과제정보
This Research was supported by the Tongmyong University Research Grants (2020(2020A033-1).
참고문헌
- H. S. Lee, D. J. Kim, H. J. Lee & D. H. Hwang. (2021). A File Access Control System Based on File Access Logs for Ransomware Response and Data Loss Prevention System. Korea Computer Congress 2021.
- J. S. Lee & K. H. Lee. (2014). A Study on Security Container to Prevent Data Leaks. Journal of The Korea Institute of Information Security & Cryptology, 24(6), 1225-1241. DOI :10.13089/JKIISC.2014.24.6.1225
- G. J. Shin, G. H. Jung, D. M. Yang & B. H. Lee. (2017). A USB DLP Scheme for Preventing Loss of Internal Confidential Files. Journal of the Korea Institute of Information and Communication Engineering, 21(12), 2333-2340. DOI : 10.6109/jkiice.2017.21.12.2333
- M. B. Hyun & S. J. Lee. (2016). The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor. Journal of The Korea Institute of Information Security & Cryptology, 26(2), 369-375. DOI : 10.13089/JKIISC.2016.26.2.369
- B. J. Jeon, D. B. Yoon & S. S. Shin. (2017). Improved Integrated Monitoring System Design and Construction. Journal of Convergence for Information Technology, 7(1), 25-33. DOI : 10.22156/CS4SMB.2017.7.1.025
- J. H. Choi & S. Y. Rhew. (2005). Monitoring System of File Outflow through Storage Devices and Printers. Journal of the Korea Institute of Information Security & Cryptology, 15(4), 51-60. https://doi.org/10.13089/JKIISC.2005.15.4.51
- J. U. Choi, Y. J. Lee & J. M. Park. (2012). E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions. Journal of the Korea Institute of Information Security & Cryptology, 22(5), 1103-1113. https://doi.org/10.13089/JKIISC.2012.22.5.1103
- J. H. Ko, G. S. Lee, H. Y. Kim & N. G. Kim. (2020). A Log Management System of Removable Storage Devices Based on Blockchain. Journal of Korean Institute of Information Technology, 18(7), 51-56. https://doi.org/10.14801/jkiit.2020.18.7.51
- H. B. Chang. (2015). A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident. Convergence security journal, 15(7), 39-45.
- Police. (2021). Police Statistical Yearbook. (Online). https://www.police.go.kr
- The JoongAng. (2020). Available online: https://news.joins.com/article/23883461
- Insight. (2021). Available online: https://www.insight.co.kr/news/322291
- M. R. Lee. (2017). A study on the improvement plan of monitoring system for preventing inside information loss of Korean firms overseas. Sungkyunkwan University.
- J. H. In. (2015). Research on DLP security policy with case study of internal information leakage. Dankook University.
- S. J. Ahn. (2016). Countermeasures to strengthen technology protection capabilities of SMEs. Industry-Academic Cooperation Foundation of Sungkyunkwan University.
- H. H. Heo. (2007). Small and medium-sized enterprise technology leakage cases and response strategies. Korea Industrial Technology Promotion Association.
- Ministry of SMEs and Startups. (2021). Amount of damage from technology leakage(Online). https://www.ultari.go.kr/portal/introduce/realTechProtect.do
- S. J. Yoo. (2018). A Study on DLP System for Preventing Internal Information Leakage. Convergence security journal, 18(5), 121-126.
- H. R. Yoo, G. J. Shin, D. M. Yang & B. H. Lee. (2018). A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis. Journal of the Korea Institute of Information and Communication Engineering, 22(11), 1544-1553. DOI : 10.6109/jkiice.2018.22.11.1544