¿Ã·¹Æ÷Æ® : ´ëÇз¹Æ÷Æ®, Á·º¸, ½ÇÇè°úÁ¦, ½Ç½ÀÀÏÁö, ±â¾÷ºÐ¼®, »ç¾÷°èȹ¼­, Çо÷°èȹ¼­, ÀÚ±â¼Ò°³¼­, ¸éÁ¢, ¹æ¼ÛÅë½Å´ëÇÐ, ½ÃÇè ÀÚ·á½Ç
¿Ã·¹Æ÷Æ® : ´ëÇз¹Æ÷Æ®, Á·º¸, ½ÇÇè°úÁ¦, ½Ç½ÀÀÏÁö, ±â¾÷ºÐ¼®, »ç¾÷°èȹ¼­, Çо÷°èȹ¼­, ÀÚ±â¼Ò°³¼­, ¸éÁ¢, ¹æ¼ÛÅë½Å´ëÇÐ, ½ÃÇè ÀÚ·á½Ç
·Î±×ÀΠ ȸ¿ø°¡ÀÔ

ÆÄÆ®³Ê½º

ÀÚ·áµî·Ï
 

Àå¹Ù±¸´Ï

´Ù½Ã¹Þ±â

ÄÚÀÎÃæÀü

¢¸
  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (1 ÆäÀÌÁö)
    1

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (2 ÆäÀÌÁö)
    2

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (3 ÆäÀÌÁö)
    3

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (4 ÆäÀÌÁö)
    4

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (5 ÆäÀÌÁö)
    5

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (6 ÆäÀÌÁö)
    6

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (7 ÆäÀÌÁö)
    7

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (8 ÆäÀÌÁö)
    8

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (9 ÆäÀÌÁö)
    9

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (10 ÆäÀÌÁö)
    10


  • º» ¹®¼­ÀÇ
    ¹Ì¸®º¸±â´Â
    10 Pg ±îÁö¸¸
    °¡´ÉÇÕ´Ï´Ù.
¢º
Ŭ¸¯ : Å©°Ôº¸±â
  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (1 ÆäÀÌÁö)
    1

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (2 ÆäÀÌÁö)
    2

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (3 ÆäÀÌÁö)
    3

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (4 ÆäÀÌÁö)
    4

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (5 ÆäÀÌÁö)
    5

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (6 ÆäÀÌÁö)
    6

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (7 ÆäÀÌÁö)
    7

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (8 ÆäÀÌÁö)
    8

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (9 ÆäÀÌÁö)
    9

  • Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç   (10 ÆäÀÌÁö)
    10



  • º» ¹®¼­ÀÇ
    (Å« À̹ÌÁö)
    ¹Ì¸®º¸±â´Â
    10 Page ±îÁö¸¸
    °¡´ÉÇÕ´Ï´Ù.
  ´õºíŬ¸¯ : ´Ý±â
X ´Ý±â
Á¿ìÀ̵¿ : µå·¡±×

Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç

ÀÎ ¼â
¹Ù·Î°¡±â
Áñ°Üã±â Űº¸µå¸¦ ´­·¯ÁÖ¼¼¿ä
( Ctrl + D )
¸µÅ©º¹»ç ¸µÅ©ÁÖ¼Ò°¡ º¹»ç µÇ¾ú½À´Ï´Ù.
¿øÇÏ´Â °÷¿¡ ºÙÇô³Ö±â Çϼ¼¿ä
( Ctrl + V )
¿ÜºÎ°øÀ¯
ÆÄÀÏ  Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç~.hwp   [Size : 66 Kbyte ]
ºÐ·®   10 Page
°¡°Ý  1,000 ¿ø


īƮ
´Ù¿î¹Þ±â
īī¿À ID·Î
´Ù¿î ¹Þ±â
±¸±Û ID·Î
´Ù¿î ¹Þ±â
ÆäÀ̽ººÏ ID·Î
´Ù¿î ¹Þ±â
µÚ·Î

ÀÚ·á¼³¸í
Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼®À» À§ÇÑ ºÐ·ù¿Í Æò°¡±âÁØÃ¼°è Á¶»ç¿¡ ´ëÇÑ ±ÛÀÔ´Ï´Ù.
upÁ¤º¸½Ã½ºÅÛÀ§ÇèºÐ¼®À»À§ÇѺзù¿ÍÆò°¡±âÁØÃ¼°èÁ¶»ç
¸ñÂ÷/Â÷·Ê

¥°. ¼­ ·Ð

¥±. º¸¾È°ü¸®, À§Çè°ü¸® ¹× À§ÇèºÐ¼®ÀÇ °³³ä

¥². Æò°¡ ½ºÄÉÀÏÀÇ ºñ±³

3.1 ¼ÒÇÁÆ®¿þ¾î°øÇÐ ºÎ¹®
3.2 Á¤º¸º¸È£½Ã½ºÅÛ º¸¾È¼º Æò°¡ ºÎ¹®
3.3 À§Çè°ü¸® ºÎ¹®

3.4 Æò°¡½ºÄÉÀÏÀÇ ºÐ¼®

¥³. À§ÇèºÐ¼® ÇÁ·Î¼¼½º
4.1 ÇÁ·Î¼¼½º, ÇÁ·ÎÁ§Æ® ¹× ÇÁ·Î´öÆ®ÀÇ Á¤ÀÇ
4.2 ±âÁ¸ ÇÁ·Î¼¼½ºÀÇ ¹®Á¦Á¡

¥´. ÀÚ»êºÐ·ù ¹× Æò°¡¹æ¹ý

5.1 ÀÚ»êºÐ·ùü°è
5.2 ÀÚ»êÆò°¡ ¹æ¹ý

¥µ. À§ÇùÀÇ ºÐ·ù

6.1 À§ÇùÀÇ ºÐ·ù¹æ¹ý
6.2 À§Çù°ú Ãë¾à¼ºÀÇ ±¸ºÐ

¥¶. °á·Ð

Âü°í¹®Çå
º»¹®/³»¿ë
3.4 Æò°¡½ºÄÉÀÏÀÇ ºÐ¼®

Á¶»çÇÑ °¢Á¾ Ç¥ÁØ, Áöħ, µµ±¸ ¹× ¿¬±¸°á°úµéÀÇ ÃøÁ¤½ºÄÉÀϵéÀº ¡°´Ù¾ç¼º¡±À¸·Î Ç¥ÇöÇÑ´Ù.
▪´Ü°è ¸íĪÀÇ ´Ù¾ç¼º: ¼ýÀÚ¿Í ´Ü¾îµéÀ» »ç¿ëÇϰí ÀÖ´Ù. ÀÌ´Â ÀÀ¿ëºÐ¾ßÀÇ Æ¯¼ºÀ» ¹Ý¿µÇÏ·ÁÇÑ ½ÃµµÀÌÁö¸¸ ±Ã±ØÀûÀ¸·Î´Â ¼ýÀÚ³ª ¹®ÀÚ´Â µ¿ÀÏÇÑ Àǹ̸¦ °®´Â´Ù.
▪´Ü°è¼öÀÇ ´Ù¾ç¼º: À§ÇèºÐ¼®ºÎ¹®ÀÇ °æ¿ì °¢ ÃøÁ¤´ë»ó¼Ó¼ºµéÀº 3´Ü°è ¶Ç´Â 5´Ü°è°¡ ÁÖ·ù¸¦ ÀÌ·ç¸ç ÀϺΠÀÚ·á¿¡¼­´Â 10´Ü°è(¿¹: PRAM¿¡¼­ÀÇ Àڻ갡ġ)·Î Á¤ÀÇÇÑ °æ¿ìµµ ÀÖ´Ù. ´Ü°è¼ö°¡ ¸¹¾ÆÁú¼ö·Ï ÀÎÁ¢´Ü°è°£ÀÇ ºÐº°·ÂÀÌ Àû¾îÁö¸ç µî±ÞÈ­°¡ ¾î·Á¿öÁø´Ù. ƯÈ÷, Àڻ갡ġ, À§Çù¼öÁØ, Ãë¾à¼º¼öÁØÀ» µî±ÞÈ­ ÇÏ´Â ÀÏÀº ÁÖ°üÀûÀÎ(¶Ç´Â ¼­¼úÀûÀÎ) ±âÁØ¿¡ ÀÇÁ¸ÇؾßÇÑ´Ù. µû¶ó¼­, ´Ü°è ¼ö¸¦ ¼¼ºÐÈ­ÇÏ´Â °ÍÀº Æò°¡°á°ú¿¡ ´ëÇÑ ½Å·Ú¼ºÀ» ÀúÇϽÃų ¼ö ÀÖÀ¸¹Ç·Î, 3´Ü°è ¶Ç´Â 5´Ü°è°¡ ÀûÇÕÇÏ´Ù°í ÆÇ´ÜµÈ´Ù. ¹®Çå[26]¿¡¼­´Â ´Ü°è ¼ö¿¡ ´ëÇÑ ¹®Á¦¸¦ °íÂûÇÏ¿´´Ù.
▪µî±ÞÈ­±âÁØÀÇ ´Ù¾ç¼º: µî±ÞÈ­±âÁØÀº ¼­¼úÀû, ¼öÄ¡Àû ¶Ç´Â ´Ù¸¥ ¼Ó¼ºµéÀÇ Á¶ÇÕ(À§Çè ¼Ó¼ºÀÇ °æ¿ì)À¸·Î µÇ¾îÀÖ´Ù. ¼­¼úÀû ±âÁØÀÇ °æ¿ì, µî±ÞÈ­°¡ °£´ÜÇÏÁö¸¸ °á°úÀÇ °´°ü¼ºÀÌ ÀúÇϵȴÙ. ¼öÄ¡Àû ±âÁØÀÇ °æ¿ì À§ÇèÆò°¡´ë»ó ±â°üÀÇ Æ¯Â¡À»¡¦(»ý·«)
Âü°í¹®Çå
[1] ISO/IEC TR 13335, 1ºÎ, ¡°ITº¸¾È °³³ä ¹× ¸ðµ¨¡±(1996), 2ºÎ ¡°º¸¾È°ü¸® ¹× °èȹ¡±(1997).
[2] ISO/IEC TR 13335, 3ºÎ, ¡°IT º¸¾È°ü¸® Áöħ¡±(1998), 5ºÎ, ¡°³×Æ®¿öÅ© ¿¬°á°ü¸® Áöħ¡±(2000).
[3] British Standards Institution(BSI), ¡°BS-7799¡±, 1999.
[4] Bundesamt fur Sicherheit in der Informationstechnik), `IT Baseline Protect Manual`, - Standard security safeguards, http://www.bsi.bund.de/gshb/english/menue.htm
[5] SSE-CMM, ¡°Project, Systems Security Engineering Capability Maturity Model (SSE-CMM) - Model Description Document¡±, V.2, http://www.sse-cmm.org, 1999. 4. 1.
[6] Á¤º¸Åë½ÅºÎ, ¡°Àü»ê¸Á º¸¾ÈÀ» À§ÇÑ À§Çè°ü¸® Áöħ¼­¡±, KICO.KO-10.0047, 1995.12.
[7] À̰­¼ö, ¡°¼±Áø±¹ Á¤º¸º¸È£½Ã½ºÅÛÀÇ Æò°¡Á¦µµ¿¡ °üÇÑ ¿¬±¸¡±, KISA º¸°í¼­, 1998. 3.
[8] À̰­½Å, ±èÇйü, ÀÌÈ«¼·, ¡°±¹³»¿Ü Á¤º¸º¸È£ ¸ðµ¨¿¡ °üÇÑ ¿¬±¸¡±, Á¤º¸º¸È£ÇÐȸÁö, 11-3, 2001.6
[9] S. Vallabhaneni, ¡°Auditing Computer Security- A Manual with Case Studies¡±, 1989.
[10] ISO/IEC 14598-1, ¡°IT-Software product evaluation, Part 1. General overview¡±, 1997. 3.
[11] FIPS-65, ¡°Guidelines for Automatic Data Processing Risk Analysis¡±, NIST, 1975 (Aug. 1995¿¡ ÆóÁöµÊ).
[12] FIPS-191, ¡°Specifications for Guideline for The Analysis Local Area Network Security¡±, NIST, Nov. 1994.
[13] NIST, ¡°Risk Management Guide for Information Technology Systems¡±, NIST-SP-800-30, 2001.10.
[14] NISTIR-4387, ¡°Simplified Risk Analysis Guideline¡±, NIST, 1990.
[15] NISTIR-4325, ¡°Simplified Risk Analysis Guideline¡±, NIST, 1990.
[16] GAO, ¡°Information Security Risk Assessment - Practices of Leading Organizations¡±, - Case Study 1, GAO/AIMD-00-33, 1999. 11.
[17] GAO, ¡°Information Security Risk Assessment - Practices of Leading Organizations¡±, - Case Study 3, GAO/AIMD-00-33, 1999. 11.
[18] CSE, ¡°A Guide to Security Risk Management for IT Systems¡±, Government of Canada, Communications Security Establishment(CSE)¡±, 1996.
[19] TTAS, ¡°°ø°øÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀ» À§ÇÑ À§ÇèºÐ¼® Ç¥ÁØ - °³³ä°ú ¸ðµ¨¡±, TTAS.KO-12.007, 1998. 11.
[20] OCTAVE, ¡°OCATVE Criteria, Version 2.0¡±, Carnegie Mellon Software Engineering Institute(2001. 12), OCATVE Method Implementation Guide Version 2.0, OCTAVE, 2001. 6, http://www.sei.cmu.edu/ publications/ pubweb.html.
[21] CRAMM, ¡°A Practitioner`s View of CRAMM¡±, http://www.gammassl.co.uk/.
[22] ±è±âÀ±, ³ª°ü½Ä, ±èÁ¾¼®, ¡°º¸¾È°ü¸®¸¦ À§ÇÑ À§Çù, ÀÚ»ê, Ãë¾à¼ºÀÇ ºÐ·ù ü°è¡±, Á¤º¸º¸È£ÇÐȸÁö, 6±Ç 1È£, 1995. 6.
[23] Will Ozier, ¡°Risk Analysis and Assessment¡±, Information Security Management Handbook (4¡®th Ed.), CRC Press, 2000.
[24] C. Hamilton, ¡°Data-driven Security: How to Target, Focus and Justify the Security Program¡±, 28`th Annual Computer Security Conference & Exhibition, 2001.
[25] ¡°½Ã¸¸ÅØ»çÀÇ Expert 4.1 ¼Ò°³¡±, 1ȸ ¼­¿ïÁ¤º¸º¸¾È±â¼ú ±¹Á¦ÄÁÆÛ·±½º, 2000³â 11¿ù.
[26] ±èÁ¤´ö (¿Ü), ¡°À§Çè ºÐ¼® µµ±¸ ±âÃʱâ¼ú °³¹ß¿¡ °üÇÑ ¿¬±¸¡±, ETRI ¿¬±¸º¸°í¼­, 2001.
[27] ¼Û°üÈ£(¿Ü), ¡°Á¤º¸½Ã½ºÅÛ º¸¾ÈÀ» À§ÇÑ À§ÇèºÐ¼® ¼ÒÇÁÆ®¿þ¾î °³¹ß¡± Çѱ¹Àü»ê¿ø ¿¬±¸º¸°í¼­, 1997. 12.
[28] J. Freeman, et al., ¡°Risk Assessment for Large Heterogeneous Systems¡±, 13`rd Computer Application Conference, 1997.
[29] R. Craft, et al., ¡°An Open Framework for Risk Management¡±, 21`st National Information System Security Conference, 1998.
[30] ISO/IEC 14598-5, ¡°IT-Software product evaluation, Part 5. Process for evaluation¡±, 1997. 12.
[31] ISO/IEC 14598-6, ¡°IT-Software product evaluation, Part 6. Documentation for evaluation modules, 1997. 3.
[32] ISO/IEC-9126 ¡°IT-Software product evaluation -Quality characteristics and guidelines for their use, 1991. 12. 15.
[33] B. Boehm, ¡°Software Engineering Economics¡±, Prentice-Hall, 1981.
[34] 「¼ÒÇÁÆ®¿þ¾î»ç¾÷´ë°¡ÀÇ ±âÁØ(2001)」, Á¤º¸Åë½ÅºÎ, 2001.
[35] Barry Boehm, et al., ¡°COCOMO 2.0 Software Cost Estimation Model¡±, International Society of Parametric Analysts, May 1995, http://sunset.usc.edu/research/COCOMOII /index.html.
[36] CC, ¡°Common Criteria for Information Technology Security Evaluation¡±, Version 2.1, CCIMB-99-031, August 1999, http://www. commoncriteria.org/site_index.html.
[37] CEM, ¡°Common Evaluation Methodology¡±, Version 1.0, CEM-99/045, August 1999, http://www.commoncriteria.org/site_index.html
[38] European Community, ¡°Information Technology Security Evaluation Criteria (ITSEC)¡±, Ver. 1.2, June 1991. http://www.cesg. gov.uk/assurance/iacs/ itsec/index.htm
[39] European Community, ¡°Information Technology Security Evaluation Criteria (ITSEM)¡±, Ver. 1.0, 1993. http://www.cesg.gov. uk/assurance/iacs/ itsec/index.htm
[40] DoD, ¡°Department of Defense Trusted Computer System Evaluation Criteria (TCSEC)¡±, Dec. 1985.
[41] Canadian System Security Centre, ¡°The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC)¡±, Ver.3e, Jan. 1993.
[42] ¡°Á¤º¸Åë½Å¸Á ħÀÔÂ÷´Ü½Ã½ºÅÛ Æò°¡±âÁØ¡¤Æò°¡Áöħ¼­¡±, Á¤º¸Åë½ÅºÎ°í½Ã 1998-19È£, Á¤º¸Åë½ÅºÎ, 1998.
[43] M. Swanson, ¡°Security Self-Assessment Guide for Information Technology Systems¡±, NIST- SP-800-26, NIST, ITº¸¾ÈÆò°¡, 2001.11.
[44] G. Stonebumer, et al., ¡°Risk Management Guide for Information Technology System¡±, NIST- SP-800-30, NIST, 2002.1.
[45] CIAO/VAF, ¡°Vulnerability Assessment Framework 1.1¡±, Critical Infrastructure Assurance Office(CIAO), 1999.10.
[46] D. Peeples, ¡°The Foundations of Risk Management¡±, 20`th National Information Security Conference, 1997.5.
[47] M. Timms, ¡°A Practical Approach to Risk Assessment¡±, Compsec Computer Security Conference`90, 1990. 10.
[48] Z. Ruthber et al., ¡°Guide to Auditing for Controls and Security: A System Development Lifecycle Approach¡±, NBS Special Publication 500-153, 1998.4.
[49] A. Finkelstein et al. (ed.), ¡°Software Process Modeling and Technology¡±, John Wiley&Sons, 1994.
[50] A. Furretta, A. Wolf, (ed.), ¡°Software Process¡±, John Wiley&Sons, 1996.
[51] W. Royce, ¡°Software Project Management - Unified Framework¡±, Addison Wesley, 1998.
[52] À̺´¸¸, À±Á¤¿ø, ¹Ú½Â±Ô, ¡°Á¤º¸½Ã½ºÅÛ À§ÇèºÐ¼® ¸ðµ¨¿¡ °üÇÑ ¿¬±¸`, WISC-97, 1997.
[53] CVE, ¡°Common Vulnerability and Exposure¡±, NIST, http://www.cve.mitre.org/cve/.




📝 Regist Info
I D : gtdw*****
Date : 2011-08-31
FileNo : 16136101

Cart