Acknowledgement
본 논문은 2020년도 정부(교육부)의 재원으로 한국연구재단의 지원을 받아 수행된 기초연구사업임 (NRF-2020R1I1A3069008)
References
- J. H. Lee and H. Y. Kwon, "A Study on Human Vulnerability Factors of Companies : Through Spam Mail Simulation Training Experiments" The Journal of Korea Institute Of Information Security And Cryptology, vol. 29, no. 4, pp. 847-857, Aug. 2019.
- S. Bal, C. Cun, and P. Cer, "Five Steps To A Zero Trust Network : Zero Trust Is The Blueprint For Your Security Architecture" Forrester Research Report, Oct. 2018.
- Y. J. Jeon, "Security and Trust on Non-Contact Financial Transaction", Digital Convergence Journal, Vol.19, No.7, pp.147-154, 2021.07.
- Cisco, "Cisco Duo Security Zero Trust Solution for User and Device Security", CISCO systems Korea Ltd, Seoul, 2020
- S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero Trust Architecture, NIST Special Publication 800-207, 2020.
- S. Y. Kim, K. H. Jeong, Y. N. Hwang, and D. H. Nyang, "Abnormal Behavior Detection for Zero Trust Security Model Using Deep Learning" Korea Information Processing Society Collection of academic papers, Vol.28, No.1, pp.132-135, 2021.
- J. Y Chun, Zero trust basis of network security strategy, IDG Summary AKAMAI MEGAZONE, 2021.
- A. Kerman, O. Borchert, S. Rose, and A. Tan, Implementing a zero trust architecture, The MITRE Corporation, Tech. Rep, 2020.
- M. J. Hwang, Microsoft Zero Trust Network Strategy and Implementation Plan, Microsoft Cyber Security Solutions Group, 2020.
- R. Vanickis, P. Jacob, S. Dehghanzadeh, and B. Lee, "Access Control Policy Enforcement for Zero-Trust-Networking" 2018 29th Irish Signals and Systems Conference (ISSC), pp.1-6, 2018.
- R. Riccardo and M. Repetto, "Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model" Future Generation Computer Systems, Vol.85, pp.235-249, 2018. https://doi.org/10.1016/j.future.2018.04.007
- H. B. Chang, "A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident" Convergence security journal, Vol.15 No.7, pp.39-45, 2015
- G. Anil, "A Zero-Trust Security Framework for Granular Insight on Blind Spot and Comprehensive Device Protection in the Enterprise of Internet of Things (E-IOT)" BMS Institute of Technology, 2021.
- K. D. Uttecht, "Zero Trust (ZT) Concepts for Federal Government Architectures" Massachusetts inst of tech lexington United States, 2020.
- Chou, T. S. "Security threats on cloud computing vulnerabilities" International Journal of Computer Science & Information Technology, pp. 79-88, 2013.