º»¹®/³»¿ë
3.4 Æò°¡½ºÄÉÀÏÀÇ ºÐ¼®
Á¶»çÇÑ °¢Á¾ Ç¥ÁØ, Áöħ, µµ±¸ ¹× ¿¬±¸°á°úµéÀÇ ÃøÁ¤½ºÄÉÀϵéÀº ¡°´Ù¾ç¼º¡±À¸·Î Ç¥ÇöÇÑ´Ù.
▪´Ü°è ¸íĪÀÇ ´Ù¾ç¼º: ¼ýÀÚ¿Í ´Ü¾îµéÀ» »ç¿ëÇϰí ÀÖ´Ù. ÀÌ´Â ÀÀ¿ëºÐ¾ßÀÇ Æ¯¼ºÀ» ¹Ý¿µÇÏ·ÁÇÑ ½ÃµµÀÌÁö¸¸ ±Ã±ØÀûÀ¸·Î´Â ¼ýÀÚ³ª ¹®ÀÚ´Â µ¿ÀÏÇÑ Àǹ̸¦ °®´Â´Ù.
▪´Ü°è¼öÀÇ ´Ù¾ç¼º: À§ÇèºÐ¼®ºÎ¹®ÀÇ °æ¿ì °¢ ÃøÁ¤´ë»ó¼Ó¼ºµéÀº 3´Ü°è ¶Ç´Â 5´Ü°è°¡ ÁÖ·ù¸¦ ÀÌ·ç¸ç ÀϺΠÀÚ·á¿¡¼´Â 10´Ü°è(¿¹: PRAM¿¡¼ÀÇ Àڻ갡ġ)·Î Á¤ÀÇÇÑ °æ¿ìµµ ÀÖ´Ù. ´Ü°è¼ö°¡ ¸¹¾ÆÁú¼ö·Ï ÀÎÁ¢´Ü°è°£ÀÇ ºÐº°·ÂÀÌ Àû¾îÁö¸ç µî±ÞȰ¡ ¾î·Á¿öÁø´Ù. ƯÈ÷, Àڻ갡ġ, À§Çù¼öÁØ, Ãë¾à¼º¼öÁØÀ» µî±ÞÈ ÇÏ´Â ÀÏÀº ÁÖ°üÀûÀÎ(¶Ç´Â ¼¼úÀûÀÎ) ±âÁØ¿¡ ÀÇÁ¸ÇؾßÇÑ´Ù. µû¶ó¼, ´Ü°è ¼ö¸¦ ¼¼ºÐÈÇÏ´Â °ÍÀº Æò°¡°á°ú¿¡ ´ëÇÑ ½Å·Ú¼ºÀ» ÀúÇϽÃų ¼ö ÀÖÀ¸¹Ç·Î, 3´Ü°è ¶Ç´Â 5´Ü°è°¡ ÀûÇÕÇÏ´Ù°í ÆÇ´ÜµÈ´Ù. ¹®Çå[26]¿¡¼´Â ´Ü°è ¼ö¿¡ ´ëÇÑ ¹®Á¦¸¦ °íÂûÇÏ¿´´Ù.
▪µî±ÞȱâÁØÀÇ ´Ù¾ç¼º: µî±ÞȱâÁØÀº ¼¼úÀû, ¼öÄ¡Àû ¶Ç´Â ´Ù¸¥ ¼Ó¼ºµéÀÇ Á¶ÇÕ(À§Çè ¼Ó¼ºÀÇ °æ¿ì)À¸·Î µÇ¾îÀÖ´Ù. ¼¼úÀû ±âÁØÀÇ °æ¿ì, µî±ÞȰ¡ °£´ÜÇÏÁö¸¸ °á°úÀÇ °´°ü¼ºÀÌ ÀúÇϵȴÙ. ¼öÄ¡Àû ±âÁØÀÇ °æ¿ì À§ÇèÆò°¡´ë»ó ±â°üÀÇ Æ¯Â¡À»¡¦(»ý·«)
Âü°í¹®Çå
[1] ISO/IEC TR 13335, 1ºÎ, ¡°ITº¸¾È °³³ä ¹× ¸ðµ¨¡±(1996), 2ºÎ ¡°º¸¾È°ü¸® ¹× °èȹ¡±(1997).
[2] ISO/IEC TR 13335, 3ºÎ, ¡°IT º¸¾È°ü¸® Áöħ¡±(1998), 5ºÎ, ¡°³×Æ®¿öÅ© ¿¬°á°ü¸® Áöħ¡±(2000).
[3] British Standards Institution(BSI), ¡°BS-7799¡±, 1999.
[4] Bundesamt fur Sicherheit in der Informationstechnik), `IT Baseline Protect Manual`, - Standard security safeguards, http://www.bsi.bund.de/gshb/english/menue.htm
[5] SSE-CMM, ¡°Project, Systems Security Engineering Capability Maturity Model (SSE-CMM) - Model Description Document¡±, V.2, http://www.sse-cmm.org, 1999. 4. 1.
[6] Á¤º¸Åë½ÅºÎ, ¡°Àü»ê¸Á º¸¾ÈÀ» À§ÇÑ À§Çè°ü¸® Áöħ¼¡±, KICO.KO-10.0047, 1995.12.
[7] À̰¼ö, ¡°¼±Áø±¹ Á¤º¸º¸È£½Ã½ºÅÛÀÇ Æò°¡Á¦µµ¿¡ °üÇÑ ¿¬±¸¡±, KISA º¸°í¼, 1998. 3.
[8] À̰½Å, ±èÇйü, ÀÌÈ«¼·, ¡°±¹³»¿Ü Á¤º¸º¸È£ ¸ðµ¨¿¡ °üÇÑ ¿¬±¸¡±, Á¤º¸º¸È£ÇÐȸÁö, 11-3, 2001.6
[9] S. Vallabhaneni, ¡°Auditing Computer Security- A Manual with Case Studies¡±, 1989.
[10] ISO/IEC 14598-1, ¡°IT-Software product evaluation, Part 1. General overview¡±, 1997. 3.
[11] FIPS-65, ¡°Guidelines for Automatic Data Processing Risk Analysis¡±, NIST, 1975 (Aug. 1995¿¡ ÆóÁöµÊ).
[12] FIPS-191, ¡°Specifications for Guideline for The Analysis Local Area Network Security¡±, NIST, Nov. 1994.
[13] NIST, ¡°Risk Management Guide for Information Technology Systems¡±, NIST-SP-800-30, 2001.10.
[14] NISTIR-4387, ¡°Simplified Risk Analysis Guideline¡±, NIST, 1990.
[15] NISTIR-4325, ¡°Simplified Risk Analysis Guideline¡±, NIST, 1990.
[16] GAO, ¡°Information Security Risk Assessment - Practices of Leading Organizations¡±, - Case Study 1, GAO/AIMD-00-33, 1999. 11.
[17] GAO, ¡°Information Security Risk Assessment - Practices of Leading Organizations¡±, - Case Study 3, GAO/AIMD-00-33, 1999. 11.
[18] CSE, ¡°A Guide to Security Risk Management for IT Systems¡±, Government of Canada, Communications Security Establishment(CSE)¡±, 1996.
[19] TTAS, ¡°°ø°øÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀ» À§ÇÑ À§ÇèºÐ¼® Ç¥ÁØ - °³³ä°ú ¸ðµ¨¡±, TTAS.KO-12.007, 1998. 11.
[20] OCTAVE, ¡°OCATVE Criteria, Version 2.0¡±, Carnegie Mellon Software Engineering Institute(2001. 12), OCATVE Method Implementation Guide Version 2.0, OCTAVE, 2001. 6, http://www.sei.cmu.edu/ publications/ pubweb.html.
[21] CRAMM, ¡°A Practitioner`s View of CRAMM¡±, http://www.gammassl.co.uk/.
[22] ±è±âÀ±, ³ª°ü½Ä, ±èÁ¾¼®, ¡°º¸¾È°ü¸®¸¦ À§ÇÑ À§Çù, ÀÚ»ê, Ãë¾à¼ºÀÇ ºÐ·ù ü°è¡±, Á¤º¸º¸È£ÇÐȸÁö, 6±Ç 1È£, 1995. 6.
[23] Will Ozier, ¡°Risk Analysis and Assessment¡±, Information Security Management Handbook (4¡®th Ed.), CRC Press, 2000.
[24] C. Hamilton, ¡°Data-driven Security: How to Target, Focus and Justify the Security Program¡±, 28`th Annual Computer Security Conference & Exhibition, 2001.
[25] ¡°½Ã¸¸ÅØ»çÀÇ Expert 4.1 ¼Ò°³¡±, 1ȸ ¼¿ïÁ¤º¸º¸¾È±â¼ú ±¹Á¦ÄÁÆÛ·±½º, 2000³â 11¿ù.
[26] ±èÁ¤´ö (¿Ü), ¡°À§Çè ºÐ¼® µµ±¸ ±âÃʱâ¼ú °³¹ß¿¡ °üÇÑ ¿¬±¸¡±, ETRI ¿¬±¸º¸°í¼, 2001.
[27] ¼Û°üÈ£(¿Ü), ¡°Á¤º¸½Ã½ºÅÛ º¸¾ÈÀ» À§ÇÑ À§ÇèºÐ¼® ¼ÒÇÁÆ®¿þ¾î °³¹ß¡± Çѱ¹Àü»ê¿ø ¿¬±¸º¸°í¼, 1997. 12.
[28] J. Freeman, et al., ¡°Risk Assessment for Large Heterogeneous Systems¡±, 13`rd Computer Application Conference, 1997.
[29] R. Craft, et al., ¡°An Open Framework for Risk Management¡±, 21`st National Information System Security Conference, 1998.
[30] ISO/IEC 14598-5, ¡°IT-Software product evaluation, Part 5. Process for evaluation¡±, 1997. 12.
[31] ISO/IEC 14598-6, ¡°IT-Software product evaluation, Part 6. Documentation for evaluation modules, 1997. 3.
[32] ISO/IEC-9126 ¡°IT-Software product evaluation -Quality characteristics and guidelines for their use, 1991. 12. 15.
[33] B. Boehm, ¡°Software Engineering Economics¡±, Prentice-Hall, 1981.
[34] 「¼ÒÇÁÆ®¿þ¾î»ç¾÷´ë°¡ÀÇ ±âÁØ(2001)」, Á¤º¸Åë½ÅºÎ, 2001.
[35] Barry Boehm, et al., ¡°COCOMO 2.0 Software Cost Estimation Model¡±, International Society of Parametric Analysts, May 1995, http://sunset.usc.edu/research/COCOMOII /index.html.
[36] CC, ¡°Common Criteria for Information Technology Security Evaluation¡±, Version 2.1, CCIMB-99-031, August 1999, http://www. commoncriteria.org/site_index.html.
[37] CEM, ¡°Common Evaluation Methodology¡±, Version 1.0, CEM-99/045, August 1999, http://www.commoncriteria.org/site_index.html
[38] European Community, ¡°Information Technology Security Evaluation Criteria (ITSEC)¡±, Ver. 1.2, June 1991. http://www.cesg. gov.uk/assurance/iacs/ itsec/index.htm
[39] European Community, ¡°Information Technology Security Evaluation Criteria (ITSEM)¡±, Ver. 1.0, 1993. http://www.cesg.gov. uk/assurance/iacs/ itsec/index.htm
[40] DoD, ¡°Department of Defense Trusted Computer System Evaluation Criteria (TCSEC)¡±, Dec. 1985.
[41] Canadian System Security Centre, ¡°The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)¡±, Ver.3e, Jan. 1993.
[42] ¡°Á¤º¸Åë½Å¸Á ħÀÔÂ÷´Ü½Ã½ºÅÛ Æò°¡±âÁØ¡¤Æò°¡Áöħ¼¡±, Á¤º¸Åë½ÅºÎ°í½Ã 1998-19È£, Á¤º¸Åë½ÅºÎ, 1998.
[43] M. Swanson, ¡°Security Self-Assessment Guide for Information Technology Systems¡±, NIST- SP-800-26, NIST, ITº¸¾ÈÆò°¡, 2001.11.
[44] G. Stonebumer, et al., ¡°Risk Management Guide for Information Technology System¡±, NIST- SP-800-30, NIST, 2002.1.
[45] CIAO/VAF, ¡°Vulnerability Assessment Framework 1.1¡±, Critical Infrastructure Assurance Office(CIAO), 1999.10.
[46] D. Peeples, ¡°The Foundations of Risk Management¡±, 20`th National Information Security Conference, 1997.5.
[47] M. Timms, ¡°A Practical Approach to Risk Assessment¡±, Compsec Computer Security Conference`90, 1990. 10.
[48] Z. Ruthber et al., ¡°Guide to Auditing for Controls and Security: A System Development Lifecycle Approach¡±, NBS Special Publication 500-153, 1998.4.
[49] A. Finkelstein et al. (ed.), ¡°Software Process Modeling and Technology¡±, John Wiley&Sons, 1994.
[50] A. Furretta, A. Wolf, (ed.), ¡°Software Process¡±, John Wiley&Sons, 1996.
[51] W. Royce, ¡°Software Project Management - Unified Framework¡±, Addison Wesley, 1998.
[52] À̺´¸¸, À±Á¤¿ø, ¹Ú½Â±Ô, ¡°Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼® ¸ðµ¨¿¡ °üÇÑ ¿¬±¸`, WISC-97, 1997.
[53] CVE, ¡°Common Vulnerability and Exposure¡±, NIST, http://www.cve.mitre.org/cve/.