Acknowledgement
이 논문은 2024학년도 백석대학교 학술연구비 지원을 받아 작성되었음
References
- John Kindervag, "No More Chewy Centers: TheZero Trust Model Of Information Security,"Forrester, 2016.
- Zero Trust Architecture, NIST SP 800-207, 2020 https://csrc.nist.gov/pubs/sp/800/207/final
- Y.J.Choi, Y.J.Jeong, M.H.Lee, "Zero Trust Standard Model Checklist Based on NIST 7 Tenets", Review of KIISC, Vol.34, Issue.3, pp.5-12
- Vasu Jakkal, "Zero Trust Adoption Report,"Microsoft Security, 2021.
- Delinea, "What is Zero Trust and Zero TrustExtended (ZTX)https://delinea.com/what-is/zero-trust-and-zero-trust-extended.
- https://www.trendmicro.com/ko_kr/what-is/what-is-zero-trust/secure-access-service-edge.html
- W.H.Yoon, H.J.Lee, "For the difficult and arduous journey of zero trust, "2023 Second Cybersecurity Coalition Report", pp.28-43, 2023.
- National Institute of Standards and Technology, "Implementing a Zero Trust Architecture," NISTSP 1800-35, 2022.
- K.H.Lee "IA Study on the Infringement Incident Response Curriculum Model in IoT Environmentt". Journal of Internet of Things and Convergence, Vol.9, No.3, pp.55-60, 2023. https://doi.org/10.20465/KIOTS.2023.9.3.055
- H.W.Kim. "Intrusion response methods in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.28, No.4, 739-749, 2018.
- J.H.Lee, "Security threats and response methods in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.27, No.4, 697-706. 2017.
- Y.M.Park, "Training program model for intrusion response in the Internet of Things (IoT) environment". Journal of the Korea Institute of Information Security and Cryptology, Vol.29, No.4, 795-804. 2019.
- "The Internet of Things (IoT): A Security Perspective", by Andrew S. Tanenbaum and Maarten van Steen, in "The New Internet", edited by Andrew S. Tanenbaum and Maarten van Steen, 2010.
- "Security in the Internet of Things", by Richard E. Smith, in "The Internet of Things: A Systems Perspective", edited by Richard E. Smith, 2015.
- K.H.Lee, "A Study on a Project-based Blockchain Web Developer Education Model Customized for Companies", Journal of Internet of Things and Convergence, Vol.8, No.4, pp.77-83, 2022. https://doi.org/10.20465/KIOTS.2022.8.4.077
- M.G.Lee, "A Development of Curriculum for Information Security Professional Manpower Training", Journal of the Institute of Electronics and Information Engineers, Vol.54, No.1, pp.46-52, 2017. https://doi.org/10.5573/IEIE.2017.54.1.046