´ë·®±¸¸ÅȨ >
Àڰݼ­/¼öÇè¼­
>
ÄÄÇ»ÅÍ/IT
>
Á¤º¸º¸¾ÈÀü¹®°¡

ÆîÃ帱â
ÃÖÀûÇÕ Á¤º¸º¸¾È±â»ç »ê¾÷±â»ç Çʱâ
Á¤°¡ 38,000¿ø
ÆǸŰ¡ 34,200¿ø (10% , 3,800¿ø)
I-Æ÷ÀÎÆ® 1,900P Àû¸³(6%)
ÆǸŻóÅ ÆǸÅÁß
ºÐ·ù Á¤º¸º¸¾ÈÀü¹®°¡
ÀúÀÚ ÀÓÀç¼± , ±èÇüÁÖ
ÃâÆÇ»ç/¹ßÇàÀÏ ¼º¾È´ç / 2021.01.14
ÆäÀÌÁö ¼ö 820 page
ISBN 9788931556490
»óÇ°ÄÚµå 345414355
°¡¿ëÀç°í Àç°íºÎÁ·À¸·Î ÃâÆÇ»ç ¹ßÁÖ ¿¹Á¤ÀÔ´Ï´Ù.
 
ÁÖ¹®¼ö·® :
´ë·®±¸¸Å Àü¹® ÀÎÅÍÆÄÅ© ´ë·®ÁÖ¹® ½Ã½ºÅÛÀ» ÀÌ¿ëÇÏ½Ã¸é °ßÀû¿¡¼­ºÎÅÍ ÇàÁ¤¼­·ù±îÁö Æí¸®ÇÏ°Ô ¼­ºñ½º¸¦ ¹ÞÀ¸½Ç ¼ö ÀÖ½À´Ï´Ù.
µµ¼­¸¦ °ßÀûÇÔ¿¡ ´ãÀ¸½Ã°í ½Ç½Ã°£ °ßÀûÀ» ¹ÞÀ¸½Ã¸é ±â´Ù¸®½Ç ÇÊ¿ä¾øÀÌ ÇÒÀιÞÀ¸½Ç ¼ö ÀÖ´Â °¡°ÝÀ» È®ÀÎÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.
¸ÅÁÖ ¹ß¼ÛÇØ µå¸®´Â ÀÎÅÍÆÄÅ©ÀÇ ½Å°£¾È³» Á¤º¸¸¦ ¹Þ¾Æº¸½Ã¸é »óÇ°ÀÇ ¼±Á¤À» ´õ¿í Æí¸®ÇÏ°Ô ÇÏ½Ç ¼ö ÀÖ½À´Ï´Ù.

 ´ë·®±¸¸ÅȨ  > Àڰݼ­/¼öÇè¼­  > ÄÄÇ»ÅÍ/IT  > Á¤º¸º¸¾ÈÀü¹®°¡

 
ÃÖÀûÇÕ Àü¹®ÄÚµù´É·ÂÆò°¡ COS PRO 2±Þ Python 19,800¿ø (10%)
ÃÖÀûÇÕ Á¤º¸º¸¾È±â»ç »ê¾÷±â»ç Çʱâ 34,200¿ø (10%)
ÃÖÀûÇÕ Á¤º¸º¸È£ Àü¹®°¡ CISSP(2021) 27,000¿ø (10%)
ÃÖÀûÇÕ Á¤º¸º¸È£·Ð ±âÃâ¹®Á¦Áý(2020) 17,100¿ø (10%)
ÃÖÀûÇÕ ACU AutoCAD 22,500¿ø (10%)
          
 

 
¸ñÂ÷
Part 01 Á¤º¸º¸È£ ÀÏ¹Ý SECTION 01 Á¤º¸º¸È£ °ü¸® 1. º¸¾È ±â¼ú 2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢) 3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò 4. º¸¾È ¿ë¾î ¼³¸í 5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù SECTION 2 Á¤º¸º¸È£ ´ëÃ¥ 1. °³¿ä 2. ±â¼úÀû º¸¾È 3. °ü¸®Àû º¸¾È 4. ¹°¸®Àû º¸¾È [PART 01 ±âÃâÈ®Àι®Á¦] Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography) SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ 1. ¾ÏÈ£ÀÇ °³¿ä SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù 1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ) 2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£ SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý 1. º¸¾È°ø°Ý 2. °ø°Ý ¹æ½Ä 3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡ SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾Ïȣȭ 1. ¾ÏÈ£ÀÇ ÀÇÀÇ 2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography) 3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ 4. ´ëĪŰ¿Í °ø°³Å° ºñ±³ 5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³ 6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ) 7. ÇؽÃÇÔ¼ö SECTION 05 ÀüÀÚ¼­¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI) 1. ÀüÀÚ¼­¸í(µðÁöÅÐ ¼­¸í: Digital Signature) 2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶) 3. Å°, ³­¼ö SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È 1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä 2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ× 3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü 4. ÆǸÅÀÚ ¿ä±¸»çÇ× 5. ±¸¸ÅÀÚ ¿ä±¸»çÇ× 6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction) 7. ÀüÀÚÈ­Æó(Electronic Cash) º¸¾È 8. °¡»óÈ­Æó, ºñÆ®ÄÚÀÎ 9. ºí·ÏüÀÎ(Block Chain) SECTION 07 ±âŸ ¿ë¾î ¼³¸í [PART 02 ±âÃâÈ®Àι®Á¦] Part 03 Á¢±ÙÅëÁ¦ SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä 1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control) 2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢ SECTION 02 ÀÎÁõ 1. °³³ä 2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ 3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication) 4. ÅëÇÕÀÎÁõü°è SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨ SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù 1. Æнº¿öµå Å©·¡Ä¿(Password Cracker) [PART 03 ±âÃâÈ®Àι®Á¦] PART 04 ³×Æ®¿öÅ© º¸¾È SECTION 01 ³×Æ®¿öÅ© °³¿ä 1. ³×Æ®¿öÅ© °³¿ä 2. OSI 7 Layer¿Í TCP/IP 3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶ SECTION 02 ÀÎÅÍ³Ý 1. ÀÎÅÍ³Ý 2. ARP¿Í RARP 3. TCP 3-way Hand Shake 4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç 5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access) 6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing 7. DHCP¿Í NAT SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ 1. ¶ó¿ìÅÍ 2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ 3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È 4. Giga ÀÎÅÍ³Ý SECTION 04 ¹«¼±Åë½Å º¸¾È 1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È 2. ¹«¼± ·£ÀÇ À§Ç輺 3. ¹«¼±°ø°ÝÀÇ À¯Çü 4. µð¹ÙÀ̽º ÀÎÁõ 5. Mobile IP 6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology) 7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯ SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æÈ­º® 1. ³×Æ®¿öÅ© º¸¾È°ú ¹æÈ­º® 2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ 3. ij½ºÆà ¸ðµå(Casting Mode) 4. IGMP(Internet Group Management Protocol) SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý 1. ¼­ºñ½º °ÅºÎ °ø°Ý °³¿ä 2. DoS, DDoS, DRDoS 3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù 4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý 5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat) 6. »çȸ°øÇÐÀû ¹æ¹ý 7. Ransomware(·£¼¶¿þ¾î) SECTION 07 ÇØÅ·°ú ´ëÃ¥ 1. ³×Æ®¿öÅ© ȯ°æ 2. Sniffing(½º´ÏÇÎ) 3. Spoofing(½ºÇªÇÎ) 4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking) 5. Phishing(ÇǽÌ) 6. ÁøÈ­ÇÏ´Â ´Ù¾çÇÑ ÇÇ½Ì 7. Pharming(ÆĹÖ) 8. Smishing(½º¹Ì½Ì) 9. ¸Þ¸ð¸® ÇØÅ· 10. ¸Á ºÐ¸® 11. ±âŸ º¸¾È ħÇØ °ü·Ã ¿ë¾î [PART 04 ±âÃâÈ®Àι®Á¦] PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È SECTION 01 À̸ÞÀÏ º¸¾È 1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ 2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø) 3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥ SECTION 02 FTP º¸¾È 1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ) SECTION 03 À¥ º¸¾È(Web Security) 1. Web 2. HTTP ÇÁ·ÎÅäÄÝ 3. SSL(Secure Socket Layer) 4. IPSec(IP Secure) 5. VPN(Virtual Private Network) 6. VLAN(Virtual LAN) 7. DNS(Domain Name System) º¸¾È 8. Wep App °£ Åë½Å±â¼ú SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È 1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä 2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦ SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È 1. µðÁöÅÐ ÄÜÅÙÃ÷ 2. ¿öÅ͸¶Å©(WaterMark) 3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte) 4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°Æà ºñ±³ 5. DRM 6. MPEG21 7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography) SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø 1. OWASP(The Open Web Application Security Project) [PART 05 ±âÃâÈ®Àι®Á¦] PART 06 ½Ã½ºÅÛ º¸¾È SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä 1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä 2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures) 3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧 4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú 1. ÇÁ·Î¼¼½º °ü¸® 2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸® 3. ½Ã½ºÅÛ È£Ãâ(System Call) 4. ÀåÄ¡°ü¸® SECTION 03 º¸¾È ¿î¿µÃ¼Á¦ 1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä 2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É 3. º¸¾È ¿î¿µÃ¼Á¦ 4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module) 5. HSM(Hardware Security Module) SECTION 04 Ŭ¶óÀ̾ðÆ® º¸¾È 1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå) 2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý 3. ÀÎÅÍ³Ý È°¿ë º¸¾È 4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È 5. ±âŸ SECTION 05 À©µµ¿ì ¼­¹ö º¸¾È 1. À©µµ¿ì °³¿ä 2. À©µµ¿ì º¸¾È 3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î 4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù 5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º 6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼® 7. Windows ±¸Á¶ SECTION 06 UNIX ¼­¹ö º¸¾È 1. À¯´Ð½º °³¿ä 2. UNIX ±âº» »ç¿ë¹ý 3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ 4. UNIX ¼­¹ö º¸¾È 5. UNIX ÆÄÀÏ ½Ã½ºÅÛ SECTION 07 ¸®´ª½º(Linux) ¼­¹ö º¸¾È SECTION 08 ¼­¹ö º¸¾È °ü¸® 1. ¼­¹ö°ü¸®ÀÚÀÇ ¾÷¹« SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥ 1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý 2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý 3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý 4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack) 5. ±âŸ ¿ë¾î 6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS) SECTION 10 Ãë¾àÁ¡ Á¡°Ë 1. Ãë¾àÁ¡ °³¿ä 2. ħÀÔ»ç½Ç È®ÀÎ [PART 06 ±âÃâÈ®Àι®Á¦] PART 07 Á¤º¸º¸¾È °ü¸® SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷ 1. Á¤º¸º¸È£ Á¤Ã¥ 2. IT º¸¾È °ü¸® 3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit) SECTION 02 À§Çè°ü¸®(Risk Management) 1. À§Çè°ü¸®(Risk Management) 2. À§ÇèºÐ¼® 3. À§ÇèÆò°¡ 4. À§Çè´ëÃ¥ 5. ÀçÇغ¹±¸°èȹ°ú RTO(Recovery Time Objective) SECTION 03 BCP(Business Continuity Planning) 1. BCP(Business Continuity Planning) 2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment) SECTION 04 ħÇØ»ç°í ´ëÀÀ 1. ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä 2. ħÇØ»ç°í ´ëÀÀ SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è 1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ 2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ 3. PIMS(Personal Information Management System) 4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³ 5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ 6. PDCA(Plan Do Check Action) SECTION 06 ¿ë¾î Á¤ÀÇ [PART 07 ±âÃâÈ®Àι®Á¦] PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô SECTION 01 ¹ý·üÀÇ ÀÌÇØ 1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§ 2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼­ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡ 3. OECD °¡À̵å¶óÀÎ SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô 1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý) 2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý 3. ÀüÀÚ¼­¸í¹ý 4. °³ÀÎÁ¤º¸ º¸È£¹ý 5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É 6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ 7. ÀüÀÚÁ¤ºÎ¹ý 8. ±¹°¡Á¤º¸È­ ±âº»¹ý 9. ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý) [PART 08 ±âÃâÈ®Àι®Á¦] PART 09 ±âÃâ¹®Á¦ 2018³â 2ȸ Á¤º¸º¸¾È±â»ç 2019³â 2ȸ Á¤º¸º¸¾È±â»ç

ÀúÀÚ
ÀÓÀç¼±
- Á¤º¸Åë½Å±â¼ú»ç(105ȸ)
- CISSP(±¹Á¦°øÀÎÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀü¹®°¡)
- MCP(Microsoft certified professional)
- MCDBA(Microsoft Certified Database Administrator)
- MCSE(Microsoft Certified System Engineer)
- ÀúÀÚ ¿î¿µ Ä«Æä: http://cafe.naver.com/securitydata.cafe
   ÃÖÀûÇÕ Á¤º¸º¸È£·Ð ±âÃâ¹®Á¦Áý(2020) | ÀÓÀç¼± | ¼º¾È´ç
±èÇüÁÖ
ÀúÀÚ´Â 20³â °¡±îÀÌ ÇÁ·Î±×·¥ °³¹ß ¹× º¸¾È¾÷¹«¸¦ ¼öÇàÇÏ¿´À¸¸ç, ºÎõ´ë, Àç´É´ë, ÀÎÇÏ°ø¾÷Àü¹®´ë, ¼­ÀÏ´ë, ¼ö¿ø´ë, ¼±¹®´ë, Çѱ¹ Æú¸®ÅØ 2´ëÇÐ ³²ÀÎõķÆÛ½º Ãâ°­°ú ±â´É´ëȸ °ü·Ã ½É»çÀ§¿ø, ½É»çÀå, ºÐ°úÀåÀ¸·Î È°µ¿ÇÏ°í ÀÖÀ¸¸ç, ÀÏ ÇнÀ º´ÇàÁ¦, °úÁ¤Æò°¡Çü ½ÃÇè ÃâÁ¦, °¨µ¶, äÁ¡À§¿øÀ¸·Î È°µ¿ÇÏ°í ÀÖ½À´Ï´Ù.

¢ß¾ÆÀÌ¿£¿¡½ºÄÄÆÛ´Ï ´ëÇ¥ÀÌ»ç
Çѱ¹»ê¾÷Àη°ø´Ü IT ºÐ¾ß Àü¹®À§¿ø È°µ¿(½ÃÇè ÃâÁ¦, °¨µ¶ µî)
ÀÎõÁö¿ª ÀÎÀûÀÚ¿ø°³¹ßÀ§¿øȸ À§¿ø ¹× 4Â÷ »ê¾÷ºÐ°ú À§¿øÀå
±¹¸³ ÀÎõ´ëÇб³ ÀϹݴëÇпø ÄÄÇ»ÅÍ°øÇÐ ¹Ú»ç ÀçÇÐ
2009³â ¼­¿ïµðÀÚÀμ¾ÅÍ À¥µðÀÚÀÎ ºÐ¾ß ÃÖ¿ì¼ö»ó ¼ö»ó
2013³â ´ëÇѹα¹¹ß¸í°¡ ´ë»ó ¼ÒÇÁÆ®¿þ¾î ºÐ¾ß ´ë»ó ¼ö»ó
2012³â ¼®Å¾»ê¾÷ÈÆÀå ¼öÈÆ
2013³â º§±â¿¡ ½´¹ß¸®¿¡ ÈÆÀå
µµ¼­¸¦ ±¸ÀÔÇϽŠ°í°´ ¿©·¯ºÐµéÀÇ ¼­ÆòÀÔ´Ï´Ù.
ÀÚÀ¯·Î¿î ÀÇ°ß ±³È¯ÀÌ °¡´ÉÇÕ´Ï´Ù¸¸, ¼­ÆòÀÇ ¼º°Ý¿¡ ¸ÂÁö ¾Ê´Â ±ÛÀº »èÁ¦µÉ ¼ö ÀÖ½À´Ï´Ù.

µî·ÏµÈ ¼­ÆòÁß ºÐ¾ß¿Í »ó°ü¾øÀÌ ¸ÅÁÖ ¸ñ¿äÀÏ 5ÆíÀÇ ¿ì¼öÀÛÀ» ¼±Á¤ÇÏ¿©, S-Money 3¸¸¿øÀ» Àû¸³Çص帳´Ï´Ù.
ÃÑ 0°³ÀÇ ¼­ÆòÀÌ ÀÖ½À´Ï´Ù.