º»¹®/³»¿ë
º» ¿¬±¸ÀÇ ¼³¹®Àº 2000³â 8¿ù 7ÀϺÎÅÍ 8¿ù 12ÀϱîÁö 1ÁÖÀϰ£ÀÇ ¿¹ºñÁ¶»ç¸¦ ¸ÕÀú ½Ç½ÃÇÏ¿´´Ù. ÀÌ ¿¹ºñÁ¶»ç¿¡¼ ³ªÅ¸³ ¹®Á¦Á¡À» Áöµµ ±³¼ö´ÔÀÇ Á¶¾ðÀ» ¹Þ¾Æ ¹®Ç×°ú Ç׸ñ ¹× ¿µ¿ªÀÇ ÀûÇÕ¼º°ú Ÿ´ç¼ºÀ» °ËÅäÇÑ ÈÄ º¸¿ÏÇÏ¿© 2000³â 8¿ù 28ÀϺÎÅÍ 9¿ù 9ÀϱîÁö º» Á¶»ç¸¦ ½Ç½ÃÇÏ¿´´Ù. ¼³¹®Àº ¼¿ï ½Ã³» ´ëÇеé Áß ¹«ÀÛÀ§ ¹æ¹ý¿¡ ÀÇÇØ ¼±Á¤µÈ ´ëÇÐÀ» Á÷Á¢ ¹æ¹®ÇÏ¿© Á¶»çÇÏ´Â ¹æ½ÄÀ» ÃëÇÏ¿´´Ù. ¶ÇÇÑ ÀÌ·¯ÇÑ ¼³¹®Áö Á¶»ç¿Í´Â º°µµ·Î Á¤º¸º¸È£ Àü¹®°¡¸¦ ´ë»óÀ¸·Î ÀÎÅͺä Á¶»ç¸¦ º´ÇàÇÏ¿´´Ù. ÀÎÅͺä Á¶»ç´Â ¼³¹®Á¶»ç¸¦ º¸¿ÏÇÏ°í ±× °á°ú¸¦ µÞ¹ÞħÇÏ·Á´Â ¸ñÀûÀ» Áö´Ñ °ÍÀÌ´Ù. ´ëÇлýµéÀÇ °æ¿ì ¾ÆÁ÷±îÁö Á¤º¸º¸È£ ±³À°À» ¹Þ¾Æº» °æÇèµéÀÌ Àü¹«ÇÏ¿´±â ¶§¹®¿¡ ¼³¹®Á¶»ç¿¡¸¸ ÀÇÁ¸ÇÏ´Ù º¸¸é Á¶»çÀÇ °á°ú°¡ ¿Ö°îµÉ ¼ö ÀÖ¾ú±â ¶§¹®ÀÌ´Ù.
Á¶»ç´ë»óÀÚµéÀº ¼¿ï½Ã³» ´ëÇлýµé°ú ´ëÇпø»ýµéÀÌ´Ù. ´ëÇпø»ýµé¿¡°Ô´Â ¸¹Àº ¼³¹®Á¶»ç¸¦ ÇϱⰡ Çö½ÇÀûÀ¸·Î ¾î·Á¿ö ÁÖ ¼³¹®´ë»óÀº ´ëÇлýµéÀÌ µÇ¾ú´Ù. ÃÑ ¼³¹®´ë»óÀÚ 226¸í Áß 212¸íÀÌ ´ëÇлýÀ̰í 14¸íÀÌ ´ëÇпø»ýÀÌ´Ù.
Âü°í¹®Çå
Âü°í ¹®Çå
[1] ±è¿µ¹®, »çÀ̹öÅ×·¯´ëÀÀ ±â¼ú°³¹ß»ç¾÷ ÃßÁø°èȹ, ¡¸Á¦5ȸ Á¤º¸º¸È£ ½ÉÆ÷Áö¿ò¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 2000.
[2] ±èÀ缺, ³»¿Ü ÄÄÇ»ÅÍ ¹ÙÀÌ·¯½º ÇöȲ°ú ´ëÃ¥, Á¤º¸º¸È£ ´º½º, 1999. 8(Åë±Ç23È£).
[3] ±èö, Á¤º¸º¸È£ Àü¹®Àη ¾ç¼º ¹æ¾È, Á¤º¸º¸È£´º½º, 1999. 10(Åë±Ç25È£).
[4] , Á¤º¸º¸È£ Àü¹®Àη ¾ç¼º ¹æ¾È, ¡¸Á¤º¸º¸È£ ½ÉÆ÷Áö¿ò¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 2000.
[5] ±èÈ«¼±, ±¹³» Á¤º¸º¸È£ »ê¾÷ÇöȲ, Á¤º¸º¸È£ ´º½º, 1999. 10(Åë±Ç25È£).
[6] ¹Ú¼ºÁØ, ¾ÏÈ£»ç¿ëÁ¦µµ ÃßÁø ¹æÇâ, ¡¸Á¦4ȸ Á¤º¸º¸È£ ½ÉÆ÷Áö¿ò(SIS `99)¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1999. 4.
[7] ½Å¿µ¿ì, ±èÁ¾¼±, Á¤º¸º¸È£»ê¾÷ ±¹Á¦°æÀï·Â °È¹æ¾È¿¡ ´ëÇÑ ¿¬±¸, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1999. 11.
[8] ¾È¼ºÀÏ, Á¤º¸Åë½Å±â¹Ýº¸È£¸¦ À§ÇÑ ¹ý¡¤Á¦µµ Á¤ºñ ¹æ¾È, ¡¸Á¦5ȸ Á¤º¸º¸È£ ½ÉÆ÷Áö¿ò¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 2000.
[9] ÀÌ»óÈÆ, Á¤º¸º¸È£ »ê¾÷À°¼º ¹æ¾È, Á¤º¸º¸È£´º½º, 1999. 10(Åë±Ç25È£).
[10] ÀÌÁø¼ö, »çÀ̹ö Å×·¯ ½ÇÅ ¹× Á¾ÇÕ´ëÃ¥, ¡¸Á¦5ȸ Á¤º¸º¸È£ ½ÉÆ÷Áö¿ò¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 2000.
[11] ÀÎÅÍ³Ý ÇѰܷ¹(http://www.hani.co.kr/section)
[12] ÀÓäȣ, ¡®98 Á¤º¸º¸È£ Åë°èÁý, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1998. 12.
[13] , ¡®99 Á¤º¸½Ã½ºÅÛ ÇØÅ·¡¤¹ÙÀÌ·¯½º ÇöȲ ¹× ´ëÀÀ, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1999. 12.
[14] Á¤º¸Åë½ÅºÎ, Á¤º¸È¿ª±â´É ¹æÁö´ëÃ¥ ¹× Á¤º¸º¸È£±â´É °È¹æ¾È, Á¤º¸Åë½ÅºÎ, 1999.
[15] , º¸µµÀÚ·á. 1999. 5. 21.
[16] ,¡¸Á¤º¸È¿ª±â´É ¹æÁö´ëÃ¥ ¹× Á¤º¸º¸È£±â´É °È¹æ¾È¡¹, Á¤º¸Åë½ÅºÎ, 1999. 7.
[17] ,¡¸Á¤º¸È¿ª±â´É ¹æÁö´ëÃ¥ °øÃ»È¸ ÀÚ·áÁý¡¹, Á¤º¸Åë½ÅºÎ, 1999. 8.
[18] , Á¤º¸È±âȹ½Ç ÀÚ·á. 2000. 4.
[19] , Á¤º¸È±âȹ½Ç,¡¸Á¤º¸º¸È£ Àη¾缺°èȹ¡¹, Á¤º¸Åë½ÅºÎ Á¤º¸È±âȹ½Ç, 2000.
[20] Á¶¼º±Ô, Åë½Å¸ÁÀ» ÅëÇÑ ºÒ°ÇÀüÁ¤ºÎ À¯Åë ½ÇÅÂ¿Í ´ëÀÀ¹æ¾È, Á¤º¸º¸È£ ´º½º, 1999. 8 (Åë±Ç23È£).
[21] ÃÖ¿îÈ£, ¹Ì±¹ÀÇ Á¤º¸º¸È£ Àü¹®Àη ¾ç¼º ÇÁ·Î±×·¥, 1999. 10(Åë±Ç25È£).
[22] Çѱ¹Àü»ê¿ø ,¡¸±¹°¡Á¤º¸È¹é¼¡¹, Çѱ¹Àü»ê¿ø, 1998.
[23] Çѱ¹Á¤º¸º¸È£¼¾ÅÍ,¡¸Á¤º¸È ¿ª±â´É ÇöȲ ºÐ¼® ¹× ´ëÀÀ¹æ¾È ¿¬±¸¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1998.
[24] ,¡¸1999³âµµ Á¤º¸º¸È£ ±â¼ú ±³À°°úÁ¤¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1999.
[25] Çѱ¹Á¤º¸º¸È£¼¾ÅÍ,¡¸Á¤º¸º¸È£ Àη ¼ö±Þ ¹× Ȱ¿ë¹æ¾È ¿¬±¸¡¹, Çѱ¹Á¤º¸º¸È£¼¾ÅÍ, 1999.
[26] Çѱ¹Á¤º¸Åë½ÅÁøÈïÇùȸ,¡¸1997 Á¤º¸Åë½Å»ê¾÷ ±â¼úÀη ¼ö±Þ½ÇÅÂÁ¶»ç¡¹, Çѱ¹Á¤º¸Åë½ÅÁøÈïÇùȸ, 1997. 7
[27] Ç㸸Çü, Á¤º¸È ¿ª±â´É°ú Á¤ºÎÀÇ ¿ªÇÒ, ¡¸Á¤º¸È¿ª±â´É ¹æÁö´ëÃ¥ °øÃ»È¸ ÀÚ·áÁý¡¹, Á¤º¸Åë½ÅºÎ, 1999. 8.
[28] Goodlatte, Bob (1999) ¡°The Internet Freedom Act of 1999 (H.R.1686): General Summary,¡± .
[29] FIRST. ¡°The Forum of Incident Response and Security Teams: A Description,¡±
.
[30] Harris, Blake. ¡°The Geopolitics of Cyberspace,¡±
[31] Mathieson, Rick. (1997). `Info War: The Battle Against Cyber-Terror,` E Business, December 1997. .
[32] PCCIP(President`s Commission on Critical Infrastructure Protection). 1997. The PCCIP Report. President`s Commission on Critical Infrastructure Protection.
[33] Ripley, Randall & Frankline Ripley (1980). Congress, the Bureaucracy and Pulbic Policy, 2nd ed., Homewood, Illnois: The Dorsey Press,
[34] Shapiro, Andrew L. (1999). The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know By, New York: A Century Foundation Book.
[35] U.S. Department of Commerce (1998). The Emerging Digital Economy Report. 1998. 4.
[36] http://www..kisa.or.kr
[37] http://www.hani.co.kr/section
[38] http://www.infosec.jum.edu/ncisse/conference99/website/
[39] http://www.infosec.jum.edu/programinfo/
[40] http://www.isse.gum.edu/¢¦csis/index.html
[41] http://security.isu.edu/security.html
[42] http://www.issl.org/
[43] http://seclab.cs.ucdavis.edu/Security.html
[44] http://www.cs.uidaho.edu/
[45] http://www.cerias.purdue.edu/