º»¹®/³»¿ë
Çö½ÇÀûÀ¸·Î ¹æ´ëÇÑ ÀÚ·áµéÀÌ ÄÄÇ»ÅÍ¿¡ ¼ö·Ï¡¤ÀúÀåµÊÀ¸·Î½á ±× ÀڷḦ ÀÌ¿ëÇÏ´Â ´ç»çÀÚ¿¡°Ô´Â ´ë´ÜÈ÷ Áß¿äÇÑ ÀÚ»êÀ» Çü¼ºÇϰí ÀÖ´Ù. ±×°ÍÀÌ ºÒ¹ýÀ¯ÃâµÇ¾î ¼ö·ÏµÈ ºñ¹ÐÀÚ·á°¡ ´©¼³µÈ´Ù´Â °ÍÀº ÀÌÇØ°ü°èÀÇ ´ç»çÀÚÀÎ ±¹°¡¡¤±â¾÷ü ¶Ç´Â °³Àο¡°Ô´Â Áß´ëÇÑ ¼Õ½ÇÀÌ µÈ´Ù. Áß¿äÇÑ ±º»çµ¥ÀÌŸ¡¤Á¤Ä¡Àû¡¤ÇàÁ¤Àû¡¤°úÇбâ¼úÀû¡¤»ê¾÷ÀûÀÎ °¢Á¾ÀÇ µ¥ÀÌŸ µîÀÇ ´©¼³Àº ¸·´ëÇÑ ¼Õ½ÇÀ» ³¢Ä¥ À§Ç輺À» ¶ì°í ÀÖ´Ù. Çö´ë»ê¾÷»çȸ¿¡¼ ¿¹ÄÁ´ë ±â¾÷°æ¿µ¿¡ °üÇÑ Áß¿äÇÑ ºñ¹ÐÀÌ ÀÏÁ¤ÇÑ ¹®¼ µîÀÇ Çü½ÄÀ¸·Î ºÐ¸® º¸°üµÇ°í ÀÖ´Â °æ¿ìÀÇ »ê¾÷½ºÆÄÀÌÇàÀ§¿Í ´Þ¶ó¼ ¸ðµç ÀÚ·á°¡ ÄÄÇ»Åͼ¾ÅÍ¿¡ ÁýÁß°ü¸®µÇ°í ¶Ç ¸¹Àº ÀÚ·á°¡ ¿ëÀûÀÌ ÀûÀº ÀÚ±â Å×ÀÌÇÁ µî¿¡ ¾ÐÃàµÈ ÇüÅ·ΠÀúÀåµÇ°í ÀÖ´Â °æ¿ì¿¡ ±× ÄÄÇ»ÅÍÀÚ·áÀÇ ½ºÆÄÀÌ ÇàÀ§´Â Áö´ÉÀûÀ¸·Î ÈûµéÀÌÁö ¾Ê°í ¶ÇÇÑ ´«¿¡ ¶çÁö ¾Ê°Ô ºñ¹ÐÀ» Ž»ö¡¤ÀÔ¼öÇÏ°Ô µÈ´Ù´Â Á¡¿¡¼ ±× ¹®Á¦ÀÇ ½É°¢¼º°ú ±ÔÁ¦ÀÇ Çʿ伺ÀÌ Àý°¨µÈ´Ù.
ÇöÇàÇü¹ýÀº °³ÀÎÀÇ ºñ¹ÐÀÇ º¸È£¿¡ ´ëÇÏ¿© °Ü¿ì µÎ°³ÀÇ Á¶¹®¸¸À» ±ÔÁ¤Çϰí ÀÕ´Ù. ºñ¹ÐÄ§ÇØÁË¿Í Æ¯Á¤ Á÷¹« ÁýÇàÀÚÀÇ ¾÷¹«»ó ºñ¹Ð´©¼³Á˰¡ ±×°ÍÀÌ´Ù. ±â¾÷ºñ¹Ð¿¡ °üÇØ¼´Â ³»ºÎ¿¡¼ ´©¼³ÇÏ·Á´Â ÀÚ³ª ¿ÜºÎ¿¡¼ ŽÁöÇÏ·Á´Â ÀÚ¿¡ ´ëÇØ¼ ¹«¹æºñ »ó¡¦(»ý·«)
Âü°í¹®Çå
1. 1. 1. ±èÁ¾¿ø ¿Ü, ÄÄÇ»ÅÍ ¹üÁË¿Í ÀÌ¿¡ ´ëÇÑ ÇöÇà Çü¹ýÀÇ ´ëÀÀ¿¡ °üÇÑ ¿¬±¸, Çѱ¹Çü»ç¹ýÇÐȸ, 1987.
2. ÀÌÀç¿ì, Àü»ê¸ÁÀÇ ÃÑüÀû ¾ÈÀüº¸¾È´ëÃ¥, Àü»êº¸¾È ¾î¶»°Ô ÇØ¾ßÇϳª, Çѱ¹Àü»ê¿ø, 1995.
3. Á¶±Õ¼®, Àڱݼ¼Á¤·Ð, °æ·ûÃâÆÇ»ç, 1993.
4. ÃÖ¿µÈ£, ÄÄÇ»ÅÍ¿Í ¹üÁËÇö»ó, ÄÄÇ»ÅÍÃâÆÇ, 1995
5. ÓÞߣúÊÞÉ, ÄÄÇ»ÅÍ ¹üÁ˸¦ µÑ·¯½Ñ Çü¹ý»óÀÇ ¹®Á¦, °æÂû°ø·Ð Á¦37±Ç, 1982. 11.
6. August Bequai, Computer Crime, Lexington Books, 1978.
7. August Bequai, How to Prvent Computer Crime, John Wiley and Sons, 1983.
8. Charles P. Pfleeger, Security in Computing, Prentice Hall, 1989.
9. Donn B. Parker, Fighting Computer Crime, Charles Scribners` Sons, 1983.
10. Frederick B. Cohen, A Short Course on the Computer Viruses, John Wiley & Sons. Inc, 2nd Edition, 1994.
11. James A. Schweitzer, Computer Crime and Business Information, Elsevier Science Pub. Co. 1986.
12. Jay BloomBecker, White-Collar Criminals Can Be Dumbbells, L.A. Times Editorial Section, 1978.