Acknowledgement
본 논문은 과학기술정보통신부의 지원에 의하여 연구되었음.
References
- https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf
- https://www.idc.com/getdoc.jsp?containerId=prAP46180120
- https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
- 이동혁, 박남제. "IoT 기기의 보안성 확보를 위한 제도적 개선방안," 정보보호학회논문지, 제27권, 제3호, pp. 607-615, 2017. https://doi.org/10.13089/JKIISC.2017.27.3.607
- 유우영, "IoT 보안에 대한 국내외 연구 동향 분석," 융합보안논문지, 제18권, 제1호, pp. 61-67, 2018.
- 이동혁, 박남제, "IoT 제품 보안 인증 및 보안성 유지 관리방안," 한국통신학회지(정보와통신), 제33권, 제12호, pp. 28-34, 2016.
- 고재용, 이상길, 김진우, 이철훈. "IoT 보안 요구사항 및 보안 운영체제 기반 기술 분석," 한국콘텐츠학회논문지, 제18권, 제4호, pp. 164-177. 2018. https://doi.org/10.5392/JKCA.2018.18.04.164
- 강다연, 황종호. "IoT 보안인증서비스 인증기준 중요도 우선순위에 관한 연구," 한국콘텐츠학회논문지, 제19권, 제7호, pp. 13-21, 2019. https://doi.org/10.5392/JKCA.2019.19.07.013
- https://www.congress.gov/116/plaws/publ207/PLAW-116publ207.pdf
- https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB327
- https://olis.leg.state.or.us/liz/2019R1/Downloads/MeasureDocument/HB2395/Enrolled
- https://ims.ul.com/iot-security-what-does-reasonable-security-look
- https://www.nist.gov/blogs/cybersecurity-insights/rounding-your-iot-security-requirements-draft-nist-guidance-federal
- https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-213-draft.pdf
- https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259.pdf
- https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259A.pdf
- https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259B-draft.pdf
- https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259C-draft.pdf
- https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259D-draft.pdf
- https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32019R0881&from=EN
- https://www.enisa.europa.eu/topics/standards/Public-Consultations/public-consultations-cybersecurity-schemes
- https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf
- https://korea.ul.com/news/보도자료_ul-cap-사이버보안평가
- https://www.cybersecuritysummit.org/wp-content/uploads/2017/10/4.00-Justin-Heyl.pdf
- https://www.sans.org/summit-archives/file/summit-archive-1521575758.pdf
- https://productiq.ulprospector.com/en
- https://tietoturvamerkki.fi/en/products/
- https://www.csa.gov.sg/-/media/csa/documents/sccs/cybersecurity_certification_guide_v2.pdf
- https://www.kisa.or.kr/public/laws/laws3.jsp
- 박남제, 정원석, 한동국, 방지호, 김범준, 박애선, 이동혁, 김호영, 권지영, 지재덕, 조영진. 'IoT 제품 보안인증 및 보안성 유지관리정책 추진방안 연구'. 한국인터넷진흥원, 2016
- https://www.ksecurity.or.kr/user/bbs/kisis/66/312/bbsDataView/10176.do?page=2&column=&search=&searchSDate=&searchEDate=&bbsDataCategory=
- 한국인터넷진흥원, '사물인터넷(IoT) 보안 시험.인증 기준 해설서 [Lite]', 2019.
- 한국인터넷진흥원, '사물인터넷(IoT) 보안 시험.인증 기준 해설서 [Basic]', 2019.
- 한국인터넷진흥원, '사물인터넷(IoT) 보안 시험.인증 기준 해설서 [Standard]', 2019.
- https://www.law.go.kr