º»¹®/³»¿ë
±¹³»¿Ü ÄÄÇ»ÅÍ ¹üÁËÀÇ ¼ö»ç±â°ü ¹× º¸¾È±â±¸
1. ¼ö»ç±â°ü
1) ±¹¿Ü
¨ç F. B. I. (Federal Bureau of Investigation)
¹Ì±¹ ¹ý¹«¼º ¼Ò¼Ó ¿¬¹æ¹ý À§¹Ý ¹üÁË ¼ö»ç ±â±¸
- Computer Crimes Squad¸¦ µÎ¾î ÄÄÇ»ÅÍ ¹üÁË¿¡ ´ëóÇϰí ÀÖ´Ù. ±×¸®°í °¢ FBI ÁöºÎ¿¡ ÄÄÇ»ÅÍ ¹üÁË ´ã´ç¿ä¿ø ¹èÄ¡Çϰí ÀÖ´Ù.
¨è U. S. S. S. (U. S. Secrete Service)
¹Ì±¹ À繫¼º »êÇÏÀÇ ¼ö»ç ±â°ü, Access Device Fraud ¼ö»ç±ÇÀ» Áö´Ï°í ÀÖ´Ù.
¨é Computer Forensic
- ¹Ì±¹ D. E. A. (Drug Enforcement Agency) »êÇϱâ°ü
°¢Á¾ Àü»ê Áõ°ÅÀÚ·áµéÀÇ ¾ÏÈ£ ÇØÁ¦, ¹ÙÀÌ·¯½º ÇØÁ¦ ¹× µ¥ÀÌÅÍ ¹é¾÷ ¹× ÀÚ·áºÐ¼® ¾÷¹«¸¦ Çϸç Àϼ± ¼ö»ç ±â°üµéÀÌ ¼öÁýÇÑ Áõ°Å¸¦ °úÇÐÀûÀ¸·Î ºÐ¼®ÇÏ¿© ¹ýÀû Áõ°Å·Î ÀÌ¿ëÇÒ ¼ö ÀÖµµ·Ï Á¦°ø
¨ê HTCIA (High-Tech Computer Investigators Association)
- ¹Ì±¹ ÄÄÇ»ÅÍ ¹üÁË Àü´ã °Ë»çµéÀÇ Çù·Âü
¨ë N. C. I. S. (National Criminal Intelligence Service)
¿µ±¹ ±¹³»?¿ÜÀÇ ¹üÁË Á¤º¸¸¦ Á¾ÇÕÀûÀ¸·Î °ü¸®ÇÏ°í ºÐ¼®ÇÏ´Â ±â°üÀ¸·Î °¢ ¹üÁË ¼ö»ç ±â°üµé°ú ÀÎÅÍÆú µîÀ¸·ÎºÎÅÍ¡¦(»ý·«)
2) ±¹³»
¨ç Á¤º¸ ¹üÁË ¼ö»ç ¼¾ÅÍ : °ËÂû
¨è ÇØÄ¿¼ö»çÀü´ã¹Ý : °æÂû
¨é ±¹°¡¾ÈÀü±âȹºÎ
2. º¸¾È±â±¸
1) ±¹¿Ü
¨ç CERT (Computer Emergency Response Team)
¨è FIRST (Forum of Incidents Response and Security Teams)
¨é COAST (Computer Operations, Audit and Security Technology)
¨ê NSA (National Security Agency)
¨ë NCSC (National Computer Security Center) : NSA »êÇÏ
¨ì NIST (National Network Security Response Team)
¨í AFCERT (Air Force CERT)
2) ±¹³»
¨ç Çѱ¹Á¤º¸º¸È£¼¾ÅÍ
¨è CERT-Korea
¨é Çѱ¹ÀÎÅͳݺ¸¾È±×·ì (KISGROUP)
¶óÀ̹ö½Ã º¸È£ ¹× Á¤º¸Åë½Å ½Ã½ºÅÛÀÇ ¾ÈÀü ¿î¿µÀ» À§ÇÑ Á¤º¸º¸È£ °ü·Ã ±â¼úÀ» À§ÇÑ Á¤º¸º¸È£ ±â¼úÀ» ¿¬±¸, °³¹ßÇϸç, °ü¸®Àû Ãø¸é¿¡¼µµ Á¤º¸ º¸È£ °ü·Ã ±â¼úÀ» À§ÇÑ Á¤º¸º¸È£ ±âÁØ ¿¬±¸, °³¹ßÇϸç, °ü¸®Àû Ãø¸é¿¡¼µµ Á¤º¸º¸È£ ½Ã½ºÅÛÀÇ È£È¯¼º ¹× »óÈ£ ¿¬µ¿À» À§ÇÑ Ç¥ÁØÈ ¹× ±âÁØ, ÁöħÀ» °³¹ßÇÏ´Â µîÀÌ ÀÖ´Ù.
¨è CERT-Korea
¹Ì±¹ÀÇ CERT¸¦ º»¹Þ¾Æ ½Ã½ºÅÛ°øÇבּ¸¼Ò µî ±¹³» ÁÖ¿ä Àü»ê¸Á °ü°è ±â°üÀÇ º¸¾È Àü¹®°¡µéÀÌ ¸ð¿© Çѱ¹ ÃÖÃÊÀÇ ÄÄÇ»ÅÍ º¸¾È Àü¹® ¿¬±¸ ±â±¸
¨é Çѱ¹ÀÎÅͳݺ¸¾È±×·ì (KISGROUP)
Àü»ê¸Á º¸¾È Àü¹®°¡µéÀÇ ¿¬±¸ ¸ðÀÓÀ¸·Î¼ ½Ã½ºÅÛ°øÇבּ¸¼Ò, Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø µî Ã⿬ ¿¬±¸ ±â°üÀ» ºñ·ÔÇØ Åë½Å»ç¾÷ÀÚµé°ú °¢ Çб³ µî¿¡ ¼Ò¼ÓµÈ 40¿©¸íÀÇ Àü¹®°¡°¡ Âü¿©