Fig. 1. Malicious code classification Description
Fig. 2. Rate of types of malware
Fig. 3. Summary of vulnerability improvements lists.
Table 1. vulnerability improvements lists.
References
- CISCO. (2018). Annual Cyber Security Report in 2018. USA : CISCO Publishing.
- Ministry of Science and ICT. (2019). Number of hacking accident http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1363
- Y. R. Jae & J. W. Cho. (2007). A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility 5(1), 55-68.
- K. H. Han. (2015). A Study on Threat Analysis of PC Security and Countermeasures in Financial Sector. master dissertation. Korea University, Korea,
- S. H. Kim. (2016). The Critical Information and Communication Infrastructure Technical Field Vulnerability Assessment Improvements Research. master dissertation. Konku University, Korea,
- CIS. (2019). CIS Controls V7 in 2019. Center for Internet Security. https://www.cisecurity.org/controls/
- B. B. Jeon. (2018). A Study on the Countermeasures for Detecting Malicious Codes by Cyber Threats. master dissertation. Kongju National University, Korea,
- L. D. Yu. (2015). Title. Threats and countermeasures of malware 5(1), 13-18. https://doi.org/10.22156/CS4SMB.2015.5.1.013
- S. Y. Hong. (2014). Title. Analysis and Countermeasure of Malicious Code, 4(2), 13-18. https://doi.org/10.5121/ijitcs.2014.4202
- S. H. Hong & J. A. Yu. (2018). Title. Ransomware attack analysis and countermeasures of defensive aspects 8(1), 139-145. https://doi.org/10.14801/JAITC.2018.8.2.139
- M. S. Gu & Y. Z. Li. (2015). Title. A Study of Countermeasur es for Advanced Per sistent Threats attacks by malicious code, 5(4), 37-42. https://doi.org/10.14801/jaitc.2015.5.2.37
- KISA. (2018). Malicious code hidden site detection trend report Second half of 2018. Seoul : Korea Internet & Security Agency Publishing.
- SK Infosec. (2018) Evolution of information deception and malicious code emote in 2018. http://blog.naver.com/PostView.nhn?blogId=skinfosec2000&logNo=221260804498&categoryNo=0&parentCategoryNo=0&viewDate=currentPage=1&postListTopCurrentPage=1&from=postView
-
KOREA COMMUNICATIONS COMMISSION. (2017). Virtual currency trading site
Personal information leak in 2017. https://kcc.go.kr/user.do?mode=view&page=A05030000&dc=K05030000&boardId=1113&cp=1&ctx=ALL&searchKey=ALL&searchVal=%EB%B9%97%EC%8D%B8&boardSeq=45265 - S. H. Kim (2016). The Critical Information and Communication Infrastructure Technical Field Vulnerability Assessment Improvements Research. master dissertation. Konkuk University, Korea.
- KISA. (2017). Critical Information Infrastructure Protection technical vulnerabilities analyze and evaluate Detail Guide in 2017. Seoul : Korea Internet & Security Agency Publishing.
- STIG. (2018). Windows 10 Security Technical Implementation Guide in 2018. Security Technical Implementation Guide Viewer. https://www.stigviewer.com/stig/windows_10/
- ACSC (2019). Hardening Microsoft Windows 10 in 2019. Australian Cyber Security Center. https://www.acsc.gov.au/publications/protect/hardening-win10.htm