Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡ : üũ¸®½ºÆ® Á¢±Ù¹æ¹ý

±èÁ¾¼® (±¤¿î´ëÇб³ ´ëÇпø)

±¹¹®¿äÁö

Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡; üũ¸®½ºÆ® Á¢±Ù¹æ¹ý

±¤¿î´ëÇб³ ´ëÇпø °æ¿µÇаú ±è Á¾ ¼®

À§Çè°ü¸®´Â ±â¾÷ÀÇ Á¤º¸½Ã½ºÅÛÀÇ ¼Õ½ÇÀ» ÃÖ¼ÒÈ­ÇÏ´Â °ÍÀ¸·Î ÃÖ±Ù µé¾î ï×ÜÃÐü âú(Á¤º¸½Ã½ºÅÛ)ÀÇ ±Þ°ÝÇÑ ¹ß´Þ°ú ±â¾÷ȯ°æÀÌ º¯È­ÇÔ¿¡ µû¶ó °æ¿µÀÚµéÀº ±â¾÷ Àüü ÀÇ Á¤º¸½Ã½ºÅÛ À§Çè°ü¸®¿¡ ´ëÇØ Áö¼ÓÀûÀÎ °ü½ÉÀÇ Áõ°¡¸¦ °¡Á®¿À°Ô ÇÏ´Â °è±â°¡ µÇ¾ú´Ù. ±â¾÷ÀÇ Á¤º¸½Ã½ºÅÛ¿¡ ´ëÇÑ ¼Õ½ÇÀ» ÃÖ¼ÒÈ­Çϰųª ȸÇÇÇÏ´Â ¹æ¹ýÀ¸·Î °æ¿µÀÚµéÀº ´Ù¾çÇÑ Á¤¼ºÀû ¡¤Á¤·®Àû À§ÇèºÐ¼® ¹æ¹ý·ÐÀ» »ç¿ëÇØ ¿Ô´Ù. Á¤º¸º¸¾ÈÀÇ °ßÁö¿¡¼­ Á¤º¸½Ã½ºÅÛÀÇ ºñ¹Ð¼º,¹«°á¼º, °¡¿ë¼ºÀÇ »ó½ÇÀº ±â¾÷ °æ¿µÀ» ¼öÇàÇϴµ¥ Á¶Á÷ÀÇ ´É·Â¿¡ ¿µÇâÀ» ÁØ´Ù. Á¤º¸½Ã½ºÅÛÀÇ À§ÇèºÐ¼®Àº Á¤º¸½Ã½ºÅÛÀÇ ÀÚ»ê°ú Á¤º¸½Ã½ºÅÛÀÇ Àڻ꿡 ´ëÇÑ À§ÇùÀ» ½Äº°Çϰí, À§Çù¿¡ ´ëÇÑ ÀÚ»êÀÇ Ãë¾à¼ºÀ» °áÁ¤Çϰí, º¸¾È´ëÃ¥À» ¼ö¸³ÇÏ¿© ÀÌ¿¡ ´ëÇÑ ºñ¿ëÃʰúºÐ¼®À» ½Ç½ÃÇÏ¿© Á¤º¸½Ã½ºÅÛÀÇ À§ÇèÀ» ÃÖ¼ÒÈ­ÇÏ´Â °úÁ¤ ÀÌ´Ù.

Ãë¾à¼ºÀÇ °³³äÀº Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®¿¡¼­ Áß¿äÇÑ ¿ªÇÒÀ» Â÷ÁöÇÑ´Ù. ÀϹÝÀûÀ¸·Î, Ãë¾à¼ºÀº ´ÙÀ½ÀÇ ¼¼°¡Áö·Î Á¤ÀǵǴµ¥ ù°´Â Ãë¾à¼ºÀ» ÀÚ»êÀÇ ¼Ó¼ºÀ¸·Î º¸´Â °ÍÀ̰í, µÑ°´Â ÀÚ»ê°ú À§Çù»çÀÌÀÇ °ü°è,¼¼Â°´Â º¸¾È´ëÃ¥ÀÇ °áÇÌÀ¸·Î º¸´Â °ÍÀÌ´Ù. º» ¿¬±¸¿¡¼­´Â Ãë¾à¼ºÀÇ °³³äÀ» º¸¾È´ëÃ¥ÀÇ °áÇÌÀ¸·Î Á¤ÀÇÇÏ¿´´Ù.

º» ¿¬±¸¿¡¼­´Â Á¤º¸½Ã½ºÅÛ êËúÏÝÂà°¿¡¼­ À§Çù¿¡ ´ëÇÑ ÀÚ»êÀÇ Ãë¾à¼ºÀ» ÞÀçÓæÚ Ï¼¸¦ ÅëÇØ Ãë¾à¼ºÀ» Æò°¡Çϰí ÜÁäÌÓßóþÀ» Á¦½ÃÇÏ¿´´Ù. ÀÌ ¿¬±¸¸¦ À§Çؼ­ Wood at al(1987)ÀÌ Á¦½ÃÇÑ LLNL üũ¸®½ºÆ® ¹ýÀ» ¿ì¸®³ª¶ó ½ÇÁ¤¿¡ ¸Â°Ô ¼öÁ¤ÇÑ LLNL üũ¸®½ºÆ®¸¦ ÀÌ¿ëÇÏ¿© ¿Ü±¹ HÀºÇàÀÇ ±¹³»ÁöÁ¡¿¡ ´ëÇØ 800¿©°³ÀÇ Áú¹®°ú Á¤º¸½Ã½ºÅÛ ÇöȲ¿¡ ´ëÇÑ Áú¹®À¸·Î »ç·Ê¿¬±¸¸¦ ÇÏ¿´´Ù.

º» ¿¬±¸´Â 5ÀåÀ¸·Î ´ÙÀ½°ú °°ÀÌ ±¸¼ºµÇ¾î ÀÖ´Ù.

ð¯ 1 íñÀº º» æÚϼÀÇ ÀüüÀûÀÎ ³íÁöÀÎ æÚϼæ°îÜ, æÚϼ۰Ûö, æÚϼÛôê̸¦ ¾à¼úÇÑ´Ù.

ð¯ 2 íñÀº Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡¸¦ À§ÇÑ Ã¼Å©¸®½ºÆ® Á¢±Ù¹æ¹ýÀÇ ÀÌ·ÐÀû ü °è¸¦ ±¸ÃàÇÑ´Ù. À̸¦ À§ÇÏ¿© ð¯ 1 ソ¡¼­´Â Á¤º¸½Ã½ºÅÛ êËúÐ/¿ä¾È η×âÀÇ °³³ä°ú êËúÏÝÂà°ÀÇ ÀýÂ÷¸¦ ±â¼úÇÏ¿´°í, ð¯ 2 ï½Àº Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡ÀÇ °³³ä¿¡ ´ëÇØ¼­ ±â¼úÇÏ¿´´Ù.

ð¯ 3 íñ¿¡¼­´Â ð¯ 2íñ¿¡¼­ °íÂûµÈ °³³äÀ» ±Ù°Å·Î ÇØ¼­ ð¯ 1 ソ¡¼­´Â Á¤º¸½Ã½ºÅÛ êËúÏÝÂà°ÀÇ ÀϹÝÀûÀÎ ¹æ¹ýÀ» ±â¼úÇÏ¿´°í, ð¯ 2 ソ¡¼­´Â Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡¸¦ À§ÇÑ Á¢±Ù ¹æ¹ýÀ¸·Î üũ¸®½ºÆ® Á¢±Ù ¹æ¹ý°ú ¼ÒÇÁÆ®¿þ¾î Á¢±Ù ¹æ¹ýÀ» Á¦½Ã ÇÏ¿´´Ù. ð¯ 3ï½Àº ÀÌ æÚϼÀÇ ¹æ¹ýÀΠüũ¸®½º Á¢±Ù ¹æ¹ý Áß LLNLüũ¸®½ºÆ®ÀÇ ±¸ Á¶¸¦ ºÐ¼®ÇÏ¿´´Ù.

ð¯ 4 íñÀº ÞÀçÓæÚϼÀÇ ¹æ¹ý°ú °á·ÐÀ» ¼³¸íÇϱâÀ§ÇØ ð¯ 1 ソ¡¼­´Â »ç·Êȸ»çÀÇ Á¤º¸½Ã½ºÅÛ ÇöȲÀ» ÆÄ¾ÇÇϰí, ð¯ 2ソ¡¼­´Â »ç·Êȸ»çÀÇ Á¤º¸½Ã½ºÅÛ ÀÚ»ê ¹× À§ÇùÀ» ÆòÇϰí, ð¯ 3 ソ¡¼­´Â LLNLüũ¸®½ºÆ® Á¢±Ù¹æ¹ýÀ» ÅëÇØ Ãë¾à¼ºÀ» Æò°¡ÇÏ¿´´Ù.

ð¯ 5íñÀº °á·Ð ºÎºÐÀ¸·Î¼­ æÚϼÀÇ °á°ú¸¦ ¿ä¾àÇÏ°í æÚϼÀÇ ÇѰèÁ¡°ú ÇâÈÄ æÚϼΤ𹸦 Á¦½ÃÇÏ¿´´Ù. º» ¿¬±¸ÀÇ ¸ñÀûÀº Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡¿Í º¸¾È´ëÃ¥¿¡ ´ëÇÑ ºÐ¼®ÀûÀÎ ±â¼ú À» Çϴµ¥ ÀÖ´Ù. º» ¿¬±¸´Â Á¤º¸½Ã½ºÅÛÀÇ ¸ðµç »óȲ¿¡ ´ëÇÑ ÀϹÝÀûÀÎ ÇØ¸¦ Á¦°øÇÏ ´Â °ÍÀÌ ¾Æ´Ï°í »ç·Ê¿¡ ´ëÇÑ ÀûÇÕÇÑ ÇØ¸¦ Á¦°øÇÏ´Â °ÍÀÌ´Ù. º» ¿¬±¸ÀÇ Çй®Àû ±â¿©´Â ÀÌ·ÐÀû ü°èÈ­ ¹× °³³ä Á¤¸²ÀÌ µÇ¾îÀÖÁö ¾ÊÀº Á¤º¸ ½Ã½ºÅÛ¿¡ ´ëÇÑ À§ÇèºÐ¼® ¹× º¸¾È ºÐ¾ß¿¡ ´ëÇØ ÀÌ·ÐÀû ½Ç¹«ÀûÀ¸·Î ±â¿©Çϴµ¥ ÀÖ´Ù.

(ABSTRACT)

Vulnerability Assessment for IS: Checklist Approach

Jong Seok, Kim Department of Business Administration The Graduate School, Kwang Woon University

As Information System (IS) has become increasingly important In the competitive position of firms, managers have grown more sensitive to their organization's overall IS risk management. In an attempt to minimize or avoid such losses, managers are employing various qualitative and quantitative risk analysis methodologies. Any loss of confidentiality, integrity or availability in terms of information security may have impact on the capability of an organization to carry out its business. risk unysis is the Process managers use to examine the throats facing their IS assets and the vulnerabilities of those assets to the risk. Risk analysis consists of identifying Information System assets, identifying threats to those assets and determining the vulnerability of asset(s) In threat(s) and establishing the appropriate security safeguards for a system.

The concept of vulnerability plays an important role in risk analysis for information systems. In general, vulnerability is defined as three ways: 1) as an attribute of assets, 2) as a relationship between assets and threats, 3) as the absence of safeguards or controls. In this paper, we define vulnerability as the absence of safeguards or controls. This paper proposes case study for vulnerability assessment using LLNL checklist approaches and provides safeguards for IS. This paper consists of five chapters as follows

The first chapter descrives the purposes, methodology, scope for this study. The second chapter reviews the existing approaches using checklist for IS vulnerability. We descrive the concept of risk/security management procedure of risk analysis and ȕle vulnerability assessment for IS.

The third chapter descrives a general procedure of IS risk analysis and introduces several methods using checklist approach and software approach for IS vulnerability assemest, as well as LLNL checklist structure.

The forth chapter is to examine IS vulnerability assessment. We descrive current information system environment prior to comprehensive risk analysis it is essentiʾ to determine what constitutes the IS environment of an organization in terms of hardware, software, humanware and data. We assess IS vulnerability and suggest safeguards.

The fifth chapter summaries conclusion and suggests limitation of this study and future study.

The purpose of this paper is to provide an analytical description of IS vulnerability assessment and safeguard. This paper is not in intended to a generic solution for any situation the case must be examined on its own merits and appropriate actions selected. Major implication of this study suggests a conceptual/practical foundation for Risk Analysis of Information Technology (Information System) .

Key Words: Information system(151, Information Technology, Risk Management, Risk Analysis, Vulnerability Assessment, Security, Checklist Approach, Safeguard

ð¯ 1 íñ ßí ÒÕ

ð¯ 1 ï½ æÚϼÙÍîÜ

80³â´ë¿¡ µé¾î¼­¸é¼­ Á¤º¸Åë½ÅÀ̳ª ÀÚµ¿È­ µîÀÇ ¿µ¿ª¿¡±îÁö ´Ù¾çÇÑ ±â¼ú°ú ¼­ºñ½º¸¦ Á¦°øÇØ Áֱ⠽ÃÀÛÇϸ鼭 ÄÄÇ»ÆÃ(computing)ÀÇ »õ·Î¿î ½Ã´ë°¡ ½ÃÀ۵Ǿú°í ÀÌ ¸¦ Á¤º¸±â¼ú½Ã´ë(Information Technology Era)¶ó ºÎ¸£°Ô µÇ¾ú´Ù. Á¤º¸±â¼úÀº ±â¾÷ ÀÌ Ãß±¸ÇÏ´Â ¸ñÀûÀ» ´Þ¼ºÇϴµ¥ ÇÊ¿äÇÑ ±â¼úÀ» Á¦°øÇØ ÁÖ´Â ÄÄÇ»ÅÍ Çϵå¿þ¾î, ¼ÒÇÁÆ®¿þ¾î, µ¥ÀÌÅÍ´Â ¹°·Ð Åë½Å½Ã½ºÅÛ°ú ³×Æ®¿öÅ©¸¦ Æ÷ÇÔÇÏ°í ¶ÇÇÑ À̵éÀÌ Á¦°øÇÏ´Â »õ·Î¿î ¼­ºñ½º±îÁö¸¦ ÅëĪÇϴµ¥ Á¤º¸½Ã½ºÅÛÀ̶ó°íµµ ÇÑ´Ù.

Á¤º¸±â¼ú½Ã´ë¿¡¼­´Â Á¤º¸°¡ ÀçÈ­·Î¼­ÀÇ °¡Ä¡¸¦ ÀÎÁ¤ ¹ÞÀ¸¸ç ÄÄÇ»ÅÍ¿Í Àü»ê¸ÁÀ» ÅëÇÏ¿© À¯ÅëµÇ´Â Á¤º¸·®ÀÌ ´ë·®È­ µÇ°í »çȸÀü¹Ý¿¡ ¹ÌÄ¡´Â Á¤º¸ÀÇ ¿ªÇÒÀÌ °¡Àå Áß¿äÇÏ°Ô ÀνĵȴÙ. ¿ì¸® ³ª¶ó¿¡¼­´Â ÇàÁ¤Àü»ê¸ÁÀ» ½ÃÁ¡À¸·Î ÇØ¼­ ±¹°¡ ±â°£ Àü»ê¸ÁÀÌ È®´ëµÇ¾î Á¤ÂøµÇ¾î °¡°í ÀÖÀ¸¸ç Çѱ¹Åë½Å, µ¥ÀÌÄÞ µîÀÇ °øÁß Åë½Å¸Á »ç¾÷Àڵ鿡ÀÇ ÇÑ ´Ù¾çÇÑ Á¤º¸ ¼­ºñ½º°¡ ´õ¿í °¡¼ÓÈ­µÇ°í ÀÖ´Ù. ¿ì¸® Á¤ºÎ´Â ±¹Á¦°æÀï·ÂÀ» Çâ»ó½Ã۱â À§ÇÑ Á¤º¸ °í¼ÓÈ­ Àü»ê¸Á ±¸ÃàÀ» ÃßÁøÇϰí ÀÖÀ¸¸ç Á¤º¸»çȸ¿¡¼­´Â Á¤ºÎ±â°ü »Ó¸¸ ¾Æ´Ï¶ó ¸ðµç ±â°£ »ê¾÷üµéµµ ÄÄÇ»ÅÍ¿Í Åë½Å±â¼úÀ» Æ÷ÇÔÇÏ´Â Á¤º¸½Ã½ºÅÛ(Á¤º¸ ±â¼ú:Information Technology)¿¡ ÀÇÁ¸ÇÏ¿© ¾÷¹«¸¦ ¼öÇàÇÒ ¼ö ¹Û¿¡ ¾ø´Â ȯ°æÀ¸·Î º¯¸ðµÇ°í ÀÖ´Ù.

ÀÌ¿Í ÇÔ²² Áß¿äÇÑ Á¤º¸¿¡ ´ëÇØ¼­ ºñ¹Ð¼º, ¹«°á¼º, °¡¿ë¼ºÀÌ »ó½ÇµÉ ¶§´Â »ç¾÷À» ¼öÇàÇÏ´Â Á¶Á÷ÀÇ ¿ª·®¿¡ ½É´ëÇÑ ¿µÇâÀ» ¹ÌÄ¡°Ô µÊ¿¡ µû¶ó Á¤º¸½Ã½ºÅÛ¿¡ ´ëÇÑ ÜÁäÌ Î·×â ô÷ͧ°¡ Àý½ÇÈ÷ ¿ä±¸µÈ´Ù. ±×·¯³ª Áö±Ý±îÁö Á¤º¸½Ã½ºÅÛÀº ÅëÇÕµÈ ½Ã½ºÅÛÀÇ °üÁ¡¿¡¼­ º¸´Ù´Â ºÎºÐÀûÀÎ °ü½É ºÐ¾ß¿¡¸¸ ¿ªÁ¡À» µÎ¾î °³¹ßµÇ°í °ü¸®µÇ¾î ¿ÔÀ¸¸ç Á¤ºÎ±â°ü ¹× ¹Î°£»çȸ Àüü¸¦ ´ë»óÀ¸·Î ÇÏ´Â ±¹°¡ÀûÀÎ Â÷¿ø¿¡¼­ÀÇ ÜÁäÌη×â°¡ ¼ÒȦÇÏ ¿´´Ù°í º¼ ¼ö ÀÖ´Ù. ÀÌÁ¦´Â Á¤º¸º¸¾ÈÀ̶ó´Â ¿ë¾îÀÇ Æ¯¼ö¼º¿¡ ÀûÇÕÇÑ Á¤º¸½Ã½ºÅÛ êËúÏη×â°¡ ÀÌ·ç¾îÁú ¼ö ÀÖµµ·Ï ü°èÀûÀÎ æÚϼ°¡ ¼öÇàµÇ°í À̸¦ µÞ¹ÞħÇÒ ¼ö ÀÖ´Â Á¶Á÷°ú Á¦µµ°¡ ±¸ÃàµÇ¾î¾ß ÇÒ ½ÃÁ¡¿¡ µµ´ÞÇÏ¿´´Ù°í º»´Ù. Á¤º¸½Ã½ºÅÛ êËúÐη×â´Â Á¤ º¸°¡ »ý»ê, ó¸®, Àü´Þ ¹× ÀúÀåµÇ°í ´Ù½Ã Æó±âµÇ´Â Á¤º¸ ½Ã½ºÅÛÀÇ ¼øÈ¯°úÁ¤¿¡¼­ Á¤º¸¿¡ ´ëÇÑ º¸¾ÈÀÌ ÀÌ·ç¾îÁöµµ·Ï °ü¸®ÇÏ´Â °ÍÀÌ´Ù.

º» æÚϼÀÇ ÀÇÀǷμ­´Â Á¤º¸½Ã½ºÅÛÀÇ êËúÏÝÂà°À» À§ÇØ Ã¹Â°, Á¤º¸½Ã½ºÅÛÀÇ ÜÁäÌ À» À§ÇÑ êËúÏÝÂà°À» À§ÇÑ (ÜÁäÌ)¼³°è¹æ¹ýÀ» ºÐ·ùÇϰí, µÑ°, ±âÁ¸ÀÇ Á¤º¸½Ã½ºÅÛÀÇ Ãë¾à¼ºÆò°¡¸¦ À§ÇÑ Ã¼Å©¸®½ºÆ®ÀÇ Ã¼°è¸¦ ±â¼úÇϰí, ¼¼Â°, ÞÀçÓæÚϼ¸¦ ÅëÇØ wood et al(1987)ÀÌ ÁÖÀåÇÑ LLNL üũ¸®½ºÆ® ¹ýÀ» ÅëÇÏ¿© Ãë¾à¼ºÀ» Æò°¡Çϰí, ³×°, »ç·Ê ȸ»çÀÇ º¸¾È´ëÃ¥À» Á¦½ÃÇÔÀ¸·Î½á ÇâÈÄ Á¤º¸½Ã½ºÅÛ ÜÁäÌ ºÐ¾ßÀÇ ÀÌ·ÐÀû ¡¤½Ç¹«ÀûƲÀ» Á¦°øÇϰíÀÚ ÇÑ´Ù.

ð¯ 2 ï½ æÚϼ۰Ûö

º» æÚϼ´Â »ç·ÊÁ¶»ç¸¦ ÅëÇÏ¿© Á¤º¸½Ã½ºÅÛÀÇ ÀÚ»ê ¹× À§Çù ¿ä¼ÒµéÀ» ÆÄ¾ÇÇϰí Á¤º¸½Ã½ºÅÛÀÇ Ãë¾à¼ºÀ» ½Äº°ÇÏ°í Æò°¡ÇÏ¿© ÜÁäÌÓßóþÀ» Á¦½ÃÇϱâÀ§ÇÑ Å½»öÀû æÚϼ (Exploratory research)ÀÌ´Ù. ÞÀçÓæÚϼ¸¦ À§Çؼ­´Â ¿Ü±¹ÀºÇàÀÇ º¸¾È´ã´ç Àü¹®°¡¿¡°Ô ÀÇ·ÚÇÏ¿© ÇöÀç Á¤º¸½Ã½ºÅÛÀÇ ÇöȲÀ» ÆÄ¾ÇÇϱâ À§ÇÑ Á¤º¸½Ã½ºÅÛÀÇ ÀϹݻçÇ׿¡ ´ëÇÑ Áú¹®°ú Á¤º¸½Ã½ºÅÛÀÇ À§Çè½ÇŸ¦ Æò°¡Çϱâ À§ÇÑ Áú¹®À» ½Ç½ÃÇÏ¿´´Ù. Á¤º¸½Ã½ºÅÛ À§Çè½ÇÅ Æò°¡ Áú¹®Àº Á¤º¸ ½Ã½ºÅÛÀÇ ÜÁäÌ¿¡ °ü·ÃµÈ LLNLüũ¸®½ºÆ® 857°³ Ç׸ñ¿¡¼­ ¿ì¸®³ª¶ó ½ÇÁ¤¿¡ ¸ÂÁö¾Ê´Â Ç׸ñÀ» Á¦¿Ü½ÃÄÑ ¼öÁ¤ÇÑ ÈÄ, 784°³ Ç׸ñ¿¡ ´ëÇØ Á¶»çÇÏ¿´´Ù.

Á¤º¸½Ã½ºÅÛ ÇöȲÆÄ¾ÇÀ» À§ÇÑ Áú¹®Àº ȸ»çÀÇ Àü¹ÝÀûÀÎ »óȲ ¹× ÀÀ´äÀÚ¿¡ ´ëÇÑ »çÇ×À» °³¹æÇü Áú¹®(open-ended question)À» ÅëÇÏ¿© ÃøÁ¤ÇÏ¿´°í, Á¤º¸½Ã½ºÅÛ Ãë¾à¼º ½ÇÅ Æò°¡¸¦ À§ÇÑ Áú¹®Àº ÀλçÁ¤Ã¥, ½Ã½ºÅÛ °³¹ß, ÈÆ·Ã1ÀνÄ, Á¶Á÷±¸Á¶, ¹°¸®Àû Á¢±Ù, µ¥ÀÌÅÍ¿Í ÇÁ·Î±×·¥ Á¢±Ù, µ¥ÀÌÅÍ ÀÔ1Ãâ·Â, µ¥ÀÌÅÍ Ã³¸®, µ¥ÀÌÅͺ£À̽º¿Í ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î, (¿ø°Ý)Åë½Å, Å͹̳Π»ç¿ë, ȯ°æ, ¹é¾÷°ú º¹±¸ µîÀÇ 13°³ ºÐ¾ßÀÇ Ã¼Å©¸®½ºÆ®·Î ³ª´©¾î Áú¹®À» üũ¸®½ºÆ® ¹æ½ÄÀ» ÅëÇÏ¿© ÃøÁ¤ÇÏ¿´´Ù.

üũ¸®½ºÆ®¸¦ ÅëÇÏ¿© ÃøÁ¤µÈ Áú¹®Àº °¢ ¹®Ç׸¶´Ù ¾ÆÁÖ ³ôÀ½(VH), ³ôÀ½(H), º¸Åë(M), ³·À½(L), ¾ÆÁÖ ³·À½(VL)ÀÇ 5µî±ÞÀ¸·Î °¡ÁßÄ¡¸¦ ºÎ¿©ÇØ °¢ ºÐ¾ß¿¡¼­ À§ÇùÇüÅ ¹× ½Ã½ºÅÛ ÀÚ»ê°ú ½Ã½ºÅÛ Á¢±Ù¹æ¹ý¿¡ µû¶ó ÅëÁ¦Ç¥¸¦ ¸¸µé¾î ÅëÁ¦Ç¥ÀÇ °¢ ¼¿(cell)¸¶´Ù °¡ÁߺñÀ²Áö¼ö(W), Àû¿ëÁö¼ö(AS), Á¶Á¤Áö¼ö(AS), ÃÖ´ëÁ¡¼ö(MPS)¸¦ °è»êÇÏ¿© Àü ü ÅëÁ¦Áö¼ö(CCI)¸¦ »êÃâÇÏ¿© ÇöÀç ½Ã½ºÅÛÀÇ ÅëÁ¦ Á¤µµ¸¦ ÃøÁ¤ÇÏ¿´´Ù.

ð¯ 3 ï½ æÚϼÛôêÌ

Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡¿¡ °üÇÑ æÚϼ´Â Á¤º¸½Ã½ºÅÛ°ú Á¤º¸½Ã½ºÅÛÀÇ ÜÁäÌ Á¤Ã¥ ¿¡ ´ëÇÑ Æø³ÐÀº Á¢±ÙÀ» ÇÊ¿ä·Î ÇÑ´Ù. ÀÌ·¯ÇÑ Á¢±ÙÀº Á¤º¸½Ã½ºÅÛ °ü¸®ÀÚÀÇ ÜÁäÌ Â¡ Ã¥¿¡ ´ëÇÑ Àü¹®°¡Àû ÀǰßÀ» ÅëÇØ ÀÌ·ç¾î Áø´Ù. º» æÚϼ´Â ´ÙÀ½°ú °°Àº ¹üÀ§ ³»¿¡¼­ Á¢±ÙÇϰíÀÚ ÇÑ´Ù.

ù°, ÀÚ»ê ºÐ¼®°ú Á¤º¸½Ã½ºÅÛÀÇ Àü¹ÝÀûÀÎ ÇöȲÀ» ÆÄ¾ÇÇÏ¿© »ç·Êȸ»çÀÇ Á¤º¸½Ã½ºÅÛÀ» ÆÄ¾ÇÇϰí, üũ¸®½ºÆ®¸¦ ÅëÇÏ¿© »ç·Êȸ»çÀÇ ÜÁäÌ »óŸ¦ ÆÄ¾ÇÇÑ´Ù.

µÑ°, æÚϼÀÇ ¼º°ÝÀº ÷®ßãîÜ æÚϼ(Exploratory research)·Î ÞÀçÓæÚϼ¸¦ ÅëÇÏ¿© Á¤º¸½Ã½ºÅÛ ÀÚ»êÀÇ À§Çù¿¡ ´ëÇÑ Ãë¾à¼ºÀ» Æò°¡ÇÏ¿© Á¤º¸½Ã½ºÅÛÀÇ ÜÁäÌÓßóþÀ» Àç½Ã ÇÑ´Ù.

¼¼Â°, Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡ÀÇ ¿¬±¸ ´ë»óÀÎ Á¤º¸½Ã½ºÅÛÀ» ÀλçÁ¤Ã¥, ½Ã½ºÅÛ °³¹ß, ÈÆ·Ã1ÀνÄ, Á¶Á÷±¸Á¶, ¹°¸®Àû Á¢±Ù, µ¥ÀÌÅÍ¿Í ÇÁ·Î±×·¥ Á¢±Ù, µ¥ÀÌÅÍ ÀÔ/Ãâ·Â, µ¥ÀÌÅÍ Ã³¸®, µ¥ÀÌÅͺ£À̽º¿Í ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î, (¿ø°Ý)Åë½Å, Å͹̳Π»ç¿ë, ȯ°æ, ¹é ¾ö°ú º¹±¸ÀÇ 13°³ ºÐ¾ß·Î ³ª´©¾î Á¤º¸½Ã½ºÅÛ °ü¸®ÀÚ¸¦ ÅëÇÏ¿© Æò°¡ÇÏ¿´´Ù.

º» ³í¹®Àº 5íñÀ¸·Î ϰà÷µÇ¾î ÀÖÀ¸¸ç °¢ íñÀÇ ÛôêÌ ¹× Ò®é»Àº ´ÙÀ½°ú °°´Ù.

ð¯ 1 íñÀº º» æÚϼÀÇ ÀüüÀûÀÎ ³íÁöÀÎ æÚϼÙÍîÜ, æÚϼ۰Ûö, æÚϼÛôê̸¦ ¾à¼úÇÑ´Ù.

ð¯ 2 íñÀº Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡¸¦ À§ÇÑ Ã¼Å©¸®½ºÆ® Á¢±Ù¹æ¹ýÀÇ ÀÌ·ÐÀû ü°è ¸¦ ±¸ÃàÇÑ´Ù. À̸¦ À§ÇÏ¿© ð¯ 1 ソ¡¼­´Â Á¤º¸½Ã½ºÅÛ êËúÏ1æ®äÌ Î·×âÀÇ °³³ä°ú êËúÏÝÂà°ÀÇ ÀýÂ÷¸¦ ±â¼úÇÏ¿´°í, ð¯ 2 ÀåÀº Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡ÀÇ °³³ä¿¡ ´ëÇØ¼­ ±â¼úÇÏ¿´´Ù.

ð¯ 3 íñ¿¡¼­´Â ð¯ 2 íñ¿¡¼­ °íÂûµÈ °³³äÀ» ±Ù°Å·Î ÇØ¼­ ð¯ 1 ソ¡¼­´Â Á¤º¸½Ã½ºÅÛ êËúÏÝÂà°ÀÇ ÀϹÝÀûÀÎ ¹æ¹ýÀ» ±â¼úÇÏ¿´°í,ð¯ 2ソ¡¼­´Â Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò °¡¸¦ À§ÇÑ Á¢±Ù ¹æ¹ýÀ¸·Î üũ¸®½ºÆ® Á¢±Ù ¹æ¹ý°ú ¼ÒÇÁÆ®¿þ¾î Á¢±Ù ¹æ¹ýÀ» Á¦½ÃÇÏ ¿´´Ù. ð¯ 3 ï½Àº ÀÌ æÚϼÀÇ ¹æ¹ýÀΠüũ¸®½º Á¢±Ù ¹æ¹ý Áß LLNLüũ¸®½ºÆ®ÀÇ ±¸Á¶ ¸¦ ºÐ¼®ÇÏ¿´´Ù.

ð¯ 4 íñÀº ÞÀçÓæÚϼÀÇ ¹æ¹ý°ú °á·ÐÀ» ¼³¸íÇϱâÀ§ÇØ ð¯ 1 ソ¡¼­´Â »ç·Êȸ»çÀÇ Á¤º¸½Ã½ºÅÛ ÇöȲÀ» ÆÄ¾ÇÇϰí, ð¯ 2ソ¡¼­´Â »ç·Êȸ»çÀÇ Á¤º¸½Ã½ºÅÛ ÀÚ»ê ¹× À§ÇùÀ» Æò°¡Çϰí, ð¯ 3 ソ¡¼­´Â Úì.NLüũ¸®½ºÆ® Á¢±Ù¹æ¹ýÀ» ÅëÇØ Ãë¾à¼ºÀ» Æò°¡ÇÏ¿´´Ù.

ð¯ 5 íñÀº °á·Ð ºÎºÐÀ¸·Î¼­ æÚϼÀÇ °á°ú¸¦ ¿ä¾àÇÏ°í æÚϼÀÇ ÇѰèÁ¡°ú ÇâÈÄ æÚϼΤ𹸦 Á¦½ÃÇÏ¿´´Ù. À̻󿡼­ »ìÆì º» æÚϼÀÇ Ï°à÷°ú Ò®é»Àº ´ÙÀ½ <±×¸² 1-1>°ú °°Àº ¿¬±¸ÀÇ Æ²·Î ¿ä¾àµÉ ¼ö ÀÖ´Ù.

ð¯ 2íñ Á¤º¸½Ã½ºÅÛ êËúÏη×â ¹× Ãë¾à¼º Æò°¡

ð¯ 1 ï½ Á¤º¸½Ã½ºÅÛ êËúÏη×â

Á¤º¸½Ã½ºÅÛ êËúÏη×â, ȤÀº ÜÁäÌη×â, ȤÀº êËúÏÝÂà°¿¡ ´ëÇÑ °³³äÀº ºÐ¸íÄ¡¾Ê´Ù. ±×·¯³ªêËúÏη×â¿¡ ´ëÇÑ °³³ä¿¡´Â µÎ°¡Áö °ßÇØ°¡ ÀÖ´Ù. <±×¸² 2-1>°ú °°ÀÌ Çϳª´Â êËúÏÝÂà°ÀÌ ÀýÂ÷»ó êËúÏη×â¿¡ Æ÷ÇԵȴٴ °ßÇØÀ̰í, ´Ù¸¥ Çϳª´Â ¼­·Î µ¶¸³µÈ ¿µ ¿ªÀ¸·Î ±¸ºÐµÈ´Ù´Â °ßÇØÀÌ´Ù.

êËúÏÝÂà°À̶õ Á¤º¸½Ã½ºÅÛ°ú ±× ÀÚ»êÀÇ ±â¹Ð¼º(confidentiality), ¹«°á¼º(integrity), °¡¿ë¼º(availability), ±â·Ï¼º(accountability)¿¡ ¿µÇâÀ» ¹ÌÄ¥ ¼ö ÀÖ´Â ´Ù¾çÇÑ À§Çù¿¡ ´ëÇØ¼­ ½Ã½ºÅÛÀÌ Ãë¾àÇÔÀ» ÀνÄÇϰí, ÀÌ·Î ÀÎÇØ¼­ ¿¹»óµÇ´Â ¼Õ½ÇÀ» ºÐ¼®ÇÏ´Â °ÍÀÌ ´Ù. êËúÏη×â¶õ ºÒÈ®½ÇÇÑ »ç°ÇÀÇ ÇÇÇØ¸¦ ½Äº°, ÅëÁ¦, ÃÖ¼ÒÈ­ÇÏ´Â Àü¹ÝÀûÀÎ ÀýÂ÷¿¡ °ü°èµÈ °æ¿µ°úÇÐÀÇ ÇÑ ºÐ¾ß·Î¼­, Á¤º¸±â¼úæ®äÌ êËúÏη×â´Â ÃøÁ¤/Æò°¡µÈ À§Çè¿¡ ´ëÇÑ ¾ÈÀüÁ¤Ã¥À» ÀÏÁ¤ ¼öÁرîÁö À¯Áö/°ü¸®ÇÏ´Â °ÍÀÌ´Ù.ÀÌ¿Í °°ÀÌ óëÜ®ºÐ¼®ÀÌ Æ÷ÇÔµÈ ±¤ÀÇÀÇ °³³äÀÌ êËúÏη×âÀ̰í, êËúÏÝÂà°ÀÌ Á¦¿ÜµÈ ÇùÀÇÀÇ êËúÏη×⸦ ÜÁäÌη×â¶ó°í ÇÏ´Â °ÍÀÌ Å¸´çÇÒ °ÍÀÌ´Ù.

ÇùÀÇÀÇ êËúÏη×â °³³ä°ú °ü·ÃÇØ¼­, Robin Moses(1992)¿¡ ÀÇÇϸé, êËúÏη×âÀÇ ¸ñÀûÀº êËúÏÝÂà° °á°ú¿¡ ÀÇÇØ¼­ ÇöÀçÀÇ º¸¾È¼öÁØÀ» Çã¿ëµÈ ¼öÁرîÁö ³ôÀ̱â À§Çؼ­ ÜÁäÌÓßóþÀ» ¸¶·ÃÇÏ´Â °ÍÀÌ´Ù. ´Ù½Ã ¸»Çؼ­, Á¤º¸½Ã½ºÅÛ êËúÏη×â´Â °æ¿µÃþÀÌ ¹Þ¾Æ µéÀÏ ¼ö ÀÖ´Â ¼öÁرîÁö À§ÇùÀÇ ºóµµ¿Í ¿µÇâÀ» °¨¼Ò½Ãų ¼ö ÀÖ´Â ÜÁäÌÓßóþÀ» ¼±Åà ÇÏ´Â °ÍÀÌ´Ù. ±×·¯³ª, ÜÁäÌη×â¶õ °³³äÀº À̺¸´Ù ´õ È­ÀåµÈ °³³äÀ¸·Î, ÜÁäÌÓßóþÀ» ¼±ÅÃÇØ¼­ ¼³Ä¡ÇÑ ÈÄ¿¡, À¯Áö1°ü¸®ÇÏ´Â °Íµµ Æ÷ÇԵǴ °ÍÀÌ´Ù. <±×¸² 2-2>´Â Á¤º¸½Ã½ºÅÛ À§Çè°ü¸®, À§ÇèºÐ¼®, º¸¾È°ü¸®ÀÇ °³³äÀ» µµ½ÄÈ­ ÇÑ °ÍÀÌ´Ù.

1979³â¿¡ ¹Ì±¹ »ó¹«¼º »êÇÏ NIST(National Institute of Standards and Technology)¿¡¼­ ¹ß°£ÇÑ FIPS Pub(Federal Information Processing Standards Publication) 65; Guideline for Automatic Data Processing Risk Assessment'¿¡¼­ ALE(Annual Loss Exposure)¸¦ ±Ù°Å·Î ÀÚ·á󸮿¡¼­ÀÇ À§Çè¿¡ ´ëÇØ¼­ ±â¼úÇÑ ¹Ù ÀÖ´Ù. 1990³â¿¡ ¹Ì±¹ ¹ý¹«¼ºÀÇ º¸¾È ¹× ºñ»ó±âȹ±¹¿¡¼­ ÁغñÇÑ êËúÏÝÂà°ÁöħÀ¸·Î¼­ 'SRAG(Simplified Risk Analysis Guidelines)'´Â NIST¿¡¼­ ´Ù¸¥ ±â°ü¿¡¼­µµ Ȱ¿ëÇÒ ¼ö ÀÖµµ·Ï °øÇ¥ÇÑ º¸¾È ÁöħÀÌ´Ù. ¿©±â¼­´Â êËúÏÝÂఴܰ踦 7´Ü°è·Î ±¸ºÐÇϰí, êËúÏ ÝÂà°´ë»óÀ» °³ÀοëÄÄÇ»ÅÍ, ÀÀ¿ë½Ã½ºÅÛ, ÁÖÀü»ê±â¿Í ¿ø°ÝÁ¢±ÙÀÌ °¡´ÉÇÑ ÀÚµ¿È­µÈ ½Ã½ºÅÛº°·Î ±¸ºÐÇϰí, À̵éÀ» ´Ù½Ã Á¤º¸ÀÇ ºñ¹Ð¼º ¿©ºÎ¿Í ¹Î°¨¼º(sensitivity)¿¡ µû ¶ó¼­ ±¸ºÐÇØ¼­ ±â¼úÇß´Ù.

1993³â EC(European Communities)¿¡¼­ 'êËúÏÝÂà°'À̶ó´Â º¸°í¼­°¡ ¹ßÇàÇß´Ù. ¿©±â¼­´Â ±âÁ¸ 66°³ êËúÏÝÂà°Û°ÛöµéÀ» ºÐ¼®ÇÏ¿© À¯·´ Àüü¿¡¼­ °øµ¿À¸·Î Ȱ¿ëµÉ ¼ö ÀÖ´Â ºÐ¼®¹æ¹ýÀ» °³¹ßÇϱâ À§Çؼ­ '¿ä±¸±¸Á¶(CÓ¿m structure)'¶ó´Â µµ±¸¸¦ °³¹ß ÇÏ¿© À¯·´Ç¥ÁØ »Ó¸¸ ¾Æ´Ï¶ó ±¹Á¦Ç¥ÁØÀ¸·Î ¹ßÀü½ÃŰ·Á Çϰí ÀÖ´Ù. 1994³â ÇöÀç ±¹Á¦ Ç¥ÁØÈ­±â±¸(ISO: International Organization for Standardization)ÀÇ ISO/¡¼EC(International Electromechanical Commission) JTC1/SC27¿¡¼­ 'Á¤º¸±â¼úº¸¾È °ü¸®Áöħ(GMITS; Guidelines for the Management of If Security)À¸·Î êËúÏÝÂà° ¿¡ °üÇÑ Ç¥ÁØÈ­¸¦ ÁøÇà½Ã۰í ÀÖ´Ù.

À§¿¡¼­ ±â¼úÇÑ ¿©·¯ ±â°üÀÇ º¸°í¼­¸¦ ±Ù°Å·Î êËúÏÝÂà°ÀýÂ÷°¡ Æ÷ÇÔµÈ êËúÐη×â°ú Á¤Àº ´ÙÀ½°ú °°´Ù.

1) ÀÚ»ê ºÐ·ù ¹× Æò°¡: º¸È£ÇØ¾ß ÇÒ Àü»ê ÀÚ¿øµéÀ» ½Äº°Çϰí, ü°èÀûÀÎ ºÐ·ù¸¦ ÇØ ¼­, ¼ÒÀ¯Çϰí ÀÖ´Â ÀÚ»êµéÀÇ °¡Ä¡¸¦ Æò°¡ÇÏ´Â ±âº»ÀûÀÎ ´Ü°èÀÌ´Ù. ¿©±â¼­ ÀÚ»êÀ̶õ Çϵå¿þ¾î, ¼ÒÇÁÆ®¿þ¾î, µ¥ÀÌÅÍ/µ¥ÀÌÅͺ£À̽º, »ç¿ëÀÚ/Àü»ê¿ä¿ø, ½Ã½ºÅÛ °ü·Ã¹®¼­, Àü»êÀÚ·á ÀúÀå¸Åü, Åë½Å¸Á ¹× °ü·ÃÀåºñ µîÀ» ¸»ÇÑ´Ù.

2) À§Çù Æò°¡: À§Çù(threat)Àº ÀÚ»ê(asset)¿¡ ÇØ¸¦ ÁÙ ¼ö ÀÖ´Â À§ÇèÀÇ ¿øÃµÀÌ´Ù. ÀÌ¿Í °°Àº À§ÇùÀ» ½Äº°ÇÏ°í ºÐ·ùÇØ¼­, ¹ß»ýºóµµ¿Í ¼Õ½ÇÅ©±â(ȤÀº °­µµ(severity))¸¦ ÃøÁ¤ÇÏ´Â °ÍÀ» ¸»ÇÑ´Ù. À§Çù¿¡´Â À§Çù¿øÃµ¿¡ µû¶ó, ÀÚ¿¬ÀçÇØ·Î ÀÎÇÑ À§Çùµé(È­Àç, ¼öÀç, Á¤Àü µî), »ç¶÷¿¡ ÀÇÇÑ ÀǵµÀû À§Çùµé(´Ü¸»±â, µð½ºÄÏ µîÀÇ ÆÄ±« ¹× ÀýÃë¿Í °°Àº ¹°¸®Àû °ø°Ý, ±×¸®°í ½Ã½ºÅÛ ÀÚ¿øÀÇ ºÒ¹ý»ç¿ë, Çã°¡µÇÁö ¾ÊÀº ÀÚ¿øÀÇ ºÒ¹ýÁ¢±Ù, ŸÀÎÀ¸·Î À§ÀåÇÏ¿© ±ÇÇÑ»ç¿ë, ¹ÙÀÌ·¯½º, ¹ú·¹ µî À¯ÇØÇÁ·Î±×·¥ »ðÀÔ°ú °°Àº ±â¼úÀû °ø°Ý), »ç¶÷¿¡ ÀÇÇÑ ºñÀǵµÀû À§Çùµé(¸í·É¾î ȤÀº ÇÁ·Î±×·¥ÀÇ Á¶À۹̼÷ ¹× Á¶À۽Ǽö), Á¤º¸½Ã½ºÅÛÀÇ °áÇÔ(¿î¿ëüÁ¦ °áÇÔ, ÀÀ¿ëÇÁ·Î±×·¥ÀÇ °áÇÔ, Åë½Å ÇÁ·ÎÅäÄÝ ÀÇ °áÇÔ, Åë½Å ¼ÒÇÁÆ®¿þ¾îÀÇ °áÇÔ)ÀÌ ÀÖ´Ù.

3) Ãë¾à¼º Æò°¡: Ãë¾à¼º(vulnerability)À̶õ Á¤º¸½Ã½ºÅÛ¿¡ ¼ÕÇØ¸¦ ³¢Ä¡´Â ¿øÀÎÀÌ µÉ ¼ö ÀÖ´Â Á¶Á÷, ÀýÂ÷, Àη°ü¸®, ÇàÁ¤, Çϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾îÀÇ ¾àÁ¡À» ¶æÇÑ´Ù. ÀÌ¿Í °°Àº ¾àÁ¡À» È®ÀÎÇÏ°í ºÐ·ùÇÏ¿© À§ÇùÀ» °¨¼Ò½ÃŰ´Â °ÍÀÌ Ãë¾à¼ºÀ» Æò°¡ÇÏ´Â ¸ñÀûÀÌ´Ù. Ãë¾à¼º¿¡´Â °ü¸®Àû Ãë¾à¼º(º¸¾È°ü¸®, Àοø°ü¸®, ÀýÂ÷»ó°ü¸®, »ç°í´ëÃ¥°ü¸® µî¿¡ ´ëÇÑ Ãë¾à¼º), ±â¼úÀû Ãë¾à¼º(Çϵå¿þ¾î, ÀÀ¿ë¼ÒÇÁÆ®¿þ¾î, ¿î¿µÃ¼°è, µ¥ÀÌÅͺ£À̽º, ³×Æ®¿öÅ© µî¿¡ ´ëÇÑ Ãë¾à¼º), ¹°¸®Àû Ãë¾à¼º(ÃâÀÔÅëÁ¦, ȯ°æ°ü¸® µî¿¡ ´ëÇÑ Ãë¾à¼º)ÀÌ ÀÖ´Ù.

4) À§Çè ÃøÁ¤: Àڻ꿡 ´ëÇÑ ¼Õ½ÇÀ» ºÐ¼®ÇÏ´Â °úÁ¤À¸·Î¼­, À§ÇùÀÇ ¹ß»ýÈ®·ü°ú ¼Õ ½ÇÅ©±â¸¦ °öÇØ¼­ ±â´ë¼Õ½ÇÀ» °¡´ÉÇÏ¸é °è·®ÀûÀ¸·Î °è»êÇÑ´Ù. ¼Õ½ÇÅ©±â¸¦ È­Æó°¡Ä¡·Î °è»êÇÒ ¼ö ¾øÀ¸¸é, Á¤¼ºÀûÀÎ êËúÏÝÂà°ÛöÀ» ÀÌ¿ëÇÑ´Ù.

5) º¸¾È´ëÃ¥ ¼±ÅÃ: Æò°¡µÈ À§Çù¿ä¼Ò¿Í Ãë¾à¿ä¼Ò¿¡ ´ëÇØ¼­ ÜÁäÌÓßóþ(safeguard)À» ¼±ÅÃÇÏ´Â ´Ü°èÀ̸ç, ¿©±â¼­ ¼±ÅÃÇØ¼­ ÃßÁøÇÏ´Â ºñ¿ë±îÁö °è»êÇØ¾ß ÇÑ´Ù.

6) ºñ¿ëÈ¿°ú ºÐ¼®: ¹ß»ý°¡´É ÇÑ À§Çè¿ä¼Ò¿¡ ´ëÀÀÇØ¼­ ÜÁäÌÓßóþÀ» ¼ö¸³ÇßÀ» °æ¿ì °¨¼ÒµÇ´Â À§Çè¼öÁØÀ» È­Æó°¡Ä¡·Î ÃøÁ¤1Æò°¡ÇÑ´Ù.

ð¯ 2ï½ Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡

Ãë¾à¼ºÀÌ ÀÖ´Ù°í ÇØ¼­ °ð ¹Ù·Î ¼Õ½ÇÀ» ÀÔÁö´Â ¾ÊÁö¸¸, À§Çù ¿ä¼ÒµéÀÌ Ä¨ÀÔ ÇÒ ¼ö ÀÖ´Â ±Ù°Å¸¦ Á¦°øÇÏ°Ô µÈ´Ù. Ãë¾à¼º °³³äÀº Á¤º¸½Ã½ºÅÛ¿¡ ´ëÇÑ À§ÇèÀ» ¸ðÇüÈ­ Çϴµ¥ Áß¿äÇÑ ¿ªÇÒÀ» ÇÑ´Ù. Ãë¾à¼º °³³ä¿¡´Â ÀϹÝÀûÀ¸·Î ´ÙÀ½°ú °°ÀÌ 3°¡Áö°¡ ÀÖ´Ù.

ù°´Â Ãë¾à¼ºÀ» 'ÀÚ»êÀÇ ¼Ó¼º(attribute of assets)'À¸·Î Á¤ÀÇ Çϰí ÀÖ´Ù. Otwell°ú Aldridge(1989)´Â Ãë¾à¼ºÀ» "ÀÚ»êÀ» ¼Õ»ó½ÃÄѼ­ À§ÇèÀ» ÀÏÀ¸Å°´Â ½Ã½ºÅÛÀÇ ¼ºÁú" À̶ó°í Çß´Ù. º¸´Ù ±¸Ã¼ÀûÀ¸·Î "½Ã½ºÅÛ ³»¿¡¼­ ºÒ¹ýÀû »óÅ·Πº¯È­µÇ´Âµ¥ ¼Ò¿äµÇ´Â ³ë¸çÀÇ ¾ç(the amount of effort)¿¡ ´ëÇÑ ºÎÀûÀÎ Á¤µµ(inverse measure)" ¶ó°í Á¤ÀÇÇß´Ù. Moses(1992)´Â Ãë¾à¼ºÀ» "±âÁ¸ ½Ã½ºÅÛÀÇ ¾àÁ¡"À̶ó°í Çß´Ù.

µÑ°´Â ±Í¾à¼ºÀ» 'ÀÚ»ê°ú À§ÇùÀÇ °üÀç(relationship between assets and threats)'·Î ÆÄ¾ÇÇϰí ÀÖ´Ù. Katzke(1988)´Â Ãë¾à¼ºÀ» "ÀÚ»ê, À§Çù, ÜÁäÌÓßóþ, ÜÁäÌÓßóþÓæ°ú °£ÀÇ ÇÔ¼ö°ü°è¸¦ °®´Â ½Çü¶ó°í Á¤ÀÇÇß´Ù. Schmidt(1988)´Â Ãë¾à ¼ºÀ» "À§Çù¿µÇâ°ú ÀÚ»êÀÇ ´ëÀÀ°ü°è"·Î ÆÄ¾ÇÇϰí, Ãë¾à¼ºÀ» µµÃâÇϱâ À§Çؼ­ ´ÙÀ½°ú °°Àº 3°¡Áö °í·Á»çÇ×À» Á¦½ÃÇß´Ù. ù°´Â ÀÚ»êÀÌ À§Çù ¹ÞÀ» °¡´É¼º, µÑ°´Â ÀÚ»êÀÌ À§Çù¿¡ ÀÇÇØ ¼Õ»óµÇ´Â Á¤µµ, ¼¼Â°´Â é£äÌÓßóþüùÍý ÀÌ´Ù.

¼¼Â°´Â ±Í ¾à¼ºÀ» 'ÜÁäÌÓßóþÀÇ °áÇÌ(absence of safeguards)'À¸·Î Á¤ÀÇÇϰí ÀÖ´Ù. Guairo(1988)´Â Ãë¾à¼ºÀ» "À§Çù°ø°Ý¿¡ ´ëÇÑ ÅëÁ¦ ½ÇÆÐÈ®·ü"À̶ó°í Çß´Ù. ½Ã½ºÅÛº¸¾È ¿¬±¸À§¿øÈ¸(1991)¿¡¼­´Â Ãë¾à¼ºÀ» "À§Çù°ø°Ý¿¡ ³ëÃâµÇ¾î ÀÖ´Â ½Ã½ºÅÛÀÇ »óÅÂ" ¶ó°í Çß´Ù. Gilbert(1991)´Â Ãë¾à¼ºÀ» "º¸¾È ´ëÃ¥½Ã½ºÅÛ ³»¿¡ ¾àÁ¡, ÈæÀº ÜÁäÌÓßóþÀÇ °áÇÌ"À̶ó°í Çß´Ù. GilbertÀÇ Ãë¾à¼º °³³ä Ãø¸é¿¡¼­ À§Çè¸ðÇüÀ» ³ªÅ¸³½ °ÍÀÌ <±×¸² 2-3>ÀÌ´Ù.

<±×¸² 2-3>¿¡¼­ À§Çù T1ÀÌ ÀÚ»ê AlÀ» °ø°ÝÇßÀ» ¶§, ÀÚ»ê AlÀº ÜÁäÌÓßóþ S1¿¡ ÀÇÇØ¼­ º¸È£µÇ¾ú´Ù. À§Çù T4°¡ ÀÚ»ê A4¸¦ °ø°ÝÇßÀ» ¶§´Â ÌõäÌÓßóþÀÌ ¾ø¾î¼­ ¼Õ½ÇÀÌ ¹ß»ýµÇ´Â °æ¿ìÀÌ´Ù. ±×·¯³ª, À§Çù T2ÀÌ ÀÚ»ê A2¸¦ °ø°ÝÇßÀ» ¶§, ÀÚ»ê A2´Â ÜÁäÌÓßóþ S2¿¡ ¾àÁ¡ÀÌ À־ º¸È£µÇÁö ¸øÇß´Ù. ÀÌ¿Í °°Àº ½ÇÆÐÈ®·üÀ» ½ÇÁ¦ Á¤·®ÀûÀ¸·Î ÃßÁ¤Çϱâ´Â ¾î·Æ´Ù. ±×·¯¹Ç·Î, º» æÚϼ¿¡¼­´Â Ãë¾à¼º °³³äÀ» º¸¾È ´ëÃ¥½Ã½ºÅÛ ³»ÀÇ ¾àÁ¡À¸·Î º¸È£½ÇÆÐ µÇ´Â °æ¿ì´Â Á¦¿ÜÇϰí, ´ÜÁö %äÌÓßóþÀÇ °áÇÌ»óŶó°í Á¤ÀÇÇÑ´Ù.

Ãë¾à¼º Æò°¡ÀÇ ¸ñÀûÀº Àڻ꿡 ¼Õ½ÇÀÌ ¹ß»ýµÉ ¼ö ÀÖ´Â ¾àÁ¡À» ½Äº°ÇÏ°í ºÐ·ùÇÏ¿© À§ÇùÀ» °¨¼Ò½Ã۴µ¥ ÀÖ´Ù. Moses(1992)¿¡ ÀÇÇϸé, Ãë¾à¼º Æò°¡(vulgar assessment)¶õ "½Äº°µÈ À§Çù¿øÃµ¿¡ ÀÇÇØ¼­ ¼Õ»óµÉ ¼ö ÀÖ´Â ±âÁ¸ ½Ã½ºÅÛÀÇ ¾àÁ¡¿¡ ´ëÇÑ ½É°¢¼º ¼öÁØÀ» ½Äº°ÇÏ°í Æò°¡ÇÏ´Â °Í" À̶ó°í Çß´Ù. Ãë¾à¼º Æò°¡´Â Ãë¾à¼º¿¡ ´ëÇÑ Á¤ÀÇ¿¡ µû¶ó ±× ¹æ¹ýÀÌ ´Þ¶óÁú ¼ö ÀÖ´Ù. ´Ü¼øÈ÷ 'ÀÚ»êÀÇ ¼Ó¼º'À¸·Î¸¸ Á¤ÀÇÇÏ ¸é, Ãë¾à¼ºÀ» Á¤¼ºÀûÀ¸·Î³ª Á¤·®ÀûÀ¸·Î Æò°¡ÇϱⰡ ¾î·Æ´Ù. 'ÀÚ»ê°ú À§ÇùÀÇ °ü°è'·Î Á¤ÀÇÇϸé, °ü°è¿¡ ´ëÇÑ ±¸Ã¼Àû ¸ðÇüÀÌ Á¦½ÃµÇ¾î¾ß ÇÑ´Ù. °è·®ÀûÀÎ Æò°¡¸ðÇüÀ» µµÃâ ÇØµµ ½ÇÁõÀûÀ¸·Î Àû¿ëÇϴµ¥ ´Â À§Çù¹ß»ý ȤÀº ¼Õ½Ç¹ß»ý¿¡ ´ëÇÑ È®·üÃßÁ¤À» ÇØ¾ß Çϴµ¥, ÀÌ¿¡ ´ëÇÑ °ú°ÅÀڷḦ È®º¸ÇÑ´Ù´Â °ÍÀº »ç½Ç»ó ¾î·Á¿î ¹®Á¦ÀÌ´Ù. ±×·¯¹Ç·Î, º» æÚϼ¿¡¼­´Â Ãë¾à¼ºÀ» ÜÁäÌÓßóþÀÇ °áÇÌ»óÅ·ΠÁ¤ÀÇÇϰí, Ãë¾à¼º Æò°¡¸¦ ÜÁäÌÓßóþÀÇ À¯¹«¸¦ ½Äº°ÇÏ¿©, ÜÁäÌÓßóþÀÌ °áÇÌ»óÅ¿¡ ÀÖ´Â °æ¿ì À§Çù¹ß»ýÀ» °¨¼Ò½Ãų ¼ö ÀÖ´Â ÜÁäÌÓßóþÀ» Á¦½ÃÇÏ´Â °ÍÀ̶ó°í Á¤ÀÇÇÑ´Ù.

Cooper(1989)´Â Àü»êÀÚ¿øÀÇ È¯°æ¿¡ µû¶ó Ãë¾à¼ºÀ» ¹°¸®Àû Ãë¾à¼º, ÀÎÀûȯ°æ Ãë¾à¼º, ±ÔÁ¦È¯°æ Ãë¾à¼º, Çϵå¿þ¾î Ãë¾à¼º, ¼ÒÇÁÆ®¿þ¾î Ãë¾à¼º, ³×Æ®¿öÅ© Ãë¾à¼ºÀ¸·Î ºÐ·ùÇß´Ù. ÀϹÝÀûÀ¸·Î ¼Õ½Ç¹ß»ý¿¡ µû¶ó ¹°Àû Ãë¾à¼º(ÃâÀÔÅëÁ¦, ȯ°æ°ü¸® µî), °ü¸®Àû Ãë¾à¼º(º¸¾È°ü¸®, Àü»ê¿ä¿ø ¹× ÀÌ¿ëÀÚ °ü¸®, º¸¾ÈÁ¤Ã¥ µîÀÇ ¹®¼­È­, »ç°í´ëÃ¥ °ü¸® µî), ±â¼úÀû Ãë¾à¼º(Çϵå¿þ¾î, ¿î¿µÃ¼Á¦, ÀÀ¿ë ¼ÒÇÁÆ®¿þ¾î, ³×Æ®¿öÅ©, µ¥ÀÌÅͺ£À̽º µî)À¸·Î ºÐ·ùÇÒ ¼ö ÀÖ´Ù.

À̿Ͱ°Àº Ãë¾à¼ºÀÇ ¿µ¿ª¿¡ µû¶ó¼­, Solms¿Í Eloff(1990)´Â º¸¾ÈÀÇ ¿µ¿ªÀ» ¹°Àû º¸¾È, ³í¸®Àû º¸¾È, °æ¿µ º¸¾ÈÀ¸·Î ±¸ºÐÇß´Ù. ¼¼ºÎÀûÀ¸·Î ¹°Àû º¸¾ÈÀº ȯ°æ º¸¾È, ¹°Àû Á¢±Ù º¸¾È, ¹°Àû °¡¿ë¼º º¸¾ÈÀ¸·Î ±¸ºÐ Çß°í, ³í¸®Àû º¸¾ÈÀº ¼ÒÇÁÆ®¿þ¾î º¸¾È, µ¥ÀÌÅÍ º¸¾È, Åë½Å º¸¾ÈÀ¸·Î ±¸ºÐ Çß°í, °æ¿µ º¸¾ÈÀº °ü¸®Àû º¸¾È, ÀÎ»ç º¸¾È, Á¶Á÷Àû º¸¾ÈÀ¸·Î ±¸ºÐ Çß´Ù.

ð¯ 3íñ Á¤º¸½Ã½ºÅÛ Ãë¾à¼º Æò°¡¸¦ À§ÇÑ Á¢±Ù¹æ¹ý

ð¯ 1 ï½ Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®¹æ¹ý

ÀüÅëÀûÀÎ êËúÏÝÂà°Û°Ûö¿¡´Â ±Ô¹üÀû Á¢±Ù¹æ¹ýÀ¸·Î À§Ç輱ȣ(Ç¥¿ë) ÀÌ·Ð(risk preference (utility) theory)ÀÌ ÀÖ´Ù. À̿ܿ¡µµ Æò±Õ-ºÐ»ê È¿À²¼º ±âÁØ (mean-variance efficiency criterion), ÆÄ»êÈ®À²(ruin probability), Åë°èÀû ÀÌ·ÐºÐÆ÷¸¦ ÀÌ¿ëÇÏ´Â ¹æ¹ý µîÀÌ ÀÖ´Ù. ƯÈ÷ Á¤º¸±â¼ú¿¡ ´ëÇÑ êËúÏÝÂà°¿¡¼­ ¹æ¹ý¿¡´Â Á¤·®Àû ºÐ¼®¹ý°ú Á¤¼ºÀû ºÐ¼®¹ýÀÌ ÀÖ´Ù. ¿©±â¼­ Á¤·®Àû ºÐ¼®¹ýÀ̶õ À§Çù¹ß»ýÈ®·ü°ú ¼Õ½ÇÅ©±â¸¦ °öÇØ¼­ °è»êÇÏ´Â '±â´ë°¡Ä¡ºÐ¼®(expected value analysis)ÀÎ °æ¿ìÀ̸ç, Á¤¼ºÀû ºÐ¼®¹ýÀ̶õ ¼Õ½ÇÅ©±â¸¦ È­Æó°¡Ä¡·Î ÃøÁ¤ÇÒ ¼ö ¾÷¾î¼­ À§ÇèÀ» ±â¼úº¯¼ö(descriptive variables)·Î Ç¥ÇöÇÏ´Â °æ¿ìÀÌ´Ù.

Á¤·®Àû ºÐ¼®¹ý¿¡´Â ¼öÇаø½ÄÁ¢±Ù¹ý, È®·üºÐÆ÷ÃßÁ¤¹ý, Á¡¼ö¹ý, È®·üÁö¹è (stochastic Dominance), ¸óÅ×Ä®·Î ½Ã¹Ä·¹ÀÌ¼Ç µîÀÌ ÀÖ°í, Á¤¼ºÀû ºÐ¼®¹ý¿¡´Â µ¨ÆÄÀ̹ý, ½Ã³ª¸®¿À¹ý, ¼øÀ§°áÁ¤¹ý, ÆÛÁöÇà·Ä¹ý(fuzzy metrics), Áú¹®¼­¹ý(Questionnaires) µî ÀÌ´Ù. ±×¸®°í, º¹ÇÕÀûÀÎ ºÐ¼®¹ýÀ¸·Î °¡Ä¡»ç½½ºÐ¼®(value chain analysis)ÀÌ ÀÖ´Ù.

êËúÏÝÂà°Û°ÛöÀ» ¼±ÅÃÇÒ °æ¿ì¿¡´Â ºñ¿ë, º¹À⼺, Àû¿ë¼º, Ÿ´ç¼º µîÀ» °í·ÁÇÏ¿© Àå ¡¤´ÜÁ¡À» °ËÅäÇØ¾ß ÇÑ´Ù. êËúÏÝÂà°Û°ÛöµéÀÇ Àå ¡¤´ÜÁ¡À» ºñ±³ÇÑ ÈÄ¿¡, PeW & Kuong(1981)ÀÌ Á¦¾ÈÇÑ ´ÙÀ½°ú °°Àº ±âÁØÀ» °í·ÁÇØ¼­ ±× ºÐ¼®¹æ¹ýÀ» ¼±ÅÃÇ쵂 °¡´É ÇÏ¸é ¿©·¯ ¹æ¹ýÀ» º¹ÇÕÀûÀ¸·Î »ç¿ëÇÏ´Â °ÍÀÌ ¹Ù¶÷Á÷ÇÏ´Ù.

(1) Á¤È®¼º;'À§ÇèºÐ¼®¹æ¹ý¿¡ ÀÇÇÑ ÃßÁ¤ÀÇ Á¤È®¼º Á¤µµ.

(2) ¿ÏÀü¼º: ºÐ¼®1Æò°¡ °úÁ¤ Áß °¡´ÉÇÑ ¸ðµç À§Çù¼Ó¼ºÀ» Æ÷ÇÔ½ÃŲ Á¤µµ.

(3) ³ë·Â: À§ÇèÀ» ºÐ¼®Çϴµ¥ ¼Ò¿äµÇ´Â ½Ã°£°ú ÀÚ¿øÀÇ·®.

(4) ½ÇÇ༺: À§ÇèºÐ¼® °á°ú¸¦ °æ¿µÃþÀÌ ¹Þ¾Æµé¿© ½ÇÇà½ÃŰ´Â Á¤µµ.

(5) ÀÌ¿ë±â¼ú: À§ÇèºÐ¼®¹æ¹ýÀ» È¿°úÀûÀ¸·Î ÀÌ¿ëÇϴµ¥ ¼Ò¿äµÇ´Â ÈÆ·Ã°ú Áö½ÄÀÇ ·®.

(6) Áö¿ø°¡´É¼º; ±â´ë ¼Õ½ÇÀ» ÃßÁ¤ÇÏ´Â À§ÇèºÐ¼®¹æ¹ýÀ» Áö¿øÇÏ´Â ¸í½ÃÀûÀÎ ÀÚ·áÀÇ ·®.

(7) ÃøÁ¤°¡´É¼º; ½ÇÁ¦ ¼Õ½Ç°ú ÃßÁ¤ ¼Õ½ÇÀ» ºñ±³Çؼ­ ÃßÁ¤ ¼Õ½ÇÀÇ ½Å·Úµµ¸¦ ³ôÀÌ´Â ¼Õ½Ç ÃßÁ¤ÀÇ Á¤È®µµ.

ºÐ¼®¹æ¹ýµéÀ» ¼±ÅñâÁØ¿¡ µû¶ó Á¤¼ºÀûÀ¸·Î ³ôÀ½, º¸Åë, ³·À½À¸·Î Æò°¡ÇÑ °ÍÀÌ <Ç¥ 3-1>ÀÌ´Ù. ³ôÀ½Àº ¼±ÅñâÁØÀÇ ¸ñÇ¥¿¡ ¾ÆÁÖ Àß µµ´ÞµÈ °ÍÀ̰í, ³·À½Àº ±× ¹Ý´ë ÀÌ´Ù. º¸ÅëÀº ¼±ÅñâÁØÀÇ ¸ñÇ¥¿¡ ÀûÀýÇÏ°Ô µµ´ÞµÈ °ÍÀÌ´Ù. ÀÌ¿Í °°Àº ¿©·¯ °¡Áö ¼±Åà ±âÁصé°ú ºÐ¼®¹æ¹ýµéÀÇ Àå/´ÜÁ¡À» °í·ÁÇØ¼­ À§Çè ºÐ¼®ÀÚ È¤Àº °æ¿µÀڴ ƯÁ¤ »óȲ ¿¡ ÀûÀýÇÑ ºÐ¼®¹æ¹ýÀ» ¼±ÅÃÇØ¾ß ÇÑ´Ù. ºÐ¼®¹æ¹ý¿¡¼­ °ú°ÅÀÚ·áÁ¢±Ù¹ýÀº ¹Ì·¡ »ç°ÇÀÇ ¹ß»ý°¡´É¼ºÀ» ¿¹ÃøÇÏ´Â ¹æ¹ýÀ¸·Î »ç°Ç¿¡ ´ëÇÑ °ú°Å ÀڷḦ ÀÌ¿ëÇÏ´Â ÀÏ»óÀûÀÎ ±â¼úÅë°èºÐ¼®À» ÀǹÌÇÏ´Â °ÍÀ¸·Î ±â´ë¼Õ½ÇÀ» °è»êÇϰí, ÜÁäÌÓßóþ¿¡ ´ëÇÑ ºñ¿ëÈ¿°ú¿¡ µû¶ó ÅëÁ¦¸¦ Á¶Á¤ÇÏ´Â ¹æ¹ýÀÌ´Ù. Á¤·®Àû ºÐ¼®¹ýÀÌ Á¤¼ºÀûÀÎ ºÐ¼®¹ýº¸´Ùµµ ¿ì¼öÇÑ °ÍÀº ´ç¿¬Çϸç, ƯÈ÷ À§ÇùÀÇ ¹ß»ý ºóµµ¿Í ¼Õ½ÇÅ©±â¿¡ ´ëÇÑ °ú°ÅÀÚ·á°¡ ÀÖ´Â °æ¿ì¿¡´Â °ú°ÅÀÚ·áÁ¢±Ù¹ý¿¡ ÀÇÇØ¼­ À§Çè ÃøÁ¤ÀÌ °¡´ÉÇϹǷΠ´ëºÎºÐ ¼±ÅñâÁØ¿¡¼­ ³ô°Ô Æò°¡µÇ¾ú´Ù. ¶ÇÇÑ, À§¿¡¼­ ±â¼úÇÑ È®·üºÐÆ÷ÃßÁ¤¹ý, Á¡¼ö¹ý, µ¨ÆÄÀ̹ý, ¼øÀ§°áÁ¤¹ý, ½Ã³ª¸®¿ÀÁ¢±Ù¹ý µîÀº ¸ðµÎ ÁÖ°üÀû Á¢±Ù¹ý À̹ǷΠ³·°Ô Æò°¡µÇ¾ú´Ù.

ÀÌ¿Í °°Àº ºÐ¼®¹æ¹ýÀ» º¹ÇÕÀûÀ¸·Î Àû¿ë½ÃŰ´Â µ¥´Â Rainer, Snyder & Carr(1991)ÀÌ Á¦¾ÈÇÑ °¡Ä¡»ç½½ºÐ¼®(value chain analysis)ÀÌ ÀÌ¿ëµÉ ¼ö ÀÖ´Ù. À§ÇèºÐ¼®°úÁ¤º° Àû¿ë °¡´ÉÇÑ ºÐ¼®¹æ¹ýÀ» ( )¾È¿¡ ¸í½ÃÇÏ¿´´Ù.

´Ü°è1: Á¶Á÷ÀÇ ÇàÀ§¸¦ ¿­°ÅÇϱâ À§Çؼ­ °¡Ä¡»ç½½À» ÀÌ¿ëÇÑ´Ù. (½Ã³ª¸®¿À¹ý ±×¸®°í/ȤÀº Áú¹®¼­¹ý + µ¨ÆÄÀ̹ý)

´Ü°è2: °¢ °¡Ä¡ÇàÀ§ÀÇ Á¤º¸±â¼ú ±¸¼º¿ä¼Ò¸¦ ¿­°ÅÇϱâ À§Çؼ­ °¡Ä¡»ç½½À» ÀÌ¿ëÇÑ´Ù. (½Ã³ª¸®¿À¹ý ±×¸®°í Áú¹®¼­¹ý + µ¨ÆÄÀ̹ý)

´Ü°è3: °¡Ä¡ÇàÀ§ °£ÀÇ ¿¬°áÀ» ¿­°ÅÇϱâ À§Çؼ­, ±×¸®°í °¢ ¿¬°áÀ» Áö¿ø ÇÏ´Â Á¤º¸±â¼úÀ» °áÁ¤Çϱâ À§Çؼ­ °¡Ä¡»ç½½À» ÀÌ¿ëÇÑ´Ù. (½Ã³ª¸®¿À¹ý ±×¸®°í1ȤÀº Áú¹®¼­¹ý + µ¨ÆÄÀ̹ý)

´Ü°è4: Á¶Á÷ °¡Ä¡½Ã½ºÅÛÀ» °ËÅäÇϱâ À§Çؼ­, ±×¸®°í ³»ºÎ Á¶Á÷°£ ¿¬°áÀ» Áö¿øÇÏ´Â Á¤º¸±â¼úÀ» Áö¿øÇϱâ À§Çؼ­ °¡Ä¡»ç½½À» ÀÌ¿ëÇÑ´Ù. (½Ã³ª¸®¿À¹ý ±×¸®°í/ȤÀº Áú¹®¼­¹ý + µ¨ÆÄÀ̹ý)

´Ü°è5: ¿­°ÅµÈ Á¤º¸±â¼úÀÚ»êÀÇ °¡Ä¡¸¦ °áÁ¤ÇÑ´Ù. (Á¤È®ÇÑ È­Æó°¡Ä¡ ºÎ¿© +µ¨ÆÄÀ̹ý)

´Ü°è6: Á¤º¸±â¼úÀڻ꿡 ´ëÇÑ °¡´ÉÇÑ À§ÇùµéÀ» ¿­°ÅÇÑ´Ù. (½Ã³ª¸®¿À¹ý ±×¸®°í/ȤÀº Áú¹®¼­¹ý +µ¨ÆÄÀ̹ý)

´Ü°è7: ÀáÀçÀû À§ÇùÀ¸·Î ºÎÅÍ Á¤º¸±â¼úÀÚ»êÀÇ Ãë¾à¼ºÀ» °áÁ¤ÇÑ´Ù. (Á¤È®ÇÑ ¼ýÀÚ ºÎ¿© + µ¨ÆÄÀ̹ý)

´Ü°è8: Á¶Á÷¿¡ ´ëÇÑ Àü¹øÀûÀÎ Á¤º¸±â¼ú À§Çè³ëÃâÀ» °áÁ¤ÇÑ´Ù. (ALE °°Àº ¼öÇаø½ÄÁ¢±Ù¹ý, ȤÀº È®·üÀû Áö¹è ÀÌ¿ë)

ÀÌ¿Í °°Àº °¡Ä¡»ç½½ºÐ¼®¹ýÀº °æ¿µÃþ¿¡°Ô Á¤º¸±â¼úÀڻ꿡 ´ëÇÑ °¡Ä¡, Àڻ꿡 ´ë ÇÑ À§Çù, À§Çù¿¡ ÀÇÇÑ ¼Õ½Ç¹ß»ýÈ®·ü µîÀ» °í·ÁÇÏ´Â êËúÏη×â ÇÁ·Î±×·¥¿¡ ´ëÇÑ ÅõÀÚÀÇ Çʿ伺À» ³í¸®ÀûÀ¸·Î ÀÌÇØ ½Ã۴µ¥ Å« µµ¿òÀÌ µÈ´Ù.

´ÙÀ½ ÆäÀÌÁö·Î