence Society for SMB, Vol. 2, No.2, pp. 43-49, Nov. 2012. DOI: 10.22156/CS4SMB.2012.2.2.043
- M. S. MCS, "Business continuity planning: best practices for your organization," Retrieved from http://www.mcsmanagement.com/WhitepapersUpload, 2007.
- https://www.ultari.go.kr/portal/psi/techPrtcManual.do
- https://www.tradesecret.or.kr/bbs/standard.do
- https://it.smplatform.go.kr/prSysCnstc/intrcnView?bsns-ClCodeSe=0000002G
- K. Ojdana, and A. Watmore, "Getting physical with network security," Retrieved from http://www.molexpn.com/Media/docs/Getting-Physical-with-Network-Security-cb5ed721-977d-4f7d-a4c5-995b6524d3aa.pdf, 2010. 10.
- P. Oppenheimer, "Developing network security strategies," Retrieved from http://www.ciscopress.com/articles/article.asp?p=1626588&seqNum=2. 2010. 10.
- Microsoft. "Applying the principle of least privilege to user accounts on windows xp," Retrieved from http://technet.microsoft.com/en-us/library/bb456992.aspx, 2006. 01.
- S. Motiee, K. Hawkey and K. Beznosov, "Do windows users follow the principle of least privilege? investigating user account control practices. Symposium on Usable Privacy and Security (SOUPS)," Retrieved from http://cups.cs.cmu.edu/soups/2010/proceedi ngs/a1_motiee.pdf, 2010.
- FireEye, "The advanced cyber attack landscape," Retrieved from http://www2.fireeye.com/rs/fireye/images/fireeye-advanced-cyber-attack-landscapereport.pdf?mkt_tok=3RkMMJWWfF9wsRogs63NZKXonjHpfsX57O4kXqO%2BlMI%2F0ER3fOvrPUfGjI4ETcFlI%2FqLAzICFpZo2FFeE%2FKQZYU%3D. 2013.
- P. Oppenheimer, "Developing network security strategies," Retrieved from http://www.ciscopress.com/articles/article.asp?p=1626588&seqNum=2, 2010.
- K. Scarfone and P. M. Mell, Guide to intrusion detection and prevention systems, NIST SP, No. 800-94, 2007.
- J. Lazauskas, "the-3-biggest-cybersecurity-threats-of-2014-and-how-the-federal-government-plans-stop-them," http://www.forbes.com/sites/centurylink/, 2014. 10.