Digital Library
Search: "[ keyword: TA ]" (798)
유럽 PSD2 시행에 따른 금융분야 마이데이터 정책의 개인정보보호 강화 방안 연구
송미정,
김인석,
Vol. 29, No. 5, pp. 1205-1219,
10월.
2019
10.13089/JKIISC.2019.29.5.1205
주제어: PSD2, open banking, Mydata, Data Portability, PSD2, open banking, Mydata, Data Portability
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: PSD2, open banking, Mydata, Data Portability, PSD2, open banking, Mydata, Data Portability
금융 클라우드의 데이터 국지화에 대한 비판적 고찰
장우경,
김인석,
Vol. 29, No. 5, pp. 1191-1204,
10월.
2019
10.13089/JKIISC.2019.29.5.1191
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Cloud computing, Data Localization, information security, Improvement of Regulations, Cloud computing, Data Localization, information security, Improvement of Regulations
위험 평가 모델 기반의 정량적 사이버 보안 평가 체계
김인경,
박남제,
Vol. 29, No. 5, pp. 1179-1189,
10월.
2019
10.13089/JKIISC.2019.29.5.1179
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Risk Assessment, Cyber security Scoring System, Quantitative Risk Model, Risk Assessment, Cyber security Scoring System, Quantitative Risk Model
취약점 데이터베이스 기반 개선된 보안관제 모델의 효과성 연구
현석우,
권태경,
Vol. 29, No. 5, pp. 1167-1177,
10월.
2019
10.13089/JKIISC.2019.29.5.1167
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat, Vulnerability Database, security vulnerability, Security Operation, Infringement Accident, Cyber Threat
한국군 환경에 적합한 내부자(위협) 정의 및 완화방안 제안
원경수,
김승주,
Vol. 29, No. 5, pp. 1133-1151,
10월.
2019
10.13089/JKIISC.2019.29.5.1133
주제어: Insider, Insider threat, Mitigation, defense IT, military IT, Insider, Insider threat, Mitigation, defense IT, military IT
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Insider, Insider threat, Mitigation, defense IT, military IT, Insider, Insider threat, Mitigation, defense IT, military IT
개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구
이영상,
박원환,
신동선,
원유재,
Vol. 29, No. 5, pp. 1117-1132,
10월.
2019
10.13089/JKIISC.2019.29.5.1117
주제어: Personal Data Use and Protection, Data Governance, Data Governance Maturity Model, Personal Data Use and Protection, Data Governance, Data Governance Maturity Model
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Personal Data Use and Protection, Data Governance, Data Governance Maturity Model, Personal Data Use and Protection, Data Governance, Data Governance Maturity Model
미국 공급망 보안 관리 체계 분석
손효현,
김광준,
이만희,
Vol. 29, No. 5, pp. 1089-1097,
10월.
2019
10.13089/JKIISC.2019.29.5.1089
주제어: Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM, Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM, Supply Chain Risk Management, Supply Chain Evaluation and Verification, Supply Chain Attack, SCRM
원전디지털자산 사이버보안 규제 요건 개발을 위한 보안조치 적용 방안에 대한 분석
김인경,
변예은,
권국희,
Vol. 29, No. 5, pp. 1077-1088,
10월.
2019
10.13089/JKIISC.2019.29.5.1077
주제어: Nuclear digital assets, Cyber Security, Regulation, Nuclear digital assets, Cyber Security, Regulation
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Nuclear digital assets, Cyber Security, Regulation, Nuclear digital assets, Cyber Security, Regulation
FIDO2 CTAP을 활용한 전자서명 방법
조한구,
이경호,
Vol. 29, No. 5, pp. 1049-1062,
10월.
2019
10.13089/JKIISC.2019.29.5.1049
주제어: FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in, FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in, FIDO2, CTAP, WebAuthn, certificate, ActiveX, Plug-in
프로그램 분석을 위한 정적분석 기반 역추적 제어흐름그래프 생성 방안 모델
박성현,
김연수,
노봉남,
Vol. 29, No. 5, pp. 1039-1048,
10월.
2019
10.13089/JKIISC.2019.29.5.1039
주제어: Static Analysis, Symbolic Execution, Binary Vulnerability, Control Flow Graph, Static Analysis, Symbolic Execution, Binary Vulnerability, Control Flow Graph
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Static Analysis, Symbolic Execution, Binary Vulnerability, Control Flow Graph, Static Analysis, Symbolic Execution, Binary Vulnerability, Control Flow Graph