최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.17 no.12, 2013년, pp.2753 - 2762
손유승 (Department of Computer Science, Suwon University) , 남길현 (KISTI ReSeat Program) , 고승철 (Department of Information Security, Suwon University)
Recently the paradigm of cyber attacks is changing due to the information security technology improvement. The cyber attack that uses the social engineering and targets the end users has been increasing as the organization's systems and networks security controls have been tightened. The 91% of APT(...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Herndon, Va. Ponemon Institute Discovers Majority of Business Leaders Underestimate Risk of Advanced Cyber Threats. http://www.prnewswire.com/news-releases
Trend Micro Inc., "Spear-Phishing Email: Most Favored APT Attack Bait", Trend Micro Incorporated Research Paper, 2012
Larry Seltzer. How the RSA SecurID Hack Worked. http://www.pcmag.com/article2/0,2817,2382970,00.asp
FireEye, Inc. "Spear Phishing Attacks Why They are Successful and How to Stop Them", White Paper, 2012
John H.Sawyer. How Attackers Target and Exploit Social Networking Users. http://www.darkreading.com/end-user/how-attakers-target-and-exploit-social/240160011
IBM Software Thought Leadership, "Proactive response to today's advanced persistent threats", White Paper, 2013
Cyveillance, (August 2010). Malware Detection Rates for Leading AV Solutions. http://www.cyveillance.com/web/
Patrik Runald. What is Scaring Business the Most? Spear-phishing. http://community.websense.com/blogs/we bsense-insights/archive/2012/10/08/what-is-scaring-business-the-most-spear-phishing.aspx
Dave Shackleford. Social engineering penetration testing: Four effective techniques. http://searchsecurity.techtarget.com/tip/Social-engineering-penetration-testing-Four-effective-techniques
AhnLab Inc. TrusWatcher Brochure. http://download.ahnlab.com/kr/site/brochure/TrusWatcher_Brochure.pdf
Trend Micro Inc. Deep Scan Brochure. http://www.trendmicro.co.kr/cloud-content/kr/pdfs/business/datasheets/deepscan.pdf
FireEye Inc. Email Malware Protection System Brochure. http://www.fireeye.com/ko/resources/pdfs/fireeye-email-malware-protection.pdf
Websense Inc. TRITON Web Security Gateway Anywhere. http://www.websense.com/assets/reports/websense-miercom-report.pdf
Micor Plus Co. Symantec Endpoint Protection 12. http://www.mplsoft.co.kr/entry/
Arun Vishwanath, Tejaswini Herath, Rui Chen, Jingguo Wang, H.Raghav Rao, "Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model", Decision Support System 51, pp. 576-586, 2011
Boannews Inc. The shadow of Webshell behind hacking incident. http://www.boannews.com/media/view.asp?idx37444
Bimal Parmar, "Protecting against spear-phishing", Computer Fraud & Security, pp. 8-11, Jan. 2012
Tracey Caldwell, "Spear-phishing: how to spot and mitigate the menace", Computer Fraud & Security, pp. 11-16, Jan. 2013
Rebecca Greenfield. How to Avoid Getting Spear Phished by China's Hackers Who Cracked Apple. http://www.theatlanticwire.com/technology/2013/02/spear-phishing-security-advice/62304/
Yu-seung Sohn, Kil-hyun Nam, Seung-chul Goh, "A spear phishing threat and the prevention method for the end user", KIICE Conference in Mokpo, May, 2013.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.