|
|
|
|
|
|
|
¸ñÂ÷ |
|
Part 01 Á¤º¸º¸È£ ÀϹÝ
SECTION 01 Á¤º¸º¸È£ °ü¸®
1. º¸¾È ±â¼ú
2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢)
3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò
4. º¸¾È ¿ë¾î ¼³¸í
5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù
SECTION 2 Á¤º¸º¸È£ ´ëÃ¥
1. °³¿ä
2. ±â¼úÀû º¸¾È
3. °ü¸®Àû º¸¾È
4. ¹°¸®Àû º¸¾È
[PART 01 ±âÃâÈ®Àι®Á¦]
Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography)
SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ
1. ¾ÏÈ£ÀÇ °³¿ä
SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù
1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ)
2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£
SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý
1. º¸¾È°ø°Ý
2. °ø°Ý ¹æ½Ä
3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡
SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ ÀÇÀÇ
2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography)
3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ
4. ´ëĪŰ¿Í °ø°³Å° ºñ±³
5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³
6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ)
7. ÇؽÃÇÔ¼ö
SECTION 05 ÀüÀÚ¼¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
1. ÀüÀÚ¼¸í(µðÁöÅÐ ¼¸í: Digital Signature)
2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶)
3. Å°, ³¼ö
SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È
1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä
2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ×
3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü
4. ÆǸÅÀÚ ¿ä±¸»çÇ×
5. ±¸¸ÅÀÚ ¿ä±¸»çÇ×
6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction)
7. ÀüÀÚÈÆó(Electronic Cash) º¸¾È
8. °¡»óÈÆó, ºñÆ®ÄÚÀÎ
9. ºí·ÏüÀÎ(Block Chain)
SECTION 07 ±âŸ ¿ë¾î ¼³¸í
[PART 02 ±âÃâÈ®Àι®Á¦]
Part 03 Á¢±ÙÅëÁ¦
SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä
1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control)
2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢
SECTION 02 ÀÎÁõ
1. °³³ä
2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ
3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication)
4. ÅëÇÕÀÎÁõü°è
SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨
SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù
1. Æнº¿öµå Å©·¡Ä¿(Password Cracker)
[PART 03 ±âÃâÈ®Àι®Á¦]
PART 04 ³×Æ®¿öÅ© º¸¾È
SECTION 01 ³×Æ®¿öÅ© °³¿ä
1. ³×Æ®¿öÅ© °³¿ä
2. OSI 7 Layer¿Í TCP/IP
3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶
SECTION 02 ÀÎÅͳÝ
1. ÀÎÅͳÝ
2. ARP¿Í RARP
3. TCP 3-way Hand Shake
4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç
5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access)
6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing
7. DHCP¿Í NAT
SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
1. ¶ó¿ìÅÍ
2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ
3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È
4. Giga ÀÎÅͳÝ
SECTION 04 ¹«¼±Åë½Å º¸¾È
1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È
2. ¹«¼± ·£ÀÇ À§Ç輺
3. ¹«¼±°ø°ÝÀÇ À¯Çü
4. µð¹ÙÀ̽º ÀÎÁõ
5. Mobile IP
6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology)
7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯
SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
1. ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ
3. ij½ºÆà ¸ðµå(Casting Mode)
4. IGMP(Internet Group Management Protocol)
SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý
1. ¼ºñ½º °ÅºÎ °ø°Ý °³¿ä
2. DoS, DDoS, DRDoS
3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù
4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý
5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat)
6. »çȸ°øÇÐÀû ¹æ¹ý
7. Ransomware(·£¼¶¿þ¾î)
SECTION 07 ÇØÅ·°ú ´ëÃ¥
1. ³×Æ®¿öÅ© ȯ°æ
2. Sniffing(½º´ÏÇÎ)
3. Spoofing(½ºÇªÇÎ)
4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking)
5. Phishing(ÇǽÌ)
6. ÁøÈÇÏ´Â ´Ù¾çÇÑ ÇǽÌ
7. Pharming(ÆĹÖ)
8. Smishing(½º¹Ì½Ì)
9. ¸Þ¸ð¸® ÇØÅ·
10. ¸Á ºÐ¸®
11. ±âŸ º¸¾È ħÇØ °ü·Ã ¿ë¾î
[PART 04 ±âÃâÈ®Àι®Á¦]
PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
SECTION 01 À̸ÞÀÏ º¸¾È
1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ
2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø)
3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥
SECTION 02 FTP º¸¾È
1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ)
SECTION 03 À¥ º¸¾È(Web Security)
1. Web
2. HTTP ÇÁ·ÎÅäÄÝ
3. SSL(Secure Socket Layer)
4. IPSec(IP Secure)
5. VPN(Virtual Private Network)
6. VLAN(Virtual LAN)
7. DNS(Domain Name System) º¸¾È
8. Wep App °£ Åë½Å±â¼ú
SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È
1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä
2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦
SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È
1. µðÁöÅÐ ÄÜÅÙÃ÷
2. ¿öÅ͸¶Å©(WaterMark)
3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte)
4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°Æà ºñ±³
5. DRM
6. MPEG21
7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography)
SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø
1. OWASP(The Open Web Application Security Project)
[PART 05 ±âÃâÈ®Àι®Á¦]
PART 06 ½Ã½ºÅÛ º¸¾È
SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä
1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä
2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures)
3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧
4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä
SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú
1. ÇÁ·Î¼¼½º °ü¸®
2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸®
3. ½Ã½ºÅÛ È£Ãâ(System Call)
4. ÀåÄ¡°ü¸®
SECTION 03 º¸¾È ¿î¿µÃ¼Á¦
1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä
2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É
3. º¸¾È ¿î¿µÃ¼Á¦
4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module)
5. HSM(Hardware Security Module)
SECTION 04 Ŭ¶óÀ̾ðÆ® º¸¾È
1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå)
2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý
3. ÀÎÅÍ³Ý È°¿ë º¸¾È
4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
5. ±âŸ
SECTION 05 À©µµ¿ì ¼¹ö º¸¾È
1. À©µµ¿ì °³¿ä
2. À©µµ¿ì º¸¾È
3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î
4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù
5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º
6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼®
7. Windows ±¸Á¶
SECTION 06 UNIX ¼¹ö º¸¾È
1. À¯´Ð½º °³¿ä
2. UNIX ±âº» »ç¿ë¹ý
3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ
4. UNIX ¼¹ö º¸¾È
5. UNIX ÆÄÀÏ ½Ã½ºÅÛ
SECTION 07 ¸®´ª½º(Linux) ¼¹ö º¸¾È
SECTION 08 ¼¹ö º¸¾È °ü¸®
1. ¼¹ö°ü¸®ÀÚÀÇ ¾÷¹«
SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥
1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý
2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý
3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý
4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack)
5. ±âŸ ¿ë¾î
6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS)
SECTION 10 Ãë¾àÁ¡ Á¡°Ë
1. Ãë¾àÁ¡ °³¿ä
2. ħÀÔ»ç½Ç È®ÀÎ
[PART 06 ±âÃâÈ®Àι®Á¦]
PART 07 Á¤º¸º¸¾È °ü¸®
SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷
1. Á¤º¸º¸È£ Á¤Ã¥
2. IT º¸¾È °ü¸®
3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit)
SECTION 02 À§Çè°ü¸®(Risk Management)
1. À§Çè°ü¸®(Risk Management)
2. À§ÇèºÐ¼®
3. À§ÇèÆò°¡
4. À§Çè´ëÃ¥
5. ÀçÇغ¹±¸°èȹ°ú RTO(Recovery Time Objective)
SECTION 03 BCP(Business Continuity Planning)
1. BCP(Business Continuity Planning)
2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment)
SECTION 04 ħÇØ»ç°í ´ëÀÀ
1. ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä
2. ħÇØ»ç°í ´ëÀÀ
SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è
1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ
2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ
3. PIMS(Personal Information Management System)
4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³
5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ
6. PDCA(Plan Do Check Action)
SECTION 06 ¿ë¾î Á¤ÀÇ
[PART 07 ±âÃâÈ®Àι®Á¦]
PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô
SECTION 01 ¹ý·üÀÇ ÀÌÇØ
1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§
2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡
3. OECD °¡À̵å¶óÀÎ
SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý)
2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý
3. ÀüÀÚ¼¸í¹ý
4. °³ÀÎÁ¤º¸ º¸È£¹ý
5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É
6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ
7. ÀüÀÚÁ¤ºÎ¹ý
8. ±¹°¡Á¤º¸È ±âº»¹ý
9. ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý)
[PART 08 ±âÃâÈ®Àι®Á¦]
PART 09 ±âÃâ¹®Á¦
2018³â 2ȸ Á¤º¸º¸¾È±â»ç
2019³â 2ȸ Á¤º¸º¸¾È±â»ç |
|
|
|
ÀúÀÚ
|
|
ÀÓÀç¼±
- Á¤º¸Åë½Å±â¼ú»ç(105ȸ) - CISSP(±¹Á¦°øÀÎÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀü¹®°¡) - MCP(Microsoft certified professional) - MCDBA(Microsoft Certified Database Administrator) - MCSE(Microsoft Certified System Engineer) - ÀúÀÚ ¿î¿µ Ä«Æä: http://cafe.naver.com/securitydata.cafe
|
ÃÖÀûÇÕ Á¤º¸º¸È£·Ð ±âÃâ¹®Á¦Áý(2020) | ÀÓÀç¼± | ¼º¾È´ç
|
|
±èÇüÁÖ
ÀúÀÚ´Â 20³â °¡±îÀÌ ÇÁ·Î±×·¥ °³¹ß ¹× º¸¾È¾÷¹«¸¦ ¼öÇàÇÏ¿´À¸¸ç, ºÎõ´ë, Àç´É´ë, ÀÎÇÏ°ø¾÷Àü¹®´ë, ¼ÀÏ´ë, ¼ö¿ø´ë, ¼±¹®´ë, Çѱ¹ Æú¸®ÅØ 2´ëÇÐ ³²ÀÎõķÆÛ½º Ãâ°°ú ±â´É´ëȸ °ü·Ã ½É»çÀ§¿ø, ½É»çÀå, ºÐ°úÀåÀ¸·Î È°µ¿ÇÏ°í ÀÖÀ¸¸ç, ÀÏ ÇнÀ º´ÇàÁ¦, °úÁ¤Æò°¡Çü ½ÃÇè ÃâÁ¦, °¨µ¶, äÁ¡À§¿øÀ¸·Î È°µ¿ÇÏ°í ÀÖ½À´Ï´Ù.
¢ß¾ÆÀÌ¿£¿¡½ºÄÄÆÛ´Ï ´ëÇ¥ÀÌ»ç Çѱ¹»ê¾÷Àη°ø´Ü IT ºÐ¾ß Àü¹®À§¿ø È°µ¿(½ÃÇè ÃâÁ¦, °¨µ¶ µî) ÀÎõÁö¿ª ÀÎÀûÀÚ¿ø°³¹ßÀ§¿øȸ À§¿ø ¹× 4Â÷ »ê¾÷ºÐ°ú À§¿øÀå ±¹¸³ ÀÎõ´ëÇб³ ÀϹݴëÇпø ÄÄÇ»ÅÍ°øÇÐ ¹Ú»ç ÀçÇÐ 2009³â ¼¿ïµðÀÚÀμ¾ÅÍ À¥µðÀÚÀÎ ºÐ¾ß ÃÖ¿ì¼ö»ó ¼ö»ó 2013³â ´ëÇѹα¹¹ß¸í°¡ ´ë»ó ¼ÒÇÁÆ®¿þ¾î ºÐ¾ß ´ë»ó ¼ö»ó 2012³â ¼®Å¾»ê¾÷ÈÆÀå ¼öÈÆ 2013³â º§±â¿¡ ½´¹ß¸®¿¡ ÈÆÀå
|
|
|
|
|
|
|
|
Ãâ°í¾È³» |
|
|
Ãâ°í¶õ ÀÎÅÍÆÄÅ© ¹°·ùâ°í¿¡¼ µµ¼°¡ Æ÷ÀåµÇ¾î ³ª°¡´Â ½ÃÁ¡À» ¸»Çϸç, ½ÇÁ¦ °í°´´Ô²²¼ ¼ö·ÉÇϽô ½Ã°£Àº »óÇ°Áغñ¿Ï·áÇØ Ãâ°íÇÑ ³¯Â¥ + Åùè»ç ¹è¼ÛÀÏÀÔ´Ï´Ù. |
|
ÀÎÅÍÆÄÅ© µµ¼´Â ¸ðµç »óÇ°ÀÇ Àç°í°¡ ÃæÁ·ÇÒ ½Ã¿¡ ÀÏ°ý Ãâ°í¸¦ ÇÕ´Ï´Ù. |
|
ÀϺΠÀç°í¿¡ ´ëÇÑ Ãâ°í°¡ ÇÊ¿äÇÒ ½Ã¿¡´Â ´ã´çÀÚ¿¡°Ô Á÷Á¢ ¿¬¶ôÇϽðųª, °í°´¼¾ÅÍ(°í°´¼¾ÅÍ(1577-2555)·Î ¿¬¶ôÁֽñ⠹ٶø´Ï´Ù. |
|
¹è¼Ûºñ ¾È³» |
|
|
ÀÎÅÍÆÄÅ© µµ¼ ´ë·®±¸¸Å´Â ¹è¼Û·á°¡ ¹«·áÀÔ´Ï´Ù. |
|
´Ü, 1°³ÀÇ »óÇ°À» ´Ù¼öÀÇ ¹è¼ÛÁö·Î ÀÏ°ý ¹ß¼Û½Ã¿¡´Â 1°³ÀÇ ¹è¼ÛÁö´ç 2,000¿øÀÇ ¹è¼Ûºñ°¡ ºÎ°úµË´Ï´Ù. |
¾Ë¾ÆµÎ¼¼¿ä! |
|
|
°í°´´Ô²²¼ ÁÖ¹®ÇϽŠµµ¼¶óµµ µµ¸Å»ó ¹× ÃâÆÇ»ç »çÁ¤¿¡ µû¶ó Ç°Àý/ÀýÆÇ µîÀÇ »çÀ¯·Î Ãë¼ÒµÉ ¼ö ÀÖ½À´Ï´Ù. |
|
Åùè»ç ¹è¼ÛÀÏÀÎ ¼¿ï ¹× ¼öµµ±ÇÀº 1~2ÀÏ, Áö¹æÀº 2~3ÀÏ, µµ¼, »ê°£, ±ººÎ´ë´Â 3ÀÏ ÀÌ»óÀÇ ½Ã°£ÀÌ ¼Ò¿äµË´Ï´Ù.
(´Ü, Åä/ÀÏ¿äÀÏ Á¦¿Ü) |
|
|
|
|
ÀÎÅÍÆÄÅ©µµ¼´Â °í°´´ÔÀÇ ´Ü¼ø º¯½É¿¡ ÀÇÇÑ ±³È¯°ú ¹ÝÇ°¿¡ µå´Â ºñ¿ëÀº °í°´´ÔÀÌ ÁöºÒÄÉ µË´Ï´Ù.
´Ü, »óÇ°À̳ª ¼ºñ½º ÀÚüÀÇ ÇÏÀÚ·Î ÀÎÇÑ ±³È¯ ¹× ¹ÝÇ°Àº ¹«·á·Î ¹ÝÇ° µË´Ï´Ù.
±³È¯/¹ÝÇ°/º¸ÁõÁ¶°Ç ¹× Ç°Áúº¸Áõ ±âÁØÀº ¼ÒºñÀڱ⺻¹ý¿¡ µû¸¥ ¼ÒºñÀÚ ºÐÀï ÇØ°á ±âÁØ¿¡ µû¶ó ÇÇÇظ¦ º¸»ó ¹ÞÀ» ¼ö ÀÖ½À´Ï´Ù.
Á¤È®ÇÑ È¯ºÒ ¹æ¹ý ¹× ȯºÒÀÌ Áö¿¬µÉ °æ¿ì 1:1¹®ÀÇ °Ô½ÃÆÇ ¶Ç´Â °í°´¼¾ÅÍ(1577-2555)·Î ¿¬¶ô Áֽñ⠹ٶø´Ï´Ù.
¼ÒºñÀÚ ÇÇÇغ¸»óÀÇ ºÐÀïó¸® µî¿¡ °üÇÑ »çÇ×Àº ¼ÒºñÀÚºÐÀïÇØ°á±âÁØ(°øÁ¤°Å·¡À§¿øȸ °í½Ã)¿¡ µû¶ó ºñÇØ º¸»ó ¹ÞÀ» ¼ö ÀÖ½À´Ï´Ù.
|
±³È¯ ¹× ¹ÝÇ°ÀÌ °¡´ÉÇÑ °æ¿ì |
|
|
»óÇ°À» °ø±Þ ¹ÞÀ¸½Å ³¯·ÎºÎÅÍ 7ÀÏÀ̳» °¡´ÉÇÕ´Ï´Ù. |
|
°ø±Þ¹ÞÀ¸½Å »óÇ°ÀÇ ³»¿ëÀÌ Ç¥½Ã, ±¤°í ³»¿ë°ú ´Ù¸£°Å³ª ´Ù¸£°Ô ÀÌÇàµÈ °æ¿ì¿¡´Â °ø±Þ¹ÞÀº ³¯·ÎºÎÅÍ 3°³¿ùÀ̳», ±×»ç½ÇÀ» ¾Ë°Ô µÈ ³¯ ¶Ç´Â ¾Ë ¼ö ÀÖ¾ú´ø ³¯·ÎºÎÅÍ 30ÀÏÀ̳» °¡´ÉÇÕ´Ï´Ù. |
|
»óÇ°¿¡ ¾Æ¹«·± ÇÏÀÚ°¡ ¾ø´Â °æ¿ì ¼ÒºñÀÚÀÇ °í°´º¯½É¿¡ ÀÇÇÑ ±³È¯Àº »óÇ°ÀÇ Æ÷Àå»óÅ µîÀÌ ÀüÇô ¼Õ»óµÇÁö ¾ÊÀº °æ¿ì¿¡ ÇÑÇÏ¿© °¡´ÉÇÕ´Ï´Ù.
|
|
|
|
±³È¯ ¹× ¹ÝÇ°ÀÌ ºÒ°¡´ÉÇÑ °æ¿ì |
|
|
|
°í°´´ÔÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óÇ° µîÀÌ ¸ê½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì´Â ºÒ°¡´ÉÇÕ´Ï´Ù. (´Ü, »óÇ°ÀÇ ³»¿ëÀ» È®ÀÎÇϱâ À§ÇÏ¿© Æ÷Àå µîÀ» ÈѼÕÇÑ °æ¿ì´Â Á¦¿Ü) |
|
½Ã°£ÀÌ Áö³²¿¡ µû¶ó ÀçÆǸŰ¡ °ï¶õÇÒ Á¤µµ·Î ¹°Ç°ÀÇ °¡Ä¡°¡ ¶³¾îÁø °æ¿ì´Â ºÒ°¡´ÉÇÕ´Ï´Ù. |
|
Æ÷Àå °³ºÀµÇ¾î »óÇ° °¡Ä¡°¡ ÈÑ¼ÕµÈ °æ¿ì´Â ºÒ°¡´ÉÇÕ´Ï´Ù. |
|
|
´Ù¹è¼ÛÁöÀÇ °æ¿ì ¹ÝÇ° ȯºÒ |
|
|
|
´Ù¹è¼ÛÁöÀÇ °æ¿ì ´Ù¸¥ Áö¿ªÀÇ ¹ÝÇ°À» µ¿½Ã¿¡ ÁøÇàÇÒ ¼ö ¾ø½À´Ï´Ù. |
|
1°³ Áö¿ªÀÇ ¹ÝÇ°ÀÌ ¿Ï·áµÈ ÈÄ ´Ù¸¥ Áö¿ª ¹ÝÇ°À» ÁøÇàÇÒ ¼ö ÀÖÀ¸¹Ç·Î, ÀÌÁ¡ ¾çÇØÇØ Áֽñ⠹ٶø´Ï´Ù. |
|
|
|
|
|
|