k. Moon ,S. Kim, “Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness” Journal of The Korea Institute of Information Security & Cryptology VOL.27, NO.4, pp898~911. Aug. 2017.
Y. Wang, Y. Xiang, W. L. Zhou, and S. Z.Yu, “Generating regular expression signatures for network traffic classification in trusted network management,” J. Netw. Comput. Appl., vol. 35, pp. 992-1000, May 2012
William Stallings, Lawrie Brown ,"Computer Security Principles and Practice", 2016, pp332~334
T.Y. Lee, D.G. Park, “Evaluation Criteria for Control System Based on K-ISMS”, Korean Institute of Information Technology, The Journal of Korean Institute of Information Technology 12(8), 2014.8, pp107-122
K. Shim, S. Yoon, S. Lee, S. Kim, W. Jung and M. Kim, “Automatic Generation of Snort Content Rule for Network Traffic Analysis”, The Journal of Korean Institute of Communications and Information Sciences '15-04 Vol.40 No.04 p666~277, 2015
Gartner, “Worldwide NGFW Appliance”, 2013
Gartner, “Defining the Next-Generation Firewall ”, 2009
C. Moon, “An Empirical Study on the Impact of Enterprise's Performance on Personal Information Protection Execution”, Journal of KIIT. Vol. 14, No. 3, 2016, pp. 97-106
C. Lim, “Effective way of awareness-raising of information security,”Journal of the Korea Institute of Information Security & Cryptology, 16(2), pp. 30-36, Apr. 2006.
B. Park, Y. Won, J. Chung, M. S. Kim, and J. W. K. Hong, “Fine-grained traffic classification based on functional separation,”Int. J. Netw. Management, vol. 23, pp. 350-381, Sept. 2013.
Ahnlab, “http://www.ahnlab.com”
보안이슈
A Government Agency Environment Protects Information System Design using Intrusion Prevention System and Role-Base Security Policy