ð¯ 4 ï½ ÜÁäÌÓßóþ

Æò°¡µÈ À§Çù ¿ä¼Ò¿Í Ãë¾à ¿ä¼Ò¿¡ ´ëÇØ¼­ ÜÁäÌÓßóþ(safeguard)À» ¼±ÅÃÇÏ´Â ´Ü°è ÀÌ´Ù.

NIST¿¡¼­ ´Ù¸¥ ±â°ü¿¡¼­µµ Ȱ¿ëÇÒ ¼ö ÀÖµµ·Ï °øÇ¥ÇÑ º¸¾È Áöħ¼­ÀÎ 'SRAG(Simplified Risk Analysis Guidelines)'¿¡¼­´Â À§ÇùÀÇ È®·ü°ú ¼Õ½Ç Å©±â¸¦ 5 Á¡Ã´µµ·Î¼­ ÃøÁ¤ÇÑ ÈÄ¿¡, ¼Õ½Ç Å©±â°¡ '¸Å¿ì ³ôÀ½'ÀÎ °æ¿ì¿¡ ÇÑÇØ¼­ À§ÇùÀÇ È®·üÀÌ 'º¸Åë' ÀÌ»óÀÎ °æ¿ì(Áï, 'º¸Åë', '³ôÀ½', '¸Å¿ì ³ôÀ½')¿¡¸¸ ÜÁäÌÓßóþÀ» ¸¶·ÃÇß´Ù. º» æÚϼ¿¡¼­´Â ÅëÁ¦ ¼ö´ÜÀÎ ÜÁäÌÓßóþ¿¡ ´ëÇÑ ±âÁØÀ» 13°³ ºÐ¾ßÀÇ °¢ Ä­Áß¿¡¼­ º¸¾È´ëÃ¥ÀÌ ½Ã±ÞÈ÷ ÇÊ¿äÇÑ °Í)·Î ÆÇÁ¤µÈ °Í Áß Áú¹®¿¡¼­ 'No'¶ó°í ´äÇÑ Ç׸ñ¿¡¼­ '¸Å¿ì ³ôÀ½(VH)'ÀÎ Áú¹®¿¡ ´ëÇÑ °ÍÀ» 1Â÷Àû ÜÁäÌÓßóþÀ¸·Î Á¦½ÃÇÏ¿´°í, '³ôÀ½(H)'ÀÎ Ç׸ñ¿¡ ´ëÇØ¼­ 2Â÷Àû ÜÁäÌÓßóþÀ» Á¦½ÃÇÏ¿´´Ù. HÀºÇà Çѱ¹ ÁöÁ¡ÀÇ Á¤º¸ ½Ã½ºÅÛ¿¡ ´ëÇÑ ÜÁäÌÓßóþÀº ´ÙÀ½°ú °°´Ù.

1. 1ó­îÜ ÜÁäÌÓßóþ

1) Àλç Á¤Ã¥

¡Ü½ºÅÜ Çൿ:¸¹°Å³ª ºÎÀûÀýÇÑ ÅëÁ¦

-Àӽà °í¿ëÀÎ, ÄÁ¼³ÅÏÆ®, °è¾à¾÷ÀÚ µîÀÇ ´Ù¸¥ ºñÁ÷¿øÀÌ Áß¿äÇÑ À§Ä¡¿¡ ÀÖÀ» ¶§ Á÷¿ø°ú µ¿µîÇÑ ½Å¿ø Á¶È¸ °°Àº º¸¾È ±ÔÁ¤À» Àû¿ëÇÑ´Ù.

2) µ¥ÀÌÅÍ ¿Í ÇÁ·Î±×·¥Á¢±Ù

¡Ü½ÅºÐÁõ °Ë»ç:¼­ºñ½º Áß´Ü ¡¤ °ÝÇÏ

ÆÐ½º¿öµåÀÇ ¹ßÇàÀº »ç¿ëÀÚ¿Í Á÷¼Ó »ó°üÀÇ Àΰ¡¿¡ ÀÇÇÑ ½Åû¿¡ ±Ù°ÅÇϵµ·Ï ÇÑ´Ù.

3) ÀÔ/Ãâ·Â

¡Ü ¸Þ´º¾ó ÀýÂ÷:±º»ç,»ó¾÷Àû Á¤Âû,±â¹ÐÄ§ÇØ

ÀÀ¿ëÇÁ·Î±×·¥:±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÄ§ÇØ ¹Î°¨ÇÑ ÇϵåÄ«ÇÇ º¸°í¼­ÀÇ °¢ ÆäÀÌÁö¸¶´Ù ÀûÇÕÇÑ µ¥ÀÌÅÍ º¸¾È µî±Þ (classification)À» Ç¥½ÃÇÑ´Ù.

¡Ü¸Å´º¾ó ÀýÂ÷:±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÄ§ÇØ Ưº°È÷ ¹Î°¨ÇÑ ÇϵåÄ«ÇÇ Ãâ·ÂÀº ·Î±×¸¦ ÅëÇØ ÃßÀû°¡´ÉÇÏ¸ç ±× Ãâ·Â¹°¿¡ º¹»ç°¡ ±ÝÁöµÇ¸ç ÀÌ·± º¹»ç¹°ÀÇ ¹ß°ß ½Ã Áß¾Ó¿¡¼­ ÀÌ·± Ãâ·ÂÀ» °ü¸®ÇÏ´Â »ç¶÷¿¡°Ô º¸³»Á®¾ß ÇÑ´Ù´Â ³»¿ëÀ» Ç¥½ÃÇÑ´Ù.

4) µ¥ÀÌÅÍ Ã³¸®

¡Ü½Ã½ºÅÛ ±â·Ï:ÀÚ·á¼Õ½Ç, ¿À·ù ¡¤ »ý·«

-¿ÀÆÛ·¹ÀÌÅÍ ÄÜ¼Ö ·Î±×°¡ Çϵå Ä«ÇÇ¿¡ ±â·ÏµÊÀº ¹°·ÐÀ̰í Å×ÀÌÇÁ ¶Ç´Â ´Ù¸¥ ¸Åüµµ ±â·ÏÇÑ´Ù.

5) µ¥ÀÌÅͺ£À̽º¿Í ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î

¡Ü»ç¶÷:ºÒ¹ýÁ¢±Ù

-°ø±ÞÀÚ°¡ dial-up lineÀ» ÅëÇØ Áø´Ü°ú À¯Áöº¸¼ö¸¦ ÇàÇÒ °æ¿ì, ƯÁ¤ port¸¸ »ç ÀßÇϰí Àü»ê ¿î¿µ Ã¥ÀÓÀÚ·Î ºÎÅÍ Çã°¡¸¦ ¹ÞÀº ÈÄ¿¡ »ç¿ëÇϵµ·Ï ÇÑ´Ù.

6) ¿ø°ÝÅë½Å

¡Ü¼ÒÇÁÆ®¿þ¾î:¼­ºñ½º Áß´Ü,°ÝÇÏ

ÀüÀ§Ã³¸®³ª ³×Æ®¿öÅ© ÇüÅÂ:¼­ºñ½º Áß´Ü,°ÝÇÏ

Åë½Åȸ¼±(ȸ·Î)¼­ºñ½º Áß´Ü,°ÝÇÏ

-³×Æ®¿öÅ©ÀÇ ÀϺΰ¡ °íÀåÀ̰ųª ÀÛµ¿ ºÒ´ÉÀÏ °æ¿ì, automatic traffic rerouting °ú °°Àº ±â´ÉÀ» »ç¿ëÇÏ¿© µ¥ÀÌÅÍ Åë½ÅÀÌ ÀÚµ¿À¸·Î Áö¼ÓµÉ ¼ö ÀÖµµ·Ï Åë½Å ½Ã½ºÅÛÀ» ¼³°èÇÑ´Ù.
¡Ü¼ÒÇÁÆ®¿þ¾î:¼­ºñ½º Áß´Ü,°ÝÇÏ

Å͹̳ÎÀ̳ª ȸ·ÎÀåºñÀÇ ÃÖÁ¾»ç¿ëÀÚ:¼­ºñ½º Áß´Ü,°ÝÇÏ

ÁÖ ¼±»ê±â:¼­ºñ½º Áß´Ü,°ÝÇÏ

ÀüÀ§Ã³¸®³ª ³×Æ®¿öÅ© ÇüÅÂ: ¼­ºñ½ºÁß´Ü,°ÝÇÏ

´ÙÁßÈ­±â,ÁýÁßÀåÄ¡,¸ðµ©:¼­ºñ½º Áß´Ü:°ÝÇÏ

- Áß¿ä ³×Æ®¿öÅ© Àåºñ°¡ ÀÛµ¿ ºÒ´ÉÀÏ °æ¿ì,³×Æ®¿öÅ© ³ëµå¿Í ÁÖ Àü»ê±â´Â ´ë±âÁßÀÎ ¿©ºÐÀÇ Àåºñ·Î ÀÚµ¿ ±³È¯ÇÒ ¼ö ÀÖµµ·Ï Ç×»ó ÁغñÇÑ´Ù.

7) ¹é¾÷°ú º¹±¸

¡ÜÁÖ Àü»ê±â¿Í °ü·ÃÀåÄ¡, ³×Æ®¿öÅ©¿Í °ü·ÃÀåÄ¡:ž÷

- ÁÖ µ¥ÀÌÅÍó¸® Áö¿ª¿¡¼­ Ưº°ÇÑ, ÁÖ¹® Á¦ÀÛµÈ, ¶Ç´Â ±¸ÀÔÇϱⰡ Èûµç Àåºñ°¡ »ç¿ëµÇ°í ÀÖ´Ù¸é À̵é Àåºñ¸¦ ¹é¾÷Áö¿ª¿¡µµ ¼³Ä¡ÇÑ´Ù.

Á¤º¸½Ã½ºÅÛ 13°³ ºÐ¾ß Áß ½Ã½ºÅÛ °³¹ß, Á¶Á÷ ±¸Á¶, Å͹̳Π»ç¿ëÀ» Á¦¿ÜÇÑ 10°³ ºÐ¾ß Áß 1Â÷Àû º¸¾È´ëÃ¥Àº ÀλçÁ¤Ã¥, µ¥ÀÌÅÍ ¹× ÇÁ·Î±×·¥ Á¢±Ù, ÀÔ/Ãâ·Â, µ¥ÀÌÅÍ Ã³¸®, µ¥ÀÌÅͺ£À̽º¿Í ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î, (¿ø°Ý)Åë½Å, ¹é¾÷°ú º¹±¸ ºÐ¾ß¿¡¼­ ³ªÅ¸³µ°í, 1 Â÷Àû º¸¾È´ëÃ¥ÀÌ ½ÇÇàµÈ ÈÄ¿¡ 2Â÷Àû º¸¾È´ëÃ¥À» ½Ç½ÃÇØ¾ß ÇÑ´Ù.

2. 2ó­îÜ ÜÁäÌÓßóþ

1) ÈÆ·Ã/ÀνÄ

¡ÜÇʱâ, ¾ð¾î, ½Ã ¡¤Ã»°¢µµ±¸:ÀνÄÇÒ ¼ö ¾ø´Â Ãë¾à¼º,ºÒÃæºÐÇÑ Àü¹®°¡ÀÇ°ß »ç¿ë

- ÅëÁ¦ ÀýÂ÷¸¦ ¼³°èÇÏ´Â ½Ã½ºÅÛ ¼³°èÀÚ³ª ´Ù¸¥ ±â¼úÁ÷ Á÷¿øµéÀ» Á¤º¸ º¸È£ ±³À°¿¡ Âü¿© ½ÃÄÑ ±×µéÀÇ ÅëÁ¦(°ü¸®)¿¡ °üÇÏ¿© ³íÀÇÇÒ ¼ö ÀÖ´Â ±âȸ¸¦ Á¦°øÇÑ´Ù.

¡ÜÇʱ⠵µ±¸:ÀνÄÇÒ ¼ö ¾ø´Â Ãë¾à¼º

- Á¤º¸ º¸È£¿¡ °ü·ÃµÈ ¹®¼­µéÀ» °ËÅäÇØ¼­ ³Ê¹« ¸¹Àº Á¤º¸°¡ ´©ÃâµÇÁö ¾Êµµ·Ï °ËÅäÇÑ´Ù(½Ã½ºÅÛ¿¡ ħÀÔÇϰíÀÚ ÇÏ´Â »ç¶÷Àº ¶§¶§·Î ÇÊ¿äÇÑ ¸ðµç Á¤º¸¸¦ °ü·Ã ¹®¼­ ȤÀº ¿Â-¶óÀÎÀ¸·Î ¾òÀ» ¼ö ÀÖ´Ù)

2) ¹°¸®Àû Á¢±Ù

¡ÜÄÄÇ»ÅÍ ¿î¿µ¿µ¿ª:±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÁ¤º¸ Ä§ÇØ,¼­ºñ½º Áß´Ü ¡¤°ÝÇÏ, ž÷, ±âŸÀýµµ

-Á¦ÇÑµÈ Á¤º¸ ÅëÁ¦ ¿µ¿ª¿¡ 24½Ã°£ ÃâÀÔÀ» °¨½ÃÇÏ´Â °æºñ¿øÀ» ä¿ëÇÑ´Ù.

¡Ü ÄÄÇ»ÅÍ ¿î¿µ¿µ¿ª¼­ºñ½º Áß´Ü¡¤°ÝÇÏ, ž÷, ±âŸÀýµµ

- °æºñ¿øÀÌ Á¦ÇÑµÈ Á¤º¸ ÅëÁ¦ ¿µ¿ª ¹× ºôµù³»ÀÇ ±âŸ Á¦ÇÑ ±¸¿ªÀ» ¼øÂûÇϵµ·Ï ÇÑ´Ù.

¡Ü ÄÄÇ»ÅÍ ¿î¿µ¿µ¿ª:ž÷, ±âŸÀýµµ

- Á¦ÇÑµÈ Á¤º¸ ÅëÁ¦ ¿µ¿ªÀÇ ÃâÀÔ±¸¿¡ Æó¼èȸ·Î(CCTV)¸¦ ¼³Ä¡(ÀÛµ¿)ÇÑ´Ù.

¡Ü ÀÚµ¿È­µÈ ¹°¸®Àû Á¢±Ù ÅëÁ¦½Ã½ºÅÛ:±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÁ¤º¸ Ä§ÇØ, ž÷,»ç±â ¡¤È¾·É, ±âŸÀýµµ

-ÅðÁ÷ÇÑ ¶Ç´Â ´Ù¸¥ ºñÀΰ¡ÀÚµéÀÌ ºñ·Ï ¾ÆÁ÷ ±îÁöµµ ½ÅºÐÁõÀ̳ª À¯»çÇÑ ½Äº°Ç¥½Ã ¸¦ °¡Áö°í ÀÖ´Ù ÇÏ´õ¶óµµ Á¢±ÙÀ» °ÅºÎÇÒ ¼ö ÀÖ´Â ¹°¸®Àû Á¢±Ù ÅëÁ¦ ½Ã½ºÅÛÀ» ¼³Ä¡ÇÑ´Ù.

¡Ü ÄÄÇ»ÅÍ ¿î¿µ¿µ¿ª:±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÁ¤º¸ Ä§ÇØ, ¼­ºñ½º Áß´Ü ¡¤°ÝÇÏ, ž÷, »ç±â ¡¤ Ⱦ·É, ±âŸÀýµµ

-¸ðµç ÃâÀÔÁõ¿¡´Â »çÁøÀ» ºÎÂøÇÑ´Ù.

¡Ü ÄÄÇ»ÅÍ ¿î¿µ¿µ¿ª:±º»ç¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÁ¤º¸ Ä§ÇØ, ¼­ºñ½º Áß´Ü¡¤°ÝÇÏ, ž÷, »ç±â ¡¤ Ⱦ·É, ±âŸÀýµµ

¿ø°Ý Çϵå¿þ¾î:±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÁ¤º¸ Ä§ÇØ, ¼­ºñ½º Áß´Ü¡¤°ÝÇÏ, ž÷, »ç±â¡¤È¾·É, ±âŸÀýµµ

ÀÚµ¿È­µÈ ¹°¸®Àû Á¢±Ù ÅëÁ¦½Ã½ºÅÛ: ±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÁ¤º¸ Ä§ÇØ, ž÷, ¼­ºñ½º Áß´Ü ¡¤°ÝÇÏ,»ç±â ¡¤È¾·É, ±âŸÀýµµ

-Á¦ÇÑµÈ Á¤º¸ ÅëÁ¦ ¿µ¿ª¿¡ Àΰ¡µÈ »ç¶÷ÀÌ ¾øÀ» ¶§ º¸È£¸¦ À§ÇÑ ÀÚµ¿ µµ³­ °æº¸ ÀåÄ¡¸¦ ¼³Ä¡ÇÑ´Ù.

3) µ¥ÀÌÅÍ¿Í ÇÁ·Î±×·¥Á¢±Ù

¡Ü ½ÅºÐÁõ °Ë»ç:¼­ºñ½º Áß´Ü¡¤°ÝÇÏ ÆÐ½º¿öµå¸¦ Àؾî¹ö¸° »ç¿ëÀÚµéÀÌ »õ·Î¿î ÆÐ½º¿öµå¸¦ ÀüÈ­»óÀ¸·Î ¹ÞÀ» ¶§ »õ·Î¿î ÆÐ½º¿öµå¸¦ ÁÖ´Â º¸¾È ´ã´çÀÚ´Â ±× »ç¿ëÀÚµéÀÇ ½Å¿øÀ» ¸íÈ®ÇÏ°Ô È®ÀÎÇÏ´Â ÀûÀýÇÑ ÀýÂ÷ÇÏ¿¡ ½ÇÇàÇÑ´Ù.

- ÆÐ½º ¿öµåµéÀÌ Å͹̳ΠÁÖº¯¿¡ ºÎÂøµÇ¾î ÀÖµçÁö ȤÀº ±ÇÇÑÀÌ ¾ø´Â »ç¶÷µé¿¡ ÀÇÇØ ¹ß°ßµÇ±â ½¬¿î °÷¿¡ ¹æÄ¡µÇÁö ¾Êµµ·Ï ÇÑ´Ù.

- ¾ö°ÝÇÏ°Ô ±ÝÁöµÈ ÆÐ½º¿öµå¸¦ ´Ù¸¥ »ç¿ëÀÚ¿¡°Ô ´©¼³ÇÔÀ¸·Î½á ÇÑ ÆÐ½º¿öµå°¡ ¿©·¯ »ç¶÷¿¡ ÀÇÇÏ¿© »ç¿ëÇÏ´Â °ÍÀ» ¾ö°ÝÇÏ°Ô ±ÝÁö½ÃŲ´Ù.

4) ÀÔ/Ãâ·Â

¡Ü ÀÀ¿ëÇÁ·Î±×·¥:»ç±â ¡¤ Ⱦ·É

-Áß¿äÇϰųª ¹Î°¨ÇÑ °Å·¡ 󸮴 Á¤»óÀû ó¸® ÀýÂ÷¿Í´Â º°µµ·Î º°°³ÀÇ ½Ã¸®¾ó ³Ñ¹öÀÇ »ç¿ë°ú °°ÀÌ Æ¯º°ÇÑ ÀýÂ÷·Î ÅëÁ¦ÇÑ´Ù.
¡Ü ÀÀ¿ë ÇÁ·Î±×·¥:¿À·ù,»ý·«,»ç±â,Ⱦ·É,ºÒ¹ýÁ¢±Ù

»ç¿ëÀÚ¡¤¿î¿µÀÚ ´ÙÀ̾ó·Î±×:¿À·ù¡¤»ý·«

- ÀÔ·Â ¹èÄ¡(batch)³ª °Å·¡ ÀÔ·ÂÀÌ ÀÏ´Ü ½Ã½ºÅÛ ³»·Î µé¾î°¡°Ô µÇ¸é, ÀÔ·ÂÀÌ °ÅÀýµÈ °ÍÀ» Á¦¿ÜÇϰí´Â ÀÔ·Â µ¥ÀÌÅÍÀÇ º¯°æÀ» ±ÝÁöÇÏ°í ¿¹¹æÇÑ´Ù.
¡Ü ¸Þ´º¾ó ÀýÂ÷:±º»ç,»ê¾÷Àû Á¤Âû,±â¹ÐÄ§ÇØ

ÀÀ¿ëÇÁ·Î±×·¥:±º»ç,»ê¾÷Àû Á¤Âû,±â¹ÐÄ§ÇØ

-¸ðµç Ãâ·Â¹°¿¡´Â ¼öÃëÀÎÀÇ À̸§ÀÌ Æ÷ÇԵǰí, ÀÌ·¯ÇÑ Ãâ·Â¹°ÀÇ ºÐ¹è´Â ´ÜÁö ÇØ´ç »ç¶÷¿¡°Ô·Î Á¦ÇÑÇÑ´Ù(via locked bins, couriers, ell.).

¡Ü ¿ø°ÝÀåºñ Çϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾î:±º»ç ¡¤»ê¾÷Àû Á¤Âû, ±â¹ÐÄ§ÇØ Å͹̳¯ »ó¿¡ ¹Î°¨ÇÑ Ãâ·Â¹°ÀÌ ³ªÅ¸³¯ ¶§ °ü·Ã µ¥ÀÌÅÍÀÇ º¸¾È µî±ÞÀ» Ç¥½ÃÇÑ´Ù.

¡Ü ¸Å´º¾ó ÀýÂ÷:±º»ç ¡¤»ê¾÷Àû Á¤Àß, ±â¹ÐÄ§ÇØ ¸¸¾à Ưº°È÷ ¹Î°¨ÇÑ Ãâ·ÂÀÌ ÃßÀûµÇ¸é, ±¼·ÂÀÇ º¹»ç¹°¿¡ ÀÏ·Ã ¹øÈ£°¡ ºÎ°úµÇ°í ¸ðµç º¹»ç¹°Àº »ç¿ë ÈÄ ¹Ýµå½Ã µÇµ¹·Á ¹Þ´Â´Ù.
¡Ü ¸Å´º¾ó ÀýÂ÷:±º»ç,»ê¾÷Àû Á¤Âû,±â¹Ð Ä§ÇØ

¿ø°ÝÀåºñ Çϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾î:±º»ç,»ê¾÷Àû Á¤Âû,±â¹ÐÄ§ÇØ

-±â¹ÐÄ§ÇØ º¹»ç ¸ÔÁö(carbon paper)°¡ ¾î¶² ¹Î°¨ÇÑ Ãâ·Â ¾÷¹«¿¡ »ç¿ëµÇ¾îÁö¸é ÀÌ º¹»ç ¸ÔÁö¸¦ º¸¾ÈÀûÀΠŵµ(Àý´Ü, ¼Ò°¢ µî)·Î ó¸®ÇÑ´Ù.

5) ¿ø°ÝÅë½Å

¡Ü Åë½Åȸ¼±(ȸ·Î):ºÒ¹ýÁ¢±Ù

- Dial-upÀ» ÅëÇØ ºñÀΰ¡µÈ ÀÚ°¡ Á¢±ÙÇÔÀ» ¹æÁöÇϱâ À§ÇØ, Á¡´ëÁ¡, multidrop, LAN, ´Ù¸¥ Åë½Å ±¸Á¶´Â »ç¿ëÀÚ·Î ÇÏ¿©±Ý ƯÁ¤ ¹°¸®Àû Àå¼Ò¿¡ ±¹ÇѽÃŰ´Â Á¦¾àÁ¶°ÇÀ» ¸¶·ÃÇÑ´Ù.

- Dial-up ȸ¼±À» ÅëÇØ Åë½ÅÇÒ ¶§, ÀÚµ¿ call-back ÀåÄ¡°¡ »ç¿ëµÇ¾î »ç¿ëÀÚ°¡ ¼¼¼ÇÀ» ½ÃÀÛÇϰíÀÚ ÇÒ ¶§ ÇÊ¿äÇÑ Á¤º¸¸¦ ÀÔ·ÂÇÑ ÈÄ ¹Ì¸® ÁöÁ¤µÈ ¹øÈ£·Î ÀüÈ­°¡ µÇµ¹¾Æ ¿Àµµ·Ï ÇÑ´Ù.

6) ¹é¾÷°ú º¹±¸

¡Ü ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î¿Í ¿Ë¿ë ¼ÒÇÁÆ®¿þ¾î:¿À·ù ¡¤ »ý·«

- ÀÀ¿ëÇÁ·Î±×·¥ÀÌ Á¤È®ÇÏ°Ô µ¥ÀÌÅ͸¦ ó¸®ÇÏ´ÂÁö¸¦ È®ÀÎÇϴµ¥ »ç¿ëÇÒ ¼ö ÀÖµµ·Ï °¢ Áß¿ä ÀÀ¿ëÇÁ·Î±×·¥ÀÇ Å×½ºÆ®¿ë µ¥ÀÌÅÍ¿Í Æ¯Á¤ Å×½ºÆ®ÀýÂ÷¸¦ ´Ù¸¥ Áß¿äÇÑ ÀÚ¿ø(material)µé°ú ÇÕ²² off-site¿¡ º¸°üÇÑ´Ù.

2Â÷Àû º¸¾È´ëÃ¥Àº ÈÆ·Ã/ÀνÄ, ¹°¸®Àû Á¢±Ù, µ¥ÀÌÅÍ ¹× ÇÁ·Î±×·¥ Á¢±Ù, ÀÔ/Ãâ·Â, (¿ø°Ý)Åë½Å, ¹é¾÷°ú º¹±¸¿¡¼­ ³ªÅ¸³µ´Ù. Á¤º¸½Ã½ºÅÛ 13°³ ºÐ¾ß Áß º¸¾È´ëÃ¥ÀÌ ÇÊ¿äÇÑ 10°³ ºÐ¾ß¿¡¼­ ȯ°æ ºÐ¾ßÀÇ Àü·Â¿¡ °ü°èÇÑ º¸¾È´ëÃ¥ÀÌ ÇÊ¿äÇÑ °ÍÀ¸·Î ³ªÅ¸³µÀ¸³ª »ç·Êȸ»çÀÇ °æ¿ì´Â Àü·Â¿¡ ´ëÇÑ º¸¾È´ëÃ¥ÀÌ ÇÊ¿äÇÏÁö¸¸ Àü·ÂÀÇ °æ¿ì´Â ÀÓ´ë°Ç¹°¿¡¼­ ÀϰýÀûÀ¸·Î ÅëÁ¦¸¦ Çϱ⶧¹®¿¡ ȸ»ç ÀÚüÀûÀ¸·Î ´ëÃ¥À» ¼ö¸³ÇÏ´Â °ÍÀÌ ¾î·Æ±â ¶§ ¹®¿¡ ±â¼úÇÏÁö ¾Ê¾Ò´Ù.

ð¯ 5íñ Ì¿ ÒÕ

ð¯ 1 ï½ Ì¿ ÒÕ

À§Çè°ü¸®¶õ êËúÏÝÂà°°ú ÜÁäÌη×â·Î¼­ ±¸¼ºµÇ¾îÀÖ´Ù. êËúÏÝÂà°À̶õ Á¤º¸½Ã½ºÅÛ°ú ±× ÀÚ»êÀÇ ±â¹Ð¼º, ¹«°á¼º, °¡¿ë¼º¿¡ ¿µÇâÀ» ¹ÌÄ¥ ¼ö ÀÖ´Â ´Ù¾çÇÑ À§Çù¿¡ ´ëÇØ¼­ ½Ã½ºÅÛÀÇ Ãë¾à¼ºÀ» ÀνÄÇϰí, ÀÌ·Î ÀÎÇØ¼­ ¿¹»óµÇ´Â ¼Õ½ÇÀ» ÝÂà°ÇÏ´Â °ÍÀÌ´Ù. êËúÏÝÂà°°úÁ¤Àº ÀÚ»ê, À§Çù, Ãë¾à¼º, ÜÁäÌÓßóþ, ±×¸®°í ¼Õ½Ç¸¦ °è»êÇÏ´Â ¿©·¯¿ä¼Òµé °£¿¡ °ü°è¸¦ ÝÂà°ÇÏ´Â °ÍÀÌ´Ù. ÜÁäÌη×â¶õ êËúÏÝÂà°¿¡ ÀÇÇØ¼­ ¼±ÅÃµÈ ÜÁäÌÓßóþÀ» ¼³Ä¡Çؼ­ À¯Áöjº¸¼öÇÏ´Â °ÍÀÌ´Ù. êËúÏÝÂà°Û°Ûö¿¡´Â À§Çù¹ß»ýÈ®·ü°ú ¼Õ½ÇÅ©±â¸¦ °öÇØ¼­ °è»êÇÏ´Â '±â´ë°¡Ä¡ºÐ¼® (expected value analysis)'ÀÎ Á¤·®ÀûºÐ¼®¹ý°ú, ¼Õ½ÇÅ©±â¸¦ È­Æó°¡Ä¡·Î ÃøÁ¤ÇÒ ¼ö ¾ø¾î¼­ êËúÏÀ» ±â¼úº¯¼ö(descriptive variables)·Î Ç¥ÇöÇÏ´Â Á¤¼ºÀûºÐ¼®¹ýÀÌ ÀÖ´Ù. Á¤ ·®Àû ºÐ¼®¹ý¿¡´Â ¼öÇаø½ÄÁ¢±Ù¹ý, È®·üºÐÆ÷ÃßÁ¤¹ý, Á¡¼ö¹ý, ¸óÅ×Ä®·Î ½Ã¹Ä·¹À̼Ç, È®·üÁö¹è, °ú°ÅÀÚ·áÁ¢±Ù¹ý µîÀÌ ÀÖ°í, Á¤¼ºÀûºÐ¼®¹ý¿¡´Â µ¨ÆÄÀ̹ý, ½Ã³ª¸®¿À¹ý, ¼øÀ§°áÁ¤¹ý, ÆÛÁöÇà·Ä¹ý, Áú¹®¼­¹ý µîÀÌ ÀÖ´Ù. ±×¸®°í, º¹ÇÕÀûÀÎ ºÐ¼®¹ýÀ¸·Î °¡Ä¡»ç½½ ºÐ¼® ÀÌ ÀÖ´Ù. Á¤º¸½Ã½ºÅÛ êËúÏÝÂà°À» À§ÇÑ ÜÁä̼³°è¹æ¹ýÀÌ 3°¡Áö ¼¼´ë·Î ÁøÈ­µÇ°í ÀÖ´Ù. Á¦1 ¼¼´ë ¹æ¹ýÀΠüũ¸®½ºÆ® Á¢±Ù¹æ¹ýÀº º¸¾È´ëÃ¥ÀÇ À¯¹«¿¡ ´ëÇÑ Áú¹®¼­·Î¼­ êËúÏÝÂà° Áß¿¡¼­ ƯÈ÷ ¹®Á¦¿Í ÇØÀÇ °ø°£À» ¾ÐÃà½ÃŰ´Â °ÍÀÌ´Ù. Ãë¾à¼ºÀº º¸¾È´ëÃ¥ÀÇ °áÇÌ»ó Å·ΠÁ¤Àǵǰí:Ãë¾à¼º Æò°¡¸¦ ÜÁäÌÓßóþÀÇ À¯¹«¸¦ ½Äº°ÇÏ¿©, ÜÁäÌÓßóþÀÌ °áÇÌ»óÅ ¿¡ ÀÖ´Â °æ¿ì À§Çù¹ß»ýÀ» °¨¼Ò½Ãų ¼ö ÀÖ´Â ÜÁäÌÓßóþÀ» Á¦½ÃÇÏ´Â °ÍÀÌ´Ù. ÜÁäÌÀÇ ¿µ¿ªÀº ÀϹÝÀûÀ¸·Î ¹°Àû º¸¾È, ³í¸®Àû º¸¾È, °æ¿µ º¸¾ÈÀ¸·Î ±¸ºÐµÈ´Ù. üũ¸®½ºÆ® Á¢±Ù¹æ¹ý¿¡´Â 'SAFE üũ¸®½ºÆ®', 'ÄÄÇ»ÅÍ º¸¾ÈÆí¶÷', 'ÄÄÇ»ÅÍ º¸¾È ÀÚü °¨»ç¸¦ À§ÇÑ AEES üũ¸®½ºÆ®', LLNL üũ¸®½ºÆ®' µîÀÌ ÀÖÀ¸³ª, ÀÌ Áß¿¡¼­´Â 'LLNL üũ ¸®½ºÆ®'°¡ »ó´ëÀûÀ¸·Î ¹°Àû/³í¸®Àû/°æ¿µ º¸¾È¿¡ ´ëÇÑ Æò°¡Ç׸ñÀÌ ÇÕ¸®ÀûÀ¸·Î ±¸¼º µÇ¾î ÀÖ´Ù.

LLNLüũ¸®½ºÆ®¸¦ ÀÌ¿ëÇÑ ÞÀçÓæÚϼÀÇ ÁÖ¿ä °á°ú´Â ´ÙÀ½°ú °°ÀÌ ¿ä¾àµÈ´Ù.

ù°, ½Ã½ºÅÛ °³¹ß, Á¶Á÷ ±¸Á¶, µ¥ÀÌÅÍ º£À̽º¿Í ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î, Å͹̳Π»ç¿ë, ȯ°æ ºÐ¾ß¿¡ ´ëÇÑ ÜÁäÌÓßóþÀÌ ÀߵǾî ÀÖ¾î Çö»óÅÂ·Î ÃæºÐÇÑ °ÍÀ¸·Î ³ªÅ¸³µ´Ù. ÀÌ´Â ½Ã½ºÅÛ °³¹ß°ú µ¥ÀÌÅÍ º£À̽º¿Í ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î ºÐ¾ßÀÇ °æ¿ì´Â Çѱ¹ ÁöÁ¡ ¿¡¼­ ¿ä±¸ÇÏ´Â °ÍÀ» º»»ç¿¡¼­ Á÷Á¢ÀûÀ̰í ü°èÀûÀ¸·Î °ü¸®Çϱ⠶§¹®À̰í, Á¶Á÷ ±¸Á¶¿Í ȯ°æ ºÐ¾ß´Â Çѱ¹ ÁöÁ¡ÀÇ °æ¿ì Á¶Á÷ ±¸¼º¿ø°ú Á¤º¸½Ã½ºÅÛÀÇ ÀÚ»êÀÌ ÀÛ¾Æ °ü¸®¿Í ºÒ¸¸ ´Ù°¢ÀûÀ¸·Î ¼ö¿ëÇÒ ¼ö ÀÖ°í, Å͹̳Π»ç¿ë ºÐ¾ßµµ Á¶Á÷ ±¸¼º¿øÀÌ À۱⠶§ ¹®¿¡ Å͹̳Π»ç¿ë¿¡ ´ëÇÑ °¨µ¶À» ¼ö¿ùÇÏ°Ô ÇÒ ¼ö Àֱ⠶§¹®À̶ó »ç·ÁµÈ´Ù.

µÑ°, Àλç Á¤Ã¥, ÈÆ·Ã ¹× Áö°¢, µ¥ÀÌÅÍ¿Í ÇÁ·Î±×·¥ Á¢±Ù, ÀÔ·Â ¹× Ãâ·Â, µ¥ÀÌÅÍ Ã³¸®, (¿ø°Ý)Åë½Å, ¹é¾÷°ú º¹±¸ ºÐ¾ß´Â ÜÁäÌÓßóþÀÌ ¾ÆÁÖ ½Ã±ÞÈ÷ ÇÊ¿äÇÑ °ÍÀº ¾Æ´Ï³ª ±âÁ¸ÀÇ ÜÁäÌÓßóþÀ¸·Î´Â Ãë¾àÇÏ¿© ÜÁäÌÓßóþÀÌ ÇÊ¿äÇÑ °ÍÀ¸·Î ³ªÅ¸³µ´Ù. ÀÌÁß (¿ø°Ý) Åë½Å, ÀÔ·Â ¹× Ãâ·Â ºÐ¾ßÀÇ °æ¿ì´Â »ç·Êȸ»ç°¡ ÀºÇàÀ̶ó´Â Á¡À» °í·ÁÇÏ¿© ´Ù¸¥ ºÐ ¾ß¿¡ ¿ì¼±ÇÏ¿© ÜÁäÌÓßóþÀ» ¸¶·ÃÇØ¾ß µÉ °ÍÀ¸·Î »ç·ÁµÈ´Ù.

¼¼Â°, ¹°¸®Àû Á¢±Ù ºÐ¾ß´Â ÀÚµ¿È­µÈ ¹°¸®Àû Á¢±Ù ÅëÁ¦ ½Ã½ºÅÛ¿¡ ´ëÇÑ Áö¼ÓÀûÀÎ ¼­ºñ½º ¹®Á¦¸¦ Á¦¿ÜÇϰí´Â ¸ðµç ºÎºÐ¿¡ À־ ½Ã±ÞÇÑ ÜÁäÌÓßóþÀ» ¸¶·ÃÇØ¾ß µÉ °ÍÀ¸·Î ³ªÅ¸³µ´Ù. ÀÌ´Â »ç·Êȸ»ç°¡ ÀºÇàÀ̶ó´Â Ư¼ö¼ºÀ¸·Î ÀÎÇØ ½Ã½ºÅÛÀÇ ÀÚ»êÀÌ ¿ÜºÎ·Î ³ëÃâÀÌ ½±±â ¶§¹®¿¡ À§Çù¿¡ ´ëÇÑ º¸¾È´ëÃ¥ ¼ö¸³ÀÌ ¾î·Æ±â ¶§¹®ÀÎ °ÍÀ¸·Î »ç·ÁµÈ´Ù.

º» æÚϼÀÇ ½Ã»çÁ¡Àº Á¤º¸È­ÀÇ ±Þ¼ÓÇÑ ¹ßÀü¿¡µµ ºÒ±¸ÇÏ°í ¿ì¸®³ª¶óÀÇ °æ¿ì ´ëºÎºÐÀÇ ±â¾÷¿¡¼­ Á¤º¸½Ã½ºÅÛ º¸¾È¿¡ ´ëÇÑ Ã¼°èÀûÀÎ ´ëÃ¥ÀÌ ¾ø´Â ½ÇÁ¤À̾ ÇâÈÄ ¿ì¸®³ª¶ó ½ÇÁ¤¿¡ ¸ÂÀº ¼ÒÇÁÆ®¿þ¾î ºÐ¼® ¹æ¹ý °³¹ßÀ» À§Çؼ­´Â º» æÚϼ°¡ ÇʼöÀû ÀÌ´Ù.

ð¯ 2ï½ æÚϼÀÇ ùÚÍ£ ¹× ú¾ý­ æÚϼΤð¹

º» æÚϼÀÇ ÇѰèÁ¡À» ¸î °¡Áö·Î ¿ä¾àÇÔÀ¸·Î ¾ÕÀ¸·Î Á¤º¸½Ã½ºÅÛ ÜÁäÌ¿¡ °üÇÑ Ãë ¾à¼º Æò°¡ ¹× êËúÏÝÂà°¿¡ ´ëÇÑ æÚϼ۰ú¾À» Á¦½ÃÇØ º¸¸é ´ÙÀ½°ú °°´Ù.

ù°, ¼³¹®ÁöÀÇ ÀÀ´äÀÚ ¼³Á¤ÀÇ ¹®Á¦¿¡¼­ °³ÀÎÀûÀÎ ÀνÄÀÇ ¹®Á¦¿¡ µû¶ó ´Þ¶óÁú ¼ö ÀÖÀ¸¹Ç·Î Á÷±Þ°ú °æÇèÀÌ Ç³ºÎÇÑ Àü¹®°¡·Î Çϰí ÁÖ°üÀ» ÁÙÀ̱â À§ÇØ ¿©·¯ »ç¶÷ÀÇ Áú¹®À» ÅëÇÕÇÏ¿© ºÐ¼®ÇÏ´Â °ÍÀÌ ¹Ù¶÷Á÷ÇÏ´Ù.

µÑ°, êËúÏÝÂà°Û°ÛöµéÀº Á¤È®¼º, ¿ÏÀü¼º, ³ë·Â, ½ÇÇ༺, ÀÌ¿ë±â¼ú, Áö¿ø°¡´É¼º, ÃøÁ¤°¡´É¼º µî ¼±Åà ±âÁصé°ú ºÐ¼® ¹æ¹ýµéÀÇ À塤´ÜÁ¡À» °í·ÁÇØ¼­ À§Çè ºÐ¼®ÀÚ ÈæÀº °æ¿µÀڴ ƯÁ¤ »óȲ¿¡ ÀûÀýÇÑ ºÐ¼®¹æ¹ýÀ» ¼±ÅÃÇØ¾ß ÇÑ´Ù. À§ÇèºÐ¼®°úÁ¤¿¡¼­ Á¤·®Àû ºÐ¼®¹ýÀÌ Á¤¼ºÀû ºÐ¼®¹ýº¸´Ùµµ ¼±ÅñâÁØ Ãø¸é¿¡¼­ ¿ì¼öÇÑ ¹æ¹ýÀÌÁö¸¸, º°·Î ÀÌ¿ëµÇÁö ¾ÊÀº ÀÌÀ¯´Â ÁÖ°üÀû ¼ºÁúÀ» °®°í ÀÖ´Â À§ÇèÀ» °è·®È­ÇÏ´Â µ¥´Â ÇѰ谡 Àֱ⠶§¹®ÀÌ´Ù.

¼¼Â°, À§ÇùÀÇ ¹ß»ýºóµµ°¡ ¸Å¿ì ÀÛÀº °æ¿ì³ª ¼Õ½ÇÅ©±â¸¦ È­Æó °¡Ä¡·Î ÃßÁ¤ÇØ¾ß ÇÏ´Â °æ¿ì ÃæºÐÇÑ °ú°ÅÀÚ·á°¡ ¾ø´Â °æ¿ì°¡ ´ëºÎºÐÀÌ´Ù. ¹«¾ù º¸´Ùµµ êËúÏÝÂà°Û°Ûö ÀÇ ºÒ¿ÏÀü¼º°ú ÀÇ»ç°áÁ¤ÀÚÀÇ Á¦¾àµÈ ÇÕ¸®¼ºÀÌ êËúÏÀ» ºÐ¼®Çϴµ¥ °¡Àå Å« ÇѰèÁ¡ ÀÌ µÈ´Ù. ±×·¯¹Ç·Î, ¼±ÅñâÁØÀ» °í·ÁÇØ¼­ ±× ºÐ¼®¹æ¹ýÀ» ¼±ÅÃÇ쵂 °¡´ÉÇÏ¸é ¿©·¯¹æ¹ýÀ» º¹ÇÕÀûÀ¸·Î »ç¿ëÇÏ´Â °ÍÀÌ ¹Ù¶÷Á÷ÇÏ´Ù.

³×°, üũ¸®½ºÆ® Á¢±Ù ¹æ¹ýÀº Á¤º¸½Ã½ºÅÛ ÀÚ»ê°ú À§Çù°úÀÇ °ü°è¿¡¼­ Çö ½Ã½ºÅÛÀÇ º¸¾È ¼öÁظ¸À» ³ªÅ¸³»¹Ç·Î À§ÇùÀÇ ¹ß»ýÈ®·ü°ú ¼Õ½ÇÀÇ Å©±â¸¦ °è·®ÀûÀ¸·Î °è »êÇÒ ¼ö ¾÷¾î Á¤º¸½Ã½ºÅÛ¿¡ ´ëÇÑ À§Çè ÃøÁ¤°ú Á¦½ÃµÈ º¸¾È´ëÃ¥ÀÇ Þ¨éÄ1üùÍý ÝÂà°À» ÇÒ ¼ö ¾ø´Ù. ±×·¯¹Ç·Î ¿ÏÀüÇÑ êËúÏÝÂà°ÀÇ Æ²ÀÌ µÉ ¼ö ¾ø´Â ÇѰ谡 ÀÖ´Ù. ¿ÏÀüÇÑ êËúÏÝÂఠƲÀÌ µÇ±â À§Çؼ­´Â Á¤·®ÀûÀ¸·Î À§ÇùÀÇ ¹ß»ýÈ®·ü°ú ¼Õ½ÇÀÇ Å©±â¸¦ ÃøÁ¤ÇÒ ¼ö ÀÖ´Â Á¤·®ÀûÀÎ êËúÏÝÂà°Û°ÛöÀ» º´ÇàÇØ¾ß ÇÑ´Ù. ´Ù¼¸Â°, Üâ æÚϼ¿¡¼­ »ç¿ëÇÑ LLNL üũ¸®½ºÆ®ÀÇ Áú¹® ³»¿ë 854°³ Áß ¿ì¸® ½ÇÁ¤¿¡ ¸ÂÁö ¾ÊÀº Ç׸ñÀ» Á¦¿Ü½ÃŲ 784°³ Ç׸ñ¿¡ ´ëÇÑ ºÐ¼®À» ½Ç½ÃÇÏ¿´À¸³ª »õ·Î ¿î »óȲ¿¡ ¸Â´Â Ç׸ñÀ» Ãß°¡ ½ÃŰÁö ¸øÇß´Ù. ¾ÕÀ¸·Î üũ¸®½ºÆ®ÀÇ Ç׸ñÀ» Á¤º¸½Ã½ºÅÛ º¯È­¿¡ µû¶ó °è¼ÓÀûÀÎ ¼öÁ¤ÀÌ ÇÊ¿äÇÏ´Ù.

¿©¼¸Â°, üũ¸®½ºÆ®ÀÇ °á°ú ºÐ¼®¿¡¼­ º» ¿¬±¸´Â HÀºÇàÀÇ Çѱ¹ÁöÁ¡ ´ÜÀÏ ±â¾÷¿¡ ´ëÇØ¼­ ½Ç½ÃÇÏ¿© ´Ù¸¥ Á¶Á÷°úÀÇ »ó´ëÀû ¼öÁØ ºñ±³¸¦ ÇÏÁö ¸øÇÏ¿´´Ù. Â÷ÈÄ ¿¬±¸ ¿¡¼­´Â µ¿Á¾ ±â¾÷À̳ª µ¿Á¾ »ê¾÷º°·Î ºñ±³ÇÏ¿© »ó´ëÀû ¼öÁØÀ» Á¦½ÃÇÏ´Â °Íµµ Áß¿ä ÇÏ´Ù.

¸¶Áö¸·À¸·Î Á¤º¸½Ã½ºÅÛ êËúÏÝÂà°¿¡ ´ëÇÑ ¿ì¸®³ª¶ó ½ÇÁ¤¿¡ ¸Â´Â êËúÏÝÂà° Ù¼úþ À» °³¹ßÇÏ¿© ¼ÒÇÁÆ®¿þ¾îÈ­ ÇÏ´Â °ÍÀÌ ÇÊ¿äÇÏ´Ù.

Âü °í ¹® Çå

<ÏÐÒ®ÙþúÌ>

±è ±â À±, "Á¤º¸±â¼ú¿¡ ´ëÇÑ À§ÇèºÐ¼®¹æ¹ý," ±â¾÷°æ¿µ¿¬±¸, Á¦ 3±Ç, ±¤¿î´ëÇб³ ±â¾÷°æ¿µ ¿¬±¸¼Ò, 1994, PP. 1-18.

±è ±â À±, ±è Á¤ ´ö, "Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®°ú °ü¸®," KMIS'94Ãß°è Çмú´ëȸ ³í¹®Áý, Çѱ¹°æ¿µÁ¤º¸ÇÐȸ, 1994, PP. 277-297.

<ìíÜâÙþúÌ>

«³«ó«Ô«ñ- «¿«»«ñ«ê«£ªËμª¹ªë «ê«¹«ï ºÐ¼® (JRAM ªËªë«¢«×«í-«Á), ìíÜâï×ÜÃô¥×âËÒÛ¡úðüå, øÁÒ´ 4, pp. 33-44.

<ϱڸÙþúÌ>

Charles C. Wood, William W. Banks, Sergio B, Gualro, Abel A. Garcia, Victor E. Hampel and Henry p. Sartorio, "Computer security," A Willey-Interscience Pliblication, 1987. Commission of the European Communities Security Investigations Projects, Risk Analysis Methods Database, Project S2014 - Risk Analysis, Report Number 19744(S2014/WP08), Version 1.0, Jan. 1993.

Commission of the European Communities Security Investigations Projects, final and Strategy Report, Project S2014 - Risk Analysis, Report Number 9744(S201VWP08), Version 1.0, Feb. 1993.

Cooper, J. A., Computer 8T Communications Security Strategies for 1990s, McGraw-Hill, 1989.

FIPS PUB 41, Computer Security Guidelines for Implementing the Privacy Act of 1974, U.S. Department of Commerce/National Bureau of Standards, May. 1975.

FIPS PUB 65, Guidelines for Automatic Data Processing Risk Analysis, V.S. Department of Commerce/National Bureau of Standards, Aug. 1979.

FIPS PUB 73, Guidelines for Suwi.5 of Computer Applications, U.S. Department of Commerce/national Bureau of Standards, Jun. 1980.

Guairo, 5., "Analytical and Decision Models of the Livermore Risk Analysis Methodology(LRAM)," Proceedings of the 1988 Computer Security Risk Management Model Builders Workshop, 1988, pp.49-72.

Gilbert, 1. A.,"Risk Analysis: Concepts and Tools," Datapro Reports on Information Suwity, Risk Analysis, Sep. 1991, pp.101-112.

ISO/TEC JTC1/SC27 N689, Guidelines for the Management of IT System Security: Part3-Techniques for the Management of IT Security, ISO, Mar. 1993.

ISO/TEC JTC1/SC27 N72O, Guidelines for the Management of IT Security (GMITS): Part2-Managing and Planning If Security, 150, May. 1993.

ISO/TEC JTC1/SC27 N777, Guidelines for the Management of IT System Security(GMITS): Part1-Concepts and Models for IT Security, ISO, Oct. 1993.

ISO/TEC JTC1/SC27 N442, Key Management PUI: Framework, 150, Mar. 1994.

Katzke, 5., "A Government Perspective on Risk Management of Automated Information Systems," Proceedings of the 1988 Computer Security Risk Management Model Builders Workshop, 1988, pp.3-20.

Moses, R., "Risk Analysis and Management," Computer Security Reference Book edited by Jackson, K. M.8f Hruska,1.8E Parker, Dom B., CRC Press, Inc., 1992, pp.227-263.

"CCTA Risk Analysis and Management Methodology(CRAMM)," Datapro Reports on Information Security, December 1992, pp.101-110. NIST, V.S. Department of Justice Simplified Risk Analysis Guidelines, HISTIR 4387, Aug. 1990.

Otwell, K. and AAdiiage,3., "The Role of Vulnerability in Risk Management," Computer Security Journal, Vol.W, No.1, 1989, pp.15-21.

Ozier, W., "Issues in Quantitative Versus Qualitative Risk Analysis," Datapro Reports on Information Security, Risk Analysis, March 1992, pp101-107.

Perry, W.S,8f Kuong, J. F., EDP Risk Analysis and Control Justification, Management Advisory Publications 1981. Ruiner, R. J. Jr.5f Snider, C. A.8. Cair, H. H., Risk Analysis for Information Technology, loan of Management Information Systems, 1991, Vol.8, No.1, W.129-147.

Richard Baskerville, "Information System Security Design Method: Implications for Information Systems Development," ACM Computing Surveys, Vol. 25, No. 4, December 1993.

Robak, E. EE Security and Emergency Planning Staff, U.S. Department of Justice Simplified Risk Analysis Guidelines(SRAG), National Institute of Standards and Technology, 1990.

Schmidt E.,"Conceptual Model of the Risk Management Process," Proceedings of the 1988 Computer Security Risk Management Model Builders Workshop, 1988, PP.89-102.

System Security Study Committee, Computer Science and Telecommunication to Board, Commission on PhysicᤠSciences, Mathematics, and Applications, National Research Council, "Computers at Risk," National Academy Press, 1991.

Von Solms, R. and Eloff, J. H. p. and von Solms, 5. H., "Computer security management: a framework for effective management involvement," Information Age, Vol.12, No.4, Oct. 1990, pp.217-222.

William E. Perry and Javier F. Roung, "EDP Risk Analysis and Controls Justification," Management Advisory Publications, 1981.

ºÎ·Ï:Á¤º¸½Ã½ºÅÛ 13°³ºÐ¾ßÀÇ ÅëÁ¦Ç¥