최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기스마트미디어저널 = Smart media journal, v.12 no.5, 2023년, pp.46 - 57
김민규 (가천대학교 정보보호학과) , 강찬영 (가천대학교 컴퓨터공학부 (스마트보안전공)) , 이석준 (가천대학교 컴퓨터공학부 (스마트보안전공))
As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly...
채재병, 김일기, "코로나19 팬데믹에 따른 사이버공격 변화 양상과 대응방안," 국가안보전략연구원,?2021년 8월
Defense Information Systems Agency(DISA) and?National Security Agency(NSA), "Zero Trust?Reference Architecture Version 2.0," Jul. 2022.
J. Kindervag, "No More Chewy Centers:?Introducing the Zero Trust Model of Information?Security," Forrester, Sep. 2010.
R. Ward and B. Beyer, "BeyondCorp - A New?Approach to Enterprise Security," ;login:, Vol.?39, No. 6, pp. 6-11, Dec. 2014.
"Executive Order 14028, Improving the Nation's?Cybersecurity," Nist, May 2021.
이선아, 김범석, 이혜인, 박원형, "제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구," 한국정보통신학회논문지, 제26권, 제2호, 265-270쪽, 2022년 2월
J. Chaffetz, "The OPM Data Breach: How the?Government Jeopardized Our National Security?for More than a Generation," Committee on?Oversight and Government Reform, Sep. 2016.
S.M. Kerner, TechTarget, Colonial Pipeline hack?explained: Everything you need to know(2022),?https://www.techtarget.com/whatis/feature/Colonial-Pipeline-hack-explained-Everything-you-need-to-know (Accessed Feb., 17, 2023).
CISA, "Pipeline Cybersecurity Initiative Fact?Sheet," CISA, Apr. 2021.
DEV-0537 criminal actor targeting organizations?for data exfiltration and destruction (2022).?https://www.microsoft.com/en-us/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/?(Accessed Feb., 17, 2023).
NIST, "Zero Trust Architecture," NIST SP?800-207, Aug. 2020.
"Moving the U.S. Government Toward Zero?Trust Cybersecurity Principles," OMB, Jan.?2022.
CISA, "Zero Trust Maturity Model -?Pre-decisional Draft Version 1.0," CISA, Jun.?2021.
NCSC, "Zero trust architecture design?principles," NCSC, Jul. 2021.
GCPJ, "Approach to Zero Trust deployment in?Japanese Government Information System,"?GCPJ, Jun. 2020.
"Technical specification for zero trust system,"?T/CESA 1165-2021, 2021년 7월
"??安全?准化工作月?," 全?信息安全?准化技?委?? (2022)?https://www.tc260.org.cn/front/postDetail.html?id20220610190100 (Accessed Jun., 10, 2022).
CSA, "The Singapore Cybersecurity Strategy?2021," CSA, Oct. 2021.
임수연, "정보보호산업의 전략적 육성 방안," 과학기술정보통신부, 2022년 2월
김남승, "최근 사이버위협 동향 및 대응방안," 과학기술정보통신부, 2022년 4월
김승열, "디지털 질서를 위한 새로운 보안 체계를?마련한다," 과학기술정보통신부, 2022년 10월
AWS, "Zero Trust architectures: An AWS?perspective,"https://aws.amazon.com/ko/blogs/security/zero-trust-architectures-an-aws-perspective/ (Accessed Apr., 2021).
"Zero Trust Deployment Guide for Microsoft?Azure Active Directory," Microsoft, Apr. 2020.
SAP, Cloud Platform(2021).?https://www.sap.com/korea/products/cloud-platform.html (Accessed Feb., 17, 2023).
Akamai, Getting Started with Your Zero Trust?Strategy (2022).?https://www.akamai.com/our-thinking/zero-trust/where-to-start-with-zero-trust-security?(Accessed Feb., 17, 2023).
Genians, 제로트러스트(Zero Trust)를 품은?Genian NAC(2021).?https://www.genians.co.kr/blog/zero-trust?(Accessed Feb., 17, 2023).
MLsoft, "Tgate SDP(2020),"?http://www.mlsoft.com/product-tgatesdp?(Accessed Feb., 17, 2023).
FASOO, Build a True Zero-Trust Data Security?Platform (2022).?https://en.fasoo.com/news-and-events/new-videobuild-a-true-zero-trust-data-security-platform/?(Accessed Feb.,17, 2023).
김종식, "금융분야 클라우드 및 망분리 규제 개선방안," 금융위원회, 2022년 4월
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.