Acknowledgement
본 연구는 행정안전부의 재난안전 분야 전문 인력 양성사업을 통해 지원받아 수행된 연구의 결과이며, 이에 감사드립니다.
References
- AON (2016). Cyber, the Fast Moving Target. (http://www.aon.com/attachments/risk-services/cyber/2016-CaptiveCyber-Survey-Interactive.pdf)
- Australian Small Business and Family Enterprise Ombudsman (2017) Cybersecurity: The Small Business Best Practice Guide (https://www.asbfeo.gov.au/sites/default/files/documents/ASBFEO-cyber-security-research-report.pdf)
- Cho, B.-J., Yun, J.-H., Lee, K.-H. (2015). "Study of effectiveness for the network separation policy of financial companies." Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 1, pp. 181-195. https://doi.org/10.13089/JKIISC.2015.25.1.181
- Cho, S.-K., Jun, M.-S. (2012). "Privacy leakage monitoring system design for privacy protection." Journal of The Korea Institute of Information Security & Cryptology, Vol. 22, No. 1, pp. 99-106. https://doi.org/10.13089/JKIISC.2012.22.1.99
- Deloitte (2017). Cybersecurity and the Role of Internal Audit.
- Financial Services Commission (2019). Regulation of Supervision on Electronic Financial.
- International Security Exhibition & Conference (2019). Exhibition items for participation in the International Security Exhibition(Cybersecurity Field). (https://www.seconexpo.com/2019/kor/exhibit/sub02.asp)
- Jeong, Y.-C. (2018). "Finance industry and cybersecurity policy." Journal of Financial Regulation and Supervision, Vol. 5, No. 2, pp. 89-122.
- Jung, H.-C. (2017). A Study on Security Technology for Enhancing Security of Small and Medium Enterprises by using Open Source. Master Thesis, Soongsil University.
- Kim, D.-C., Kim, I.-S. (2018). "A study on cybersecurity regulation for financial sector: Policy suggestion based on New York's cybersecurity regulation(23 NYCRR 500)." Journal of Society for e-Business Studies, Vol. 23, No. 4, pp. 87-107. https://doi.org/10.7838/JSEBS.2018.23.4.087
- Kim, H.-W., Lee, K.-S., Kim, S.-H. (2005). "Website security evaluation for electronic commerce." Joint Spring Conference between The Korean Operations Research and Management Science Society/Korean Institute of Industrial Engineers, Chungbuk University, pp. 340-347.
- Kim, J-G., Lee, D-S., Cho, J-Y., Han, S-G., Kim, T-H. (2016). "Introduction of perpcetion on ICT to respond social disaster." Journal of The Korea Society of Disaster Inforrmation, Vol. 12, No. 3, pp. 249-260. https://doi.org/10.15683/kosdi.2016.9.30.249
- Kim, J.-H., Cho, J.-H. (2010). "Security threats in cyber environments." Journal of The Korea Institute of Information Security & Cryptology, Vol. 20, No. 4, pp. 11-20.
- Kim, K.-C., Kim, S.-J. (2012). "Evaluation criteria for Korean smart grid based on K-ISMS." Journal of The Korea Institute of Information Security & Cryptology, Vol. 22, No. 6, pp. 1375-1391. https://doi.org/10.13089/JKIISC.2012.22.6.1375
- Kim, K.-R. (2019). A Study on the Cyber Risk Item Disclosure for Cyber Insurance Subsidiary. Master Thesis, Sangmyung University.
- Kim, K.-Y. (1997). "Risk management and crisis management: Disaster recovery for information system." Journal of Risk Management, pp. 291-315.
- Kim, S.-H. (2019). A Study on the Improvement of Vulnerability Checklist for Enhanced PC Security. Master Thesis, Konkuk University
- Kim, S.-J., Kim, J.-D. (2017). "A study on developing assessment indicators for cyber resilience." Journal of Digital Convergence, Vol. 15, No. 8, pp.137-144. https://doi.org/10.14400/JDC.2017.15.8.137
- Kim, S.-Y. (2009). Korea Financial Telecommunications & Clearings Institute, Payment, Clearance and Information Technology, Vol. 38, pp. 34-62.
- Kinosita, E., Ooya, T. (Kwon, J.-H., Trans.) (2012) Strategic Decision Making Techniques, AHP. Cheongram Press, Seoul, Korea.
- Korea Communications Commission & KISA (2010). Guide for Information Security Management System.
- Korea Information Security Agency (2003). A Study on the Development of Certification System for Information Protection Management System.
- Korea Internet & Security Agency (2012). Information Security Guide for Small and Medium IT Service Companies(III), Information Security management for working-level officials.
- Korea Internet & Security Agency (2020). Small and Medium Business Information Protection Practice Guide(1/2, 2/2).
- Korea Insurance Development Institute (2015). A Study on Introduction of Government Reinsurance System in Environment Impairment liability Insurance. Research & Service Report by Minister of Environment.
- Lee, K.-H. (2017). "A study on ERM standardization and insurance linkage scheme to promote corporate risk management." The Journal of Risk Management, Vol. 28, No. 3, pp. 43-79. https://doi.org/10.21480/tjrm.28.3.201709.002
- Lee, K.-H., Yoon, J.-D. (2008). "A study on the measurement methods and cases of personal information leakage risk in private enterprises." Journal of The Korea Institute of Information Security & Cryptology, Vol. 18, No. 3, pp. 92-100.
- Lee, K.-S. (2006). "The problem and policy alternatives for cyber security in the networking age." Journal of Korea Association for Regional Information Society, Vol. 9, No. 1, pp. 109-128.
- Min, B.-G., Lee, D.-H. (2006). "Research of improvement and system of the information security management evaluation." Journal of Convergence Security, Vol. 6, No. 4, pp. 101-112.
- Ministry of Knowledge Economy, IO Consulting Co., Ltd. (2010). Detailed Security Control Implementation Guidelines for Technology Protection for SMEs.
- Namu.Wiki (2021). (https://namu.wiki/w/개인정보%20유출사태)
- NASSTAR (2019). Cyber Security for SMEs: A Practical Guide to Protection Your Business. (https://www.nasstar.com/hubfs/Marketing-Material/white%20paper%20-%20cyber%20security.pdf)
- NIST (2016). NISTIR 7621, Small Business Information Security: The Fundamentals. (https://doi.org/10.6028/NIST.IR.7621r1)
- NIST CSF (2018). Framework for Improving Critical Infrastructure Cybersecurity.
- Oh, H.-G. (2019). "Countermeasure of Unmanned Aerial Vehicle(UAV) against terrorist's attacks in South Korea for the public crowded places." Journal of The Korea Society of Disaster Inforrmation, Vol. 12, No. 1, pp. 49-66.
- Park, J.-T. (2020). A Study on the Establishment of IT-based Joint Disaster Recovery Center for Business Continuity Management System of Small and Medium Business. Ph.D. Dissertation, Hansei University
- Park, J.-H., Cho, N.-W., Lee, K.-H., Choi, I.-H. (2008). " Development of Security System on Personal Information in custody internally in Corporates." Journal of The Korea Institute of Information Security & Cryptology, Vol. 18, No. 6, pp.28-34.
- Radanliev, P., De Roure, D., Nurse, J.R.C., Nicolescu, R., Huth, M., Cannady, S., Montalvo, R.M. (2019). Cyber Security Framework for the Internet-of-Things in Industry 4.0, University of Oxford, UK. (doi: 10.20944/preprints201903.0111.v1)
- Radanliev, P., De Roure, D., Cannady, S., Montalvo, R.M., Nicolescu, R., Huth, M. (2018). "Analysing IoT cyber risk for estimating IoT cyber insurance." IET Conference Proceeding. (doi: 10.1049/cp.2018.0003)
- Son, S.-S. (2014). The Study on the Improved Assessment Methodology for Information Security Level Using ISO 27001. Master Thesis, Sungkyunkwan University
- Song, E.-J., Bae, B.-H., Oh, N.-H. (2018). "A comparative analysis on the calculation method of domestic and foreign information security market." Institute for Information & Communications Technology Promotion, Weekly ICT Trends, Vol. 1860, pp. 17-26.
- Spinello, R. (2003). "Cyberethics: Morality and law in cyberspace." 2th Edition. Jones and Bartlett Learning, LLC., Jones and Bartlett Publishers, Inc, USA.
- Symantec (2018). Cybersecurity for SMEs, a lightweight cybersecurity framework for thorough protection. (https://www.smesec.eu/doc/SMESEC_Flyer_A5_V2_2018-05-03_Singlepages.pdf)
- Wikipedia, Korea (2021). (https://ko.wikipedia.org/wiki/대한민국의_정보_보안_사고_목록)
- Yang, D.-I. (2019). Introduction to Information Security(3rd E.). Hanbit Academy, Seoul, Korea.
- Yoon, J.-G. (1990). "Application of AHP and its limitation." Management & Economics review, Vol. 7, pp. 75-92.