ࡱ> u} M Q3bjbj== 8WW,:IlP$P$P$f$z$z$z$$kkk8k|Xp$u|(|||:$j z$v::vvvz$z$||~vvvvv8z$|z$|vvvvh+Bz$z$ |u 0Fs$GkLm  JlYlX|X v$$z$z$z$z$ Creating Trust in Critical Network Infrastructures: Korean Case Study This case study has been prepared by Dr. Chaeho Lim <HYPERLINK "mailto:%20chlim@if.kaist.ac.kr"chlim@if.kaist.ac.kr>. Dr Cho is Visiting Professor at the Korean Institute of Advanced Science & Technology, in the Infosec Education and Hacking, Virus Research Centre. This case study, Creating Trust in Critical Network Infrastructures: Korean Case Study, is part of a series of Telecommunication Case Studies produced under the New Initiatives programme of the Office of the Secretary General of the International Telecommunication Union (ITU). Other country case studies on Critical Network Infrastructures can be found at . The opinions expressed in this study are those of the author and do not necessarily reflect the views of the International Telecommunication Union, its membership or the Korean Government. The author wishes to acknowledge Mr. Chinyong Chong HYPERLINK "mailto:chinyong.chong@itu.int"> of the Strategy and Policy Unit of ITU for contributions to the paper. The paper has been edited by the ITU secretariat. The author gratefully acknowledges the generous assistance of all those who have contributed information for this report. In particular, thanks are due to staff of Ministry of Information and Communication and Korean Information Security Agency for their help and suggestions. SEQ CHAPTER \h \r 1 TABLE OF CONTENTS  TOC \o "1-2" \h \z \t "Heading_b;1;Annex_title;1"  HYPERLINK \l "_Toc9915658" Executive summary  PAGEREF _Toc9915658 \h 4  HYPERLINK \l "_Toc9915659" 1. Introduction  PAGEREF _Toc9915659 \h 4  HYPERLINK \l "_Toc9915660" 1.1 Structure of the report  PAGEREF _Toc9915660 \h 5  HYPERLINK \l "_Toc9915661" 2. The Korean environment  PAGEREF _Toc9915661 \h 5  HYPERLINK \l "_Toc9915662" 2.1 Koreas geographical layout  PAGEREF _Toc9915662 \h 5  HYPERLINK \l "_Toc9915663" 2.2 The Korean economy  PAGEREF _Toc9915663 \h 5  HYPERLINK \l "_Toc9915664" 3. Telecommunication network and services in Korea  PAGEREF _Toc9915664 \h 6  HYPERLINK \l "_Toc9915665" 3.1 Facilities-based telecommunication services  PAGEREF _Toc9915665 \h 6  HYPERLINK \l "_Toc9915666" 3.2 Non-facilities-based telecommunication service providers  PAGEREF _Toc9915666 \h 8  HYPERLINK \l "_Toc9915667" 3.3 Internet infrastructures in Korea  PAGEREF _Toc9915667 \h 9  HYPERLINK \l "_Toc9915668" 3.4 Overview of Korean network infrastructures  PAGEREF _Toc9915668 \h 11  HYPERLINK \l "_Toc9915669" 4. Types and impact of threats to critical network infrastructures  PAGEREF _Toc9915669 \h 13  HYPERLINK \l "_Toc9915670" 4.1 The year of the Internet worm, 2001  PAGEREF _Toc9915670 \h 13  HYPERLINK \l "_Toc9915671" 4.2 Internet attack statistics  PAGEREF _Toc9915671 \h 13  HYPERLINK \l "_Toc9915672" 4.3 Computer virus attacks  PAGEREF _Toc9915672 \h 17  HYPERLINK \l "_Toc9915673" 5. Key initiatives to protect critical network infrastructures  PAGEREF _Toc9915673 \h 19  HYPERLINK \l "_Toc9915674" 5.1 Information and Telecommunication Infrastructure Protection Act  PAGEREF _Toc9915674 \h 19  HYPERLINK \l "_Toc9915675" 5.2 Reviewing the critical networks  PAGEREF _Toc9915675 \h 22  HYPERLINK \l "_Toc9915676" 5.3 Regional level security coordination  PAGEREF _Toc9915676 \h 24  HYPERLINK \l "_Toc9915677" 6. Conclusion and possible areas for further study  PAGEREF _Toc9915677 \h 25  HYPERLINK \l "_Toc9915678" 6.1 Overview  PAGEREF _Toc9915678 \h 25  HYPERLINK \l "_Toc9915679" 6.2 Integrated National Information Security System, under construction  PAGEREF _Toc9915679 \h 25  HYPERLINK \l "_Toc9915680" 6.3 Establishing common criteria for evaluating security products  PAGEREF _Toc9915680 \h 26  HYPERLINK \l "_Toc9915681" Annex 1: References  PAGEREF _Toc9915681 \h 28  TOC \o "1-2" \h \z  HYPERLINK \l "_Toc9561997" 1. Introduction  PAGEREF _Toc9561997 \h 3  HYPERLINK \l "_Toc9561998" 1.1 Structure of the report  PAGEREF _Toc9561998 \h 4  HYPERLINK \l "_Toc9561999" 2. The Korean Environment  PAGEREF _Toc9561999 \h 4  HYPERLINK \l "_Toc9562000" 2.1 Koreas Geographical Structure  PAGEREF _Toc9562000 \h 4  HYPERLINK \l "_Toc9562001" 2.2 The Korean Economy  PAGEREF _Toc9562001 \h 4  HYPERLINK \l "_Toc9562002" 3. Telecommunication Network and Services in Korea  PAGEREF _Toc9562002 \h 5  HYPERLINK \l "_Toc9562003" 3.1 Facilities-Based Telecommunication Services  PAGEREF _Toc9562003 \h 5  HYPERLINK \l "_Toc9562004" 3.2 Non-facilities-based telecommunication service providers  PAGEREF _Toc9562004 \h 7  HYPERLINK \l "_Toc9562005" 3.3 Internet Infrastructures in Korea  PAGEREF _Toc9562005 \h 8  HYPERLINK \l "_Toc9562006" 3.4 Overview of Korean Network Infrastructures  PAGEREF _Toc9562006 \h 10  HYPERLINK \l "_Toc9562007" 4. Types and impact of threats to Critical Network Infrastructures  PAGEREF _Toc9562007 \h 11  HYPERLINK \l "_Toc9562008" 4.1 The Year of the Internet Worm, 2001  PAGEREF _Toc9562008 \h 11  HYPERLINK \l "_Toc9562009" 4.2 Internet attacks statistics  PAGEREF _Toc9562009 \h 11  HYPERLINK \l "_Toc9562010" 4.3 Computer Virus Attacks  PAGEREF _Toc9562010 \h 14  HYPERLINK \l "_Toc9562011" 5. Key Initiatives to Protect Critical Network Infrastructures  PAGEREF _Toc9562011 \h 16  HYPERLINK \l "_Toc9562012" 5.1 Act of Information and Telecommunication Infrastructure Protection  PAGEREF _Toc9562012 \h 16  HYPERLINK \l "_Toc9562013" 5.2 Reviewing the critical networks  PAGEREF _Toc9562013 \h 19  HYPERLINK \l "_Toc9562014" 5.3 Regional level security coordination  PAGEREF _Toc9562014 \h 21  HYPERLINK \l "_Toc9562015" 6. Conclusion and possible areas for further studies  PAGEREF _Toc9562015 \h 22  HYPERLINK \l "_Toc9562016" 6.1 Overview  PAGEREF _Toc9562016 \h 22  HYPERLINK \l "_Toc9562017" 6.2 Integrated National Information Security System, under construction  PAGEREF _Toc9562017 \h 22  HYPERLINK \l "_Toc9562018" 6.3 Establishing common criteria for evaluating security products  PAGEREF _Toc9562018 \h 23  Executive summary In the modern era, all major infrastructures, such as financial, energy, e-government, military defence, health care, transportation and telecommunication use information technology (IT) and networks. Like other countries, Korea has been upgrading its IT and network capabilities to similar levels to those of other advanced countries. However, international attacks on these crucial networks, such as the worm attacks Code Red and Nimda which took place in 2001, have shown that unauthorized network intrusion can potentially have a huge impact on the whole country, as well as the damage they can inflict on these infrastructures in particular. Where individual networks are connected to public networks such as the Internet, it is clear that the social and economic impacts of such attacks stand to be extremely costly. In Korea, the telecommunication network has already suffered from Internet-borne attacks, including intrusion and worm viruses. And while the Korean Internet ranks extremely high technologically on a global level, offering very fast communication facilities, intrusions have still occurred. The problem has led the Korean Ministry of Information and Communication (MIC) to process and pass the Act of Information and Telecommunication Infrastructure Protection Act. By this law:, The government can determine what constitutes critical infrastructure, even in commercial networks; That infrastructure which is defined as critical should apply strict security principles and should evaluate the potential vulnerabilities; If the critical infrastructure is attacked, it should be reported to the law enforcement agencies, or to KISA (Korea Information Security Agency) or ETRI (Electronics and Telecommunications Research Institute);. Special Security security Companies companies can be assigned by the government to evaluate the critical infrastructure site;. ISAC (Information Sharing and Analysis Centre) and ISMS (Information Security Management Systems) should beare covered byin this law. This case study assesses current threats to network security in Korea and describes current measures taken for the protection of national critical network infrastructures and how these can be defined. Due attention is also given to the importance of Due to the dynamic nature of hacking and virus worm attacks, regional and international level coordination, is very important because sharing attack information could may, in many instances, be the first warning of threats to the critical infrastructure. The dynamic nature of hacking and virus worm attacks, and their growing sophistication, mean that ongoing coordination of this nature needs to be developed in parallel to national protection initiatives. Finally, some areas for further study and actions to meet future needs are proposed. Introduction 1.1 The year 2000 could becan be seen as called the start of a new era for information technology in Korea, because as that it is the year when high-speed Internet services began to spread. The major broadband Internet service providers (ISPs) in Korea are Korea Telecom and Hanaro Telecom (using which use Asynchronous asynchronous Digital digital Subscriber subscriber Llines technology, or ADSL), Thrunet and Dreamline (using which use cable modems), and other private ISPs (using which use Internet via satellite, fixed wireless and other technologies). By the end of 2000, the number of users who subscribed to Internet service providers had reached over 4million, indicating that over 30 percentper cent of the nation's households have access to high-speed Internet. The expansion of the high-speed network infrastructure enables subscribers to view multimedia contents, providing the basis for advancing into becoming ansetting Korea on the path towards becoming a real Information information powerhouse. The This trend towards greater connectivity and more converged multimedia services, is likely to continue, as the government is forging ahead with a policy to connect at least 90 per cent of the nation's population to the Internet. 1.2 Another striking features of IT in Korea is that the number of domestic wireless Internet subscribers increased from 2.57 million in February 2000 to 19.01 million in April 2001, or a sevenfold growth. The wireless Internet industry was evaluated as one of the most robust industries in 2000. Since pay-per-view content is possible in over the wireless Internet, it could become a new profitable new business model. 1.3 In line with this, the year 2000 was a milestone for Koreas effort to enhance security. In December 2000, the Acts on thefor protection ofng major IT infrastructures from cyber- terrorism were passed. A set of information protection guidelines for IT services was established for raising the awareness of data protection among businesspeople. A regulation was added to the Acts on Promotion of information & Telecommunications Network Use and was passed to contain the spread of computer viruses. Moreover, a hacking and virus prevention support center centre was established to strengthen the virus alert system. Also, by enhancing the support for CONsortium Consortium of Computer Emergency Response Teams (CONCERT), the government is planning to strengthen information exchanges for hacking attacks and viruses in cooperation with Asian countries such as Japan and China, and to participate actively in the activities of Forum of Incident Response and Security Teams (FIRST). Structure of the report 1.4 Following this introductory section, this paper will look into Koreas experience with Critical critical Network network Infrastructures infrastructures protection in theas following wayss: In chapter Chapter two, the overall Korean environments is illustrated; In chapter Chapter three, the network infrastructures are described through an overview of the Korean telecommunication service market and Internet infrastructure. This section reviews what are the criteria used to decide which network is Criticalcritical and should thus be treated as such. In chapter Chapter four, we the report looks at various types of threats to the network infrastructures and their impact on socio-economic life. In chapter Chapter five, Koreas approach to the problem is examined. In this chapter, the organization of activities to prevent, detect and respond to potential attacks is described. Finally, in cChapter six, future developments in this area will be explored. The Korean EnvironmentThe Korean environment 2.1 Koreas Geographical geographical Slayouttructure 2.1 Korea is situated on the Korean Peninsula, which spans 1100 1,100 kilometers north to south. The Korean Peninsula lies on the north-eastern section of the Asian continent, where the western-most parts of the Pacific join Korean waters. The peninsula shares its northern border with China and Russia. To its east is the East Sea, beyond which neighbouring Japan lies. In addition to the mainland peninsula, Korea includes some 3000 3,000 islands. 2.2 Korea encompasses a total of 222154 222,154 square kilometersalmost the same size as Britain or Romania. Some 45 percentper cent of this area, or 99000 99,000 square kilometers, is considered cultivatable area, excluding reclaimed land areas. Mountainous terrain accounts for some two-thirds of the territory. The Taebaeksan range runs the full length of the east coast, where the waves of the East Sea have carved out sheer cliffs and rocky islets. The western and southern slopes are rather gentle, forming plains and many offshore islands. 2.2 The Korean Economy2.2 The Korean economy 2.3 Korea recently pulled through an the economic storm of the Asian financial crisis that began in late-1997. This crisis, which rocked markets all across Asia, had until recently threatened Korea's recent economic achievements. However, thanks to the implementation of an International Monetary Fund (IMF) agreement, the strong resolve for reform of the government of Kim Dae-jung, and successful negotiation of foreign debt restructuring with creditor banks, the nation is currently on track to resume economic growth. Since the onset of the crisis, Korea has been rapidly integrating itself into the world economy. The goal of the nation is to overcome problems rooted in the past by creating an economic structure suitable for an advanced economy. 2.4 Korea, once one of the world's poorest agrarian societies, has undertaken economic development in earnest since 1962. In less than four decades, it achieved what has become known as the "economic miracle on the Hangang River", a reference to the river that runs through Seoulan incredible process that dramatically transformed the Korean economy, while marking a turning point in Korea's history. 2.5 An outward-oriented economic development strategy, which used exports as the engine of growth, contributed greatly to the radical economic transformation of Korea. Based on such a strategy, many successful development programmes were implemented. As a result, from 1962 to 1997, Korea's Gross gross National national Income income (GNI) increased from US$D 2.3 billion to US$D 474 billion, with its per capita GNI soaring from US$D 87 to about US$D 10,307. These impressive figures clearly indicate the magnitude of success that these economic programmes have brought about. GNI and per capita GNI drastically dropped to US$D 317 billion and US$D 6823 6,823 respectively in 1998 due to the fluctuation in foreign exchange rates, but these figures returned to the pre-economic crisis level in 2000. 2.6 Korean imports have steadily increasedgrown thanks to the nation's liberalization policy and increasing per capita income levels. As one of the largest import markets in the world, the volume of Koreas imports exceeded those of China in 1995, and was comparable to the imports of Malaysia, Indonesia, and the Philippines combined. Major import items included industrial raw materials such as crude oil and natural minerals, general consumer products, foodstuffs and goods such as machinery, electronic equipment and transportation equipment. 2.7 Koreas rapid development since the 1960s has bee fuelled by high savings and investment rates, and a strong emphasis on education. The Republic of Korea became the 29th member country of the Organization for Economic Cooperation and Development (OECD) in 1996. 2.8 With a history as one of the fastest growing economies in the world, Korea is working to become the focal point of a powerful Asian economic bloc during the 21st century. The North-east Asia region commands a superior pool of essential resources that are the necessary ingredients for economic development. These include a population of 1.5 billion people, abundant natural resources, and large-scale consumer markets. 2.9 The employment structure of Korea has undergone a noticeable transformation since the dawn of industrialization in the early 1960s. In 1960, workers engaged in the agricultural, forestry and fishery sectors accounted for 63 per cent of the total labor force. However, this figure dropped to a mere 11.6 per cent by 1999. By contrast, the weight of the tertiary industry (service sectors) has gone up from 28.3 per cent of the total labour force in 1960 to 68.6 per cent in 1999. Telecommunication Network network and Services services in Korea 3.1 Facilities-Based based Telecommunication telecommunication Sservices 3.1.1 Domestic Telecommunication telecommunication Servicesservices 3.1 The Korean government Government fully recognizes that the establishment of fixed telephone facilities is a means of satisfying the most fundamental communication demands and that, at the same time, the basic infrastructure can provide a wide variety of telecommunication services. Since the 1980s, the government has pursued the development of telecommunication services in preparation for early realization of an information society as well as expansion and modernization of telecommunication facilities. Under these circumstances, more than one million telephone lines have been rolled out every year since 1982. As a result of this effort, there were more than 10 million lines by 1987, ushering in the one telephone per family era. The government has been expanding infrastructure continuously with the help of the successful development of a domestic electronic exchange. 3.2 Accordingly, Korea has grown rapidly. Between 1990 and 2000, Koreas total teledensity (fixed lines plus mobile subscribers) rose from 31.1 to 103.1, ranking Korea 27th in the world. The Korean financial crisis had resulted in a drastic reduction in the number of new subscribers. In 1998, the number of subscribers actually fell by 210 thousand. With the revitalization of the economy, there were 22.7 million fixed lines and 29.0 million mobile subscribers as of the end of 2001. As for the domestically developed TDX exchange, there were 12.437 million lines installed at the end of 2000, representing a 51% per cent share of overall exchange facilities usage. 3.1.2 International Telecommunication telecommunication Serviceservice 3.3 International telephone service is available all across the world including the remotest parts of the Sin Po region (water canal construction area) in the North. The number of minutes in outgoing international call in 200- was 1.02 billion, representing an increase of 14 per cent per year since 1995. However, with fewer than 50 minutes of international calls per subscriber, Korea has one of the lowest levels of international calling in the OECD (only Japan is lower) 550 million minutes in 2000 an increase of 12.6 % per cent over the previous year. 3.4 The majority of international leased lines are digital lines (above 56/64k) that can handle international voice calls, fax, and data simultaneously. The increased usage of leased lines by service providers has prompted the supply of high-speed Internet services, ranging from 45 to 155 Mbit/s. Three companies (Korea Telecom, Dacom, ONSE Telecom) previously shared the market for international leased line service. In 2001, seven additional companies have entered the market. Various international submarine cable operators (AGC, Level-3, Flag, WorldCom, Concert, Global-One, Equant, KDD, SingTel) are also participating in the market. As a result, this should create strong competition in the international leased line service market. From 2001 to the beginning of 2002, other additional national and international communication companies, in addition to Korea Telecom, have received construction rights for laying down submarine cable lines for international routes, thereby intensifying competition in service costs. 3.1.3 Wireless Telecommunication telecommunication Serviceservice 3.5 From only 2658 2,658 cellular subscribers in 1984, the number of subscribers has subsequently grown rapidly. In 1990, there were 80005 80,005 mobile subscribers, 16 1,6 million subscribers in 1995 and by the end of December 2001, the number of subscribers had grown to 29.04 million mobile users, or representing 60.8 subscribers for every 100 inhabitants. The proportion of cellular phone subscribers held by the various service providers at the end of 2000 was SK Telecom (40.8 % per cent of total subscribers), KT FreeTel has (19.8 per cent) LG Telecom (14.6 per cent) Shinsegi Telecom (13.2 per cent) and KTM.com (11.8 per cent). Since September of 1999, the number of cellphone subscribers has exceeded fixed telephone subscribers, and this trend will continue. 3.6 In September of 1999, the cellphone companies turned their energies toward providing wireless Internet service through mobile phones using IS-95B and CDMA 2000 1x technology. The number of wireless Internet subscribers in the nation has been rapidly increasing from 2.58 million at the end of February 2000 to 19.01 million at the end of April 2001. As the high growth in the wireless Internet market continues, the trend of competitiveness in the cellphone market will shift from competition in networks to competition in solutions and content. In the near future, wireless Internet service delivered via cellphones will expand into the areas of wireless e-Transactions, such as stock and bank transactions, and cyber shopping. Therefore, cellphone companies have aggressively pursued strategic relationships with Internet providers to develop effective and useful content. 3.7 Three companies (Airmedia, Intec Telecom and Hanse Telecom) acquired the rights to offer wireless data services. Early wireless data service was mainly aimed at the business market, but with the bull market in September 1998, Airmedia began providing interactive stock market service to the general public, resulting in the rapid growth in sales and subscribers. The added convenience of being able to conduct stock market transactions anywhere and 50 per cent lower transaction fees led to greater popularity in wireless data services. However, the market and growth prospects of the wireless data market remain limited, showing 57038 57,038 subscribers at the end of 1999 with an increase to 73842 73,842 by December 2000. The future success of the wireless data market will depend on the ability to differentiate wireless Internet data services through cellphones. 3.8 Third- generation mobile services, or IMT-2000 (International Mobile Telecommunication 2000), promise multimedia services that integrate voice, data and images in various environments, including wired and wireless services, through the use of a personal terminal and user card. In 2001, three IMT-2000 providers were selected to provide high-speed mobile services in the near future. IMT-2000 service can be categorized into multimedia service, wired and wireless integrated services, and global roaming service. IMT-2000 enables the transmission and receiving of all kinds of information anytime, anywhere in the world with one terminal. To improve global roaming service, the world's information communication industry is in cooperation with setting standardization levels for IMT-2000 and developing its equipment. Non-facilities-based telecommunication service providers 3.2.1 Specially Designated designated Telecommunication telecommunication Servicesservices 3.9 Specially designated telecommunication services are divided into three different kinds of providers: voice resale and Internet phone service through transmitting equipment. call convergence, re-billing service, and wireless resale service, without acquiring transmitting equipment. telecommunication service using specially-constructed telecommunication facilities. Specially Designated designated Telecommunication telecommunication Services services began operation in January 1998. In that year alone, 180companies registered as special service providers. Since then, the number of new companies participating in the market has slowed down, reaching 268 companies as of March 2001. The majority of the early specially designated telecommunication service providers have experienced rapid growth by entering the international call market through a voice resale service and Internet phone service. The market for special services has expanded dramatically being worth 248.7 billion won in 1999 to 792.3 billion won in 2000. 3.2.2 Value-added Telecommunication telecommunication Servicesservices 3.10 According to Article 4 of the Telecommunications Business Act: article 4, value-added telecommunication service combines computer functions with the basic transmitting function of telecommunication. Value-added service providers provide telecommunication services, excluding designated basic telecommunications services, that include PC communication, computer reservations, telephone mail box service, Internet, electronic mail, EDI and credit card request by renting telecommunication network facilities from facilities-based service providers. 3.11 Domestic value-added telecommunication services have maintained higher growth rates due to the expansion of existing markets and the development of new business areas, creating a favourable environment for the entry of additional value-added service providers. As of the end of 2000, there was a five-fold increase over 1996 with 2,885 value-added telecommunication service providers present in the market. This rapid growth was due to government support in promoting the industry, innovative and effective management, large-scale information systems in larger companies, and greater public awareness of information technologies in our society. The majority of value-added telecommunication service providers are running integrated systems that provide more than two services. Korea Telecom and Dacom are leading providers in this industry, while ISPs are gaining more ground due to the increased number of Internet users. The value-added telecommunication service market accomplished gross sales exceeding approximately one trillion won in 1998, and reached 2.533 trillion won in 2000, achieving an average annual growth rate of 32.8per cent. Its gross sales are predicted to be 6.3 trillion won in 2004 due to the increasing number of Internet users, electronic transactions and the great demand for high-speed networks. 3.2.3 Internet cConnection Servicesservices 3.12 The population of Internet users is has been increasing tremendously, from 3.1 million in 1998 to 24.12 million at the end of September 2001. The first commercial Internet connection service was launched in 1994. There were 36644 36,644 Internet hosts in 1995, rising to 440000 440,000 as of 2001. There were only 11 Internet service providers and related businesses in 1994. This grew to 83 by 2000. The Internet market has been growing at full speed due to the remarkable developments in IT technology, huge increase of e-Trade, acceleration of Smallsmall-office-home-office (SOHO) and the IP industry. Now, ISPs have a new concept of business that goes beyond simply connecting to the Internet. By putting forth their best efforts to provide additional services to draw customers, they also focus on outsourcing that is designed to consign and manage additional services. The rate of growth of the Internet market has averaged 184% per cent annually and continues to grow rapidly. 3.3 Internet iInfrastructures in Korea 3.3.1 Internet eXchange (IX) 3.13 Domestic IXs are operated by NCA (KINX), KT (KT-IX), Dacom (DACOM-IX) and Korea Internet Neutral eXchange (KINX). The nonprofit public networks peer via KIX while commercial ISPs peer via KINX, KT-IX, and DACOM-IX. 3.3.2 Internet Backbone backbone Networknetwork 3.14 Currently, the number of commercial networks is about 80, including KT, Onse Telecom, Hanaro Telecom, and Thrunet, while the number of nonprofit ISPs is 7, making it a total of 87 ISPs in Korea. Considering the fact that the number of ISPs in 1999 was 40, this is a rapid growth. Here, we will presentBelow, the state of the domestic Internet backbone network is presented by looking atby researching the major carrier providers that have large-scale exchanges with the nationwide network: KII Network (PUBNET - Korea Telecom) . KT has been providing services by establishing a router-oriented network at the end of 1997 in order to meet the rapidly increasing demands in the public sectors. However, by establishing an ATM switched network since the end of the 1999, KT is converting users on the existing PUBNET into ATM networks, This process of migration was duie to be complete by the end of 2001. Moreover, KT is providing a nationwide service through leased lines, frame relay, and ATM lines, and through diversification of the types of access speed and forms of Internet networks. The Internet backbone network has been constructed in dual system by installing ATM switches and relay/backbone routers at seven major cities across the country (Seoul, Inchon, Suwon, Taejon, Pusan, Taegu, and Kwangju), and ATM subscriber access switches are installed in 130areas across the country, providing access of 155-622 Mbit/s between major cities within the backbone sector, and 155 Mbit/s between medium and small cities. PUBNETPLUS DACOM is establishing a KII-G infrastructure construction project that connects the national and public agencies with ATM switches and optical cables. At the same time, Dacom is propelling a project for consolidating the infrastructure of high-speed IT networks, such as promoting the use of KII-G through investments on multimedia application services and contents. DACOM is preparing for the various interconnectivity between terrestrial and wireless IT networks, and installation of a next- generation intelligent network. High-speed ATM switch networks have been established, and DACOM has been providing ATM service, FR-ATM exchange service since July 2000, and Internet service since September 1999. Currently DACOM is providing services such as leased line, packet exchange, FR, and Internet service to about 6,000 agencies, and is planning to provide various services for activating the high-speed IT networks, such as ATM, FR, Internet service, and other application services in 2001. In the section between main nodes, transfer lines of 2.5-5 Gbit/s are offered, whereas between small cities, 45-155 Mbit/s, while maintaining stable service in case of accidents by dualizing the routes between the nationwide nodes. HPCNet/KREONET KISTI HPCNet is a supercomputer user group, whereas KREONET is a research network user group. HPCNet and KREONET are sharingshare major domestic backbone networks, and are servicingprovide services through by establishing 155-300 Mbit/s backbone networks between major nodes and 45Mbit/s between middle and small nodes. HPCNet is a backbone network constructed in order to provide KISTIs supercomputer infrastructure to all supercomputer users. HPCNet is promoting the use of supercomputers by researchers in each subscribed agencies, public and private company laboratories, and educational institutions, and in at the same time, is continuously enhancing the domestic network backbone for high-speed use. The main network advancement project in 2001 was to , is promoteing the increase of all local network node speeds to 45-155 Mbit/s. Also, in order to strengthen the characteristic as a national research network, and to promote the transition into a leading network, the establishment of a next- generation network through connection with KTs KOREN is being propelledprepared. KREONET is one of the five national backbone networks, a noncommercial ISP for seekingthat aims to enhanceement of research productivity, by mutually connecting the network with the researchers of domestic government laboratories, science technology related public agencies, and university company-attached laboratories, and to activateing the share of domestic and overseas computer resources, and the mutual exchange of research data. Moreover, in order to specialize enhance KREONET into KREONET2, a plan of high speed exchange (45 Mbit/s) with STAR-TAP, the American NSFs high performance research network, in cooperation with MICs APII testbed, is being propelledunder way. KOSINET NCA. Since 1994, KOSINET has been serving as a part of the establishment of an infrastructure for sharing information and activating Internet use in government, public agencies and other using agencies, providing a connection service with the non-commercial networks (educational, research networks, etc) through KIX, which is currently operated by NCA, and also an overseas Internet service. Also, bBy using KII-G as an exclusive high speed network, cost reduction in communication fee is being promoted, while NCA is providing services using the KII-G by universally managing the communication lines of the related agencies. As fFor the Internet networks for government and public agencies, the Seoul-Yongin section has been established byis covered by a 45 Mbit/s line, which has been establisheding and opera ting ed with a view toit in the state of activating Internet use in government and, public agencies. EDUNET KERIS. Korea Education & Research Information Service (KERIS) is promoting projects such as establishing a general education information service for students and teachers, establishing EDUNET in order to provide various information, establishing a research information service system based on the originals, and establishing a research information system in order to provide original academic DB services. KERIS is also promoting projects such as supporting the IT-based education informatization, and researching the policies in IT- educationof education informatization. EDUNET consists of 12nodes across the country, connected with 4-6 Mbit/s lines between major nodes, and 512 Kbit/s-2Mbit/s, between middle intermediate and small nodes. 3.3.3 Access Networksnetworks Wired Servicesservices 3.15 The types of broadband wired services that spread rapidly after 1998 include xDSL, Home PNA and LAN. The number of high-speed Internet subscriber have increased monthly by an average of 21 percentper cent, from 870,000 in April 2000 to 4 million by December 2000.. Dial-up Modem modem and ISDN Servicesservices. The dial-up modem and ISDN services are now legacy services that are mostly used by those users who use the Internet for a rather short time and do not download large files. Online service started commercially in December 1993. Recently, in spite of the increase of high-speed Internet services such as ADSL and cable modems, the number of online service users has increased from 9 million in 1999 to 16 million in December 2000, and this seems to result from the increase of various forms of free service, rather than an increase of subscriptions. By using ISDN (Integrated Services Digital Network), users can access the Internet at speeds of between 64 kbit/s and 128kbit/s. Cable modems. The CATV Internet network is a Hybrid Fibre/Coax (HFC) network, using optical cable between broadcasting stations and the Main main Distribution distribution Frameframe, and coaxial cable between MDFs and subscribers. Commercial services have been provided since Thrunets service beganthe service by Thrunet on 1 July 1, 1998. Currently, in December 2000, Hanaro Telecom, DACOM, Dreamline, Thrunet, Onse Telecom, and SK Telecom are providing the service. XDSL. The number of ADSL (Asymmetric Digital Subscriber Line) subscriber has increased rapidly since Hanaros commercial service was introduced in April 1994. Hanaro Telecom is providing Internet access through FTTC (Fiber to the Curb)-type digital optical local loop by bringing the optical cable to the apartment doorway. Korea Telecom provides Internet access under its Megapass brand name. Each Megapass service is divided according to its connection speed, fixed IP, and number of users; Light light (for download speed of 1.5 Mbit/s), Premium premium (for download speed of 8 Mbit/s), My-IP, and Multi IP. Other xDSL services are HDSL (High high bit rate Digital digital Subscriber subscriber Lineline) service and VDSL (Very very High high bit rate Digital digital Subscriber subscriber Lineline) service. HDSL is being used mostly by consumers living in commercial buildings and apartments because it can support a large number of subscribers. VDSL has been under trial service in 50 households within Seoul since August 2000. Commercial VDSL service of VDSL was due to begin in areas near Seoul in 2001. The service will be expanded in the 2nd second half of 2002. Wireless Internet Internet via cellular mobile communications. The Internet service using mobile communications had beenwas originally provided on the basis of the existing IS-95 standard, with an access speed of 9.6 kbit/s. IS-95A offers 14.4 Kbit/s speeds and the commercial service of IS-95B in Seoul provides speeds of 64 kbit/s. Recently, the commercialization of IS-95C provided access speeds of up to 144 Kbit/s. While there are currently many problems in providing the service, such as the methods of use, and charging policies, providers are plotting strategies in order to grab the leading edge in the wireless multimedia business, which leads to IMT-2000. B-WLL (Broadband broadband Wireless wireless Local local Looploop) is a wireless telecommunication system offering high-speed Internet transmission within a radius of 2-3 km by using a frequency of 26 Ghz. In March 1999, Korea Telecom and Hanaro Telecom were selected as the providers of B-WLL, and in June 1999, Dacom was additionally selected. Hanaro Telecom had started its service in July 2000, and is was planning to provide commercial service of 1-2 Mbit/s, in 2001. Satellite Internet. Internet via satellite enables telecommunications in areas where on-line services or Internet access is are impossible, such as islands or mountain areas where terrestrial lines cannot be built. The transmission speed is 56-80 Kbit/s for uploading data and 400 Kbit/s-1 Mbit/s for downloading. Korea Telecom started its service in May 1999 and Samsung SDS is also providing services by usingvia the Mugungwha satellite launched in 1996. Also, GCT Korea and Mirae on-line have been offering services since the second half of 2000. 3.3.4 International Submarine submarine Cablescables 3.16 The current international submarine optical cable network connected to Korea is composed of a total of ten undersea cables (JKC, HJK, RJK, CKC, APCN, FLAG, SMW-3, CUCN, Across the Pacific, and APCN-2), and its total capacity amounts to 14021,402.6 Gbit/s. The domestic submarine cable relay stations are distributed in eight areas (Pusan, Cheju, Geoje, Taean, Goheung, Namhae, Hosan, and Ulleung), and its total capacity amounts to 13.48 Gbit/s. After 2002, it is expected that the submarine optical cables would will account for 95percentper cent of all Internet traffic, and that the usage of submarine optical cable lines would will exceed reliance on satellite telecommunications. 3.4 Overview of Korean Network network Iinfrastructures 3.17 Like PDD 63 in the United States, Korea now has an Act of information and telecommunication infrastructure protection Act. This law allows the president of the central government cabinet to designate certain infrastructures as critical and gives powers to requireoblige their repair and rapid recovery in the event of damage from intrusions and virus attacks 3.18 The law covers the following areas: E-Government government and general administration; Financial networks; Military and Defencedefence; Gas and Energyenergy; Transportation; Telecommunications. 3.19 The General Administration Network is intended for the interoperability of the government and public services. The Assemblies, Law and Administration of the government are interconnected by this network with the commercial Internet, and with the networks of other public and private agencies. It is run on a not-fornon-profit basis. General Administration Networks are operated by five major nodes, central, Gwacheon, Taejon, Honam and Youngnam center. In order to provide service to the general citizenspublic, the central node is interconnected to public Internets, like KORNET, BORANET, Pubnet and KREONet. Types and impact of threats to Critical critical Network network Iinfrastructures 4.1 The Year year of the Internet Wormworm, 2001 4.1 The year 2001 was known as the Internet Wormworm year, with worms such as Remen, Li0n, Sadmin/IIS, Chees and Red Worm all appearing in the first part of the year. In the second half of the year, worms infecting Windows NT, including CodeRed I/II and Nimda attacked Korean networks, affecting businesses and home PCs, especially those with broadband connections (see Table 4.1). 4.2 Recent worms like CodeRed and Nimda increased network traffic by up to ten times the normal rate, putting a heavy burden on the ISPs, whowhich, at peak usage times, had difficulty maintaining their networks. All The entire communication infrastructure was under strain and recovery was difficult. The wormsA worm typically operates in the following manner: It scans systems chosen at random; If it finds a vulnerable system, it attacks and installs the worm program; It opens a specific port as a backdoor; It sends to the originator, by e-mail, specific files like passwords; Or Alternatively, it replaces the homepage; It continues to repeat numbers 1 to 5, ad infinitum.. 4.3 These worms then shifted from UNIX server to Microsoft Windows PCs : It appears that attackers regard Windows as a particular challenge because of the fame they achieve in the hacker community for demonstrating vulnerabilities in the operating system. Personal Computers computers using Microsoft Windows have the equivalent power to a server. Security on personal computers is not usually high. General users can open attached files as normal. 4.4 As illustrated already, worms infiltrate vulnerable systems that do not use anti-virus scanning or patches. All commercial systems have some areas of vulnerability, for instance:. The vulnerabilities of Unicode; The buffer overflow of ISAPI; The attacks to IIS RDS; Common network using NETBIOS; Information disclosure using NULL session ; LN Hash vulnerable in SAM ; The overflow vulnerabilities in RPC; The vulnerabilities of sendmail ; The vulnerabilities of BIND; The vulnerabilities of LPD; Sadmin and mountd ; Default SNMP string. 4.2 Internet attacks statistics 4.5 Figure 4.1 shows the the security incidents reported to KISAInternet worms that affected Korean networks in 2001, by month. Figure 4.1: Internet worms in Korea in 2001 Counts per month  Source: Case study research 4.6 Figure 4.12, showing the security incidents reported to KISA in 2001, includes statistics for the Sadmin/IIS worm in March, Code Red I in July and Code RedII in September 2001. By the end of 2001, security breach reports fell as many enterprises were better prepared to prevent attacks. However, in the longer term, the increase over time is evident. Table 4.1 shows the number of sites reporting incidents between 1996 and 2001. Figure 4.12: The mMonthly statistics of security incidents reported to KISA in 2001  Source: KISA. Table 4. 1 The number of affected sites between 1996 and 2001 199619971998199920002001AC.KR953280262260554CO.KR4625692488182509OR.KR22318663RE.KR03411311{geo}.KR000048225Other422338081,971Total1476415857219435333 Note: The reason why other has the highest number is because that category includes personal computers. Source: KISA. 4.7 Table 4.2 illustrates the need for security incidents to be dealt with by an international security incident response team. 4.8 Table 4.3 shows which countries are connected to the security incidents. Table 4.4 shows the intrusion statistics by style of attack. Table 4.5 shows the impact and outcome of security incidents in 2001. Table 4.6 shows the intrusion statistics since 1996. As shown in that table, incidents increased almost every year. The reasons for this increase were probably: The vast increase in the number of Internet users; The extension of the boundaries and limits of technical capabilities. Table 4.2: International security incidents Direction of attack Domestic Attacks launched from Korea Attacks from abroad Direction of attack not known Total Direct Indirect Number 285 175 289 408 4351 5508 % 5.1% 3.2% 5.3% 7.4% 79.0% 100% Table 4.4: Attacks broken down by supposed place of origin Economy Number Economy Number Australia 600 Italy 1 Austria 7 Japan 615 Brazil 310 Malaysia 76 Canada 21 Netherlands 24 Chile 1 Poland 30 United Kingdom 107 Slovenia 3 France 707 Spain 5 Germany 220 Thailand 61 Hong Kong SAR 1 USA 51 Table 4-.5: Breakdown of intrusions by type Classification Numbers Remarks Impersonation 299 Sniffer, Ppassword Crackercracker S/W Security Bugbug 150 IIS Unicode Buffer Overflowoverflow 323 popd, imapd, mountd, named, amd, ftpd, rpc.statd & automountd, rpc.ttdbserver, rpc.cmsd, RPC Configuration Errorerror 17 System Configuration configuration Errorerror Malicious Codescodes 1571 Back OrificeOrifice, NetBus, rootkit, Backdoorbackdoor, worm Protocol Errorerror 1 IP Spoofingspoofing, Session session Hijackinghijacking DOS 57 carko, syn flood Attacks with Emaile-mail 64 Mail Relayrelay, Mail mail Bombbomb, Spamspam Scan pProbe 2853 Port Scanscan, Network network scan Social eEngineering 4 Source: KISA. 4.3 Computer Virus virus Aattacks Table 4.6: Breakdown of intrusions by outcome Impact Number Remarks Scan Probe 3664 Scan Compromised 1240 Gained access to root Disclosure 7 Disclosure of information Data Removal 59 Removal of log files Unauthorized Access 86 Unauthorized access to the system or files Homepage Defaced 212 Homepage replaced System interruption 2 System down System Bug 5 System non-operational DOS 58 DoS Attack attack Table 4.7: Intrusion Statistics statistics - Changes since 1996 Year 96 97 98 99 00 01 Counts 147 64 158 572 1943 5333 % growth n.a. -44% 147% 262% 240% 174% Source: KISA 4.9 In 2001, many numerous foreign viruses attacked Koreas networks. Worm viruses like Nimda and SirCam were attached to e-mails and spread quicklyrapidly. Table 4.7 shows the numerous may viruses found in Korea. This type of data is an example of the kind of information that can be helpful to many anti-virus companies, such as including Ahn-Lab, Hauri, Symantech Korea, Micro Trend Korea. Table 4.78: Computer Viruses viruses in 2001 RankComputer VirusvirusTypeTotal1Win32/NimdaI-Worm166652Win32/Sircam.wormI-Worm122163Win32/Funlove.4099Win32113724I-Worm/WininitTrojan28275W32/CIHWin9527056Win32/Nimda.DI-Worm22057I-Worm/HybridsI-Worm17548I-Worm/Hybrid.SpiralI-Worm11909W32/WeirdWin32118710I-Worm/NavidadI-Worm1127other11,785Total65033 4.10 The data above is also illustrated in the Figures 4.2 3 and 4.34. Figure 4.23: Computer viruses found in 2001  EMBED Excel.Chart.8 \s  Source: KISA. Figure 4.24: Computer viruses by type since 1999  EMBED Excel.Chart.8 \s  Source: KISA. Key Initiatives initiatives to Protect protect Critical critical Network network Iinfrastructures 5.1 Act of Information and Telecommunication Infrastructure Protection Act 5.1.1 Overview 5.1 Information and telecommunication infrastructure protection began with a review of the current situation of virus and hacking incidents, and how these result in serious problems and damage when this infrastructure supports the underlying systems of the social infrastructure. 5.2 In Korea, national government administration, national finance, national emergency services, national telecommunication and national transport were are among the key areas of national security for the Iinformation society. These are the systems that are most at risk of successful Internet intrusion and virus attacks. If such attacks against critical infrastructures brought succeed in bringing public services to a halt, then the result would be widespread economic and social disorder would result. The, with a high cost of recovery would be great. 5.3 The Telecommunication Infrastructure Protection Committee, a subsidiary of the office of the prime Prime ministerMinister, was set up to organize a pan-governmental response mechanism to these attacks. The committee Committee is comprised of the prime Prime minister Minister and chief officer of each department, such asincluding the Ministry of government Government administration Administration and home Home affairsAffairs, the Ministry of Sscience and& Ttechnology, the Ministry of finance Finance and economyEconomy, the Ministry of foreign Foreign affairs Affairs and tradeTrade, the Ministry of justiceJustice, the Ministry of national National defenseDefense, the Ministry of information Information and communicationCommunication, the Ministry of commerceCommerce, industry Industry and energyEnergy, the Ministry of construction Construction and transportationTransportation, the national intelligence service, financial supervisory service, etcetc. The Committee is chaired by the Prime Minister chairs the committee. 5.4 The Chairman of the Ministry of information Information and Ccommunication is responsible for a sub-committee, the Telecommunication Infrastructure Protection working group. This working group is comprised of the viceVice-Mminister of each ministry. 5.5 The The aim of the work of the Joint Working Group for Security Incident Responses work i is to prevent the spread of incidents, to help trace attackers and to restore security. 5.1.2 Designation of Critical critical Infrastructure infrastructures 5.6 How canWhat processes and criteria are used to define social facilities, including facilities of the private sector, be defined as a critical information infrastructureinfrastructures? Examples of these critical information infrastructures include subways, airports, power plants, broadcasting facilities, national research centres, and so on. Each administrative organization selects these facilities as a critical information infrastructure according to a base line such as the national importance of the facility, the level of dependency toon the specific facility, and the potential impact of an incident, were such an incident to occur, if it occurs. Examples of these critical information infrastructures include, inter alia, subways, airports, power plants, broadcasting facilities, national research centres. 5.7 Each administrative organization will establishes protection guidelines, and recommends that other organizations observe these guidelines. Each sub-organization of the administration then carries out their its vulnerability analysis and assessment, establishes their its protection plan, and reports to the administrative organization. A protection plan might include: The result and assessment of the Protection protection plan deployed; Comparisons with the previous year; A prevention plan against incidents; An incident response and recovery plan; The protection plan for the next year. 5.8 Furthermore, each executive organization should must appraise the threat of electronic infringement that can destroy the confidentiality and integrity of the information related to the operation of the critical information infrastructure. KISA (Korea Information Security Agency), ISAC (Information Sharing and Analysis Center), the Designated Information Security Company, and ETRI support these assessment activities. Organizations responsible for designated critical information infrastructures should have to do carry out their vulnerability analysis and assessment once within six months, every second year. The steps for vulnerability analysis and assessment are: Organize Establishment of a working group, establish vulnerability analysis and an assessment plan; Selection of the object that will be analyzedsubject for analysis; Threat and vulnerability analysis; Re-examine examination of the existing protection plan, and appraise appraisal of vulnerability; Establishment of a new protection plan. 5.9 The following are examples of security incidents: Unauthorized persons could accesswho access the major infrastructure or authorized persons could who manipulate, crack, conceal and outsource; The use of malicious programs like computer viruses and others to crack data and to disrupt the operation of the critical infrastructure; The use of control messages or inaccurate commands to interfere with the operation of the critical infrastructure. 5.10 All kinds of sSecurity incidents of any kind may use malicious codes to distribute, install, and execute computer viruses, Trojan horses, worms, back doors and attack scripts. Critical infrastructure systems can be totally disrupted by such attacks. Heads of administrative organizations therefore need to establish protection plans, and to encourage other related relevant organizations to adhere to this planthem. This The protection plans should must also contain security management guidelines, operational guidelines, vulnerability assessment guidelines, security incident prevention, and a response and recovery plan. 5.11 If organizations experience any kind of security incident, they should must report this incident to one of the relevant administrative organizations, such as KISA, or a law enforcement organization. If the incident is considered critical, then a protection/prevention working group needs tomust be established to prevent the incident from spreading. 5.1.3 ISAC and Special special Security security Companies companies 5.12 The ISAC (Information Sharing and Analysis Centre), whose role is to analysze the security incidents and report to the related relevant organizations, is the system for prevention, detection and response against security incidents. One useful approach for government might be to establish further ISACs, such as a financial ISAC, a communication ISAC, etc. Ideally, each ISAC should: Have at least 15 staff; Have a budget of at least 2 million won; Be capable of secure information management; Establish and observe information security management rules. 5.13 Other special information security companies may be used for testing and analyzinganalysing. As it becomes increasingly difficult for each organization to ensure protection of its critical information infrastructures by itselfon its own, a national information security company could bemay be designated to work forapply the critical information protection plan. The requirements for such a special information security company might beare that it should: Have at least 15 experts; on Have a budget of more than 2 million won; Own their its identification and access control system. As of November 2001, nine companies were registered as Special special Information information Ssecurity Companycompanies. 5.1.4 The penalty 5.14 The following illegal acts under this law should beare punishable as follows: Anyone who disrupts or damages the critical infrastructure with intrusion and computer viruses can be punished with a one hundred million won fine or 10 years imprisonment. Anyone working in the organizations who evaluates the vulnerabilities, report and recovery against security incidents and reveals any information about its its role may receive at least 5 years imprisonment or 10 years qualification suspension, or a 50 thousand won fine. 5.15 The following illegal acts might are also be punishable by fines: If a managerial office doesnt follow the instructionssentence from a government office, they it could may receive a 10 thousand won fine. If the ISAC doesnt report within 30 days on its role being started implemented or updated, they it could may receive a 10 thousand won fine. If the Special special Information information Security security Company company fails to report within 30 days any breaks, discontinuation or resumption of their role, they, it may could receive a 10 thousand won fine. If the Special special Information information Security security Ccompany doesnt fails to report, or falsely reports, information at the request of the MIC, they it maycould receive a 10 thousand won fine. If the Special special Information information Security security Company company fails to return any materials related to vulnerabilities assessment and analysis to the managerial office once the SISCs role has been cancelled or abolished, they couldit may receive a 10 thousand won fine. 5.1.5 How to configure determine critical infrastructures 5.16 Any related relevant government body can designateanalyse their its network infrastructure in terms of itsas critical characteristics, by understanding their its own business and organizational strategic demands. Usually, this would be carried out as a business unit, perhaps byby visualization assessing the the organizationss structure at the vertically and and horizontally level. Vertical Level level aAnalysis: All businesses could can be analyzed analysed in the form of a hierarchyhierarchically, which distinguishinges between upper- level and lower- level activities. Horizontal Level level aAnalysis: All businesses are treated at the same level, according to their domainstheir field of activity. The details could can be identifieddecided by reviewing the following issuesconsidering the following issues: If a particular infrastructure has a nationwide control and management system, information system or, communication system, then it may be considered critical. Theis analysis could be based on a review of the vulnerabilityies analysis, a protection report, an economic aspects and other responsibilities. An analysis could be based on the consequences of suffering an electrical brownout. Electrical An assessment can be made of whether the electrical control and management system, MIS and communication systems are physically connected, or whether these are not physically connected. Electrical control and management system, MIS and communication systems are not physically connected. Table 5.1: Criteria for determining Critical critical Infrastructureinfrastructure AreaMajor ItemsitemsRemarksElectrical Control control and ManagementmanagementEnergy production and Distributiondistribution Aviation Official Regulation System Port Management System Communication Network Management Failure of these systems could be fatal for social environment services.Information SystemsManagement Information System Rail Road Reservation System Citizen Information Management National Tax Management Excluding systems used only within organizations. Communication Systems Switches, Routers and other Communications Facilities: Excluding systems that are regulated under other laws. 5.1.6 Likelihood of security intrusion 5.17 The possibilities of security incidents affecting critical infrastructures are illustrated in Table 5.2. 5.2 Reviewing the critical networks 5.2.1 General administration networks 5.18 The general administration networks are the largest computer networks comprising government and citizen information services networks, and interconnecting 77 governmental organizations. Within these networks, the sheer number of services means that security incidents can have a huge impact. Examples of such services are electronic documents interchange, national tax system, real estate, citizen and diplomacy information flows with citizens private information. 5.19 The general administration networks, comprising shared networks and general tax services, general citizen, foreign affairs and real estate networks, should all be considered as critical infrastructures. General administration networks also maintain national territory administration that interconnects the central and local authorities. All 16 cities and local authorities, 232 Kun and Ku, 3511 Eup, Myun and Dong are connected. 5.20 Regional government networks should also be considered as critical infrastructures. Table 5.-2: The likelihood of security incidents affecting Critical critical Infrastructuresinfrastructures Area Possible security incidents Energy, Gas The central control systems are more secure than others because they may be using dedicated leased lines, without any connection to others in outside networks. The vVulnerability could increase if the central control systems are connected with general networks. Remote control systems in the general and production system could be vulnerable because that system uses generic system software, or if is connected to the general systems. RailroadRailway, Airplane, Port The intrusions from outside networks could be easier because these systems are, in general, migrating from being closed to open networks. They may be more vulnerable if they use mobile or other frequency- based networks. Financial Generally, financial systems operate via leased lines and have good security. But However, foreign attacks could be mounted via global telecommunication systems, especially in areas such as Internet banking and commercial operations. Telecom The switching systems and carrier line systems could should not be easily attackeded. Intranet and Internet- based commercial networks could be attacked relatively easily and voice frequency networks could be vulnerable to frequency interference. General Admin. The government is trying to set up electronic government, so they may become more vulnerable to Internet attacks  Diplomatic Networks networks 5.21 Diplomatic networks are interconnected between the Ministry of foreign Foreign Aaffairs, the Ministry of national National Ddefense and the national intelligence service, in order to share foreign affairs information. This diplomatic network should be considered as critical infrastructure. Other systems, dealt with in the section below, should, also however, not be overlooked as a critical infrastructures:. 5.2.3 National Health health and Annuity annuity Networks networks 5.22 The National Citizen Health Security Information System is operated by its own managerial organization. It interconnects the 6 central and local departments and 235 agencies via high-speed networks using leased communication links. It should be considered a critical infrastructure because any security problems, for instance for qualification management for all citizens, the details of medical examinations and medical fee management, could cause deep significant problems. 5.23 National Annuity annuity Systems systems are managed run by their own managerial organizations. It They interconnects via high-speed networks and LANs in order to maintain the subscriber information management, annuity decision and collection and , annuity fee provision. National citizen health networks may also be considered critical infrastructures because some security incidents could result in the over- estimation of annuities or iny, nonpayments of provision. 5.2.4 Communication and Networks networks 5.25 Telecommunications use the Public Switched Telephone Network (PSTN) for voice communication and Public Switched Data Networks (PSDN) for Internet services. The detail of national backbone, switching systems and user systems is described below. 5.26 The PSDN is growing fast because owing to the rapid upgrading of Internet services, national administration services, company information, logistics and financing services are rapidly being upgraded. So ifThis means that if security problems affect the PSDN system has security problems, the this will have rapid repercussions for the overall national infrastructure will be rapidly affected. 5.27 The PSTN system has beenis a basic national service provided to the population for society. The PSTN has not seen many problems because as the switching devices and trunk systems are not revealed visible to the general publicsociety at large. Regional level security coordination 5.28 Nowadays, many virus and hacking codes, including worm attacks, have the following features: Stealth; Importability, platform independent; Polymorphism, dynamic update; Special mission; International scope. 5.29 With the Code Red, Nimda and other worm attacks in 2001, Korea had the highest rate of compromise, insofar as these attacks could be classified by country, as shown in Table 5.1. Table 5.1: Internet worm attacks that compromised security, ranked worldwide, 2001  EMBED PBrush  5.30 Such worm attacks could cause international damage very quickly. In an effort to address this threat, the Asia Pacific Security Incident Response Coordination (APSIRC) was held by Japans Computer Emergency Response Team Coordination Center (JPCERT/CC) in February 2002. Most Asian countries, including Australia, China, Hong Kong, China, India, Indonesia, Japan, Korea, Malaysia, Singapore, Taiwan, Province of China, and Vietnam were invited with the support of funds from Japan. At this conference, all countries presented their activities and shared information. In particular, the conference decided that AUSCERT of Australia would be in charge of the APSIRC task force team. Conclusion and possible areas for further studiesConclusion and possible areas for further study 6.1 Overview 6.1 The MIC of Korea approved initiated the Act of Iinformation and Ttelecommunication iInfrastructure protection Protection Act in 2001. This law will apply to the overall society nationwide in 2002. But if this law is to be applied without any problems, the supporting organizations like such as KISA, ETRI and special security company,companies would need to develop the capability to evaluate the vulnerabilities of a particular critical infrastructure site. To doTo this end, KISA and ETRI have studied thebeen studying possible methodologies among themselves. 6.2 For this to works, it is necessary to set up a nationwide information security management system (ISMS) needs to be established. KISA is trying to launch an evaluation process to assess the requirements. Moreover, KISA is also evaluating security requirements for an Internet data center centre (IDC). 6.2 Integrated National Information Security System, under construction 6.3 In the "e-KOREA Vision 2006" promoted by the government, implementation of a small-scale and efficient "SMART Government" is projected. The Ministry of National Defense is aware of the dangers that cyber- terrorism poses for the National Defensive Force, and is moving ahead with the "Information Security System Construction Project" to provide an efficient effective response to hacking or virusesvirus attacks. 6.4 As the integration of private, public and state organs accelerates, in line with the growth of the Internet, it is necessary to readjust current thinking amongst the relevant parties. One step is the establishment of GISAC (Government Information Sharing and Analysis Center), which will act as a cyber terror control centreer for the National Network. 6.5 The events terrorist attacks of 11 September 11 2001 in the United States have heightened awareness of the need to invest in disaster recovery and to prepare ahave prepared responses to this type ofey type of terror campaign waged against the United States. The In the US, Congress is pressing ahead with establishing a "Hi-tech SWAT" team for preventing cyber terror. 6.2.1 National Level level cConstruction 6.6 For the efficient and strong promotion of Integrated Information Security Management System by government, the establishment of an Information Communication CSO (Chief Security Officer), directly reporting to the President, is necessary. For rapid response to cyber terror, the operation of what is might tentatively be called a "CT Emergency Response Team" is necessary. 6.2.2 Integrated Security security Management management System system Construction 6.7 For the protection of Financefinance, Constructionconstruction, Administrationadministration, Information information Communication communication Network networks and the Nnational dDefencse nNetwork, thesis ofa mutually cooperative Integrated integrated Security security Management management System system is neededneeds to be developed. 6.8 For the efficient and systematic operation of Information information sSecurity, a National Information Security Management Standard Modelmodel, followed by a Information Security Management Standard, is necessary. 6.2.3 Operation of National national cCyber tTerror mMonitoring Room 6.9 For rapid response to current and future security alarms, the operation of a provisionally named "National Cyber Terror Monitoring RoomCell" is needed. Thise will involve creation of a system of Privateprivate, Government government and Forces forces Cooperation cooperationSystem , and an International international Cooperation cooperation Systemsystem 6.2.4 Training in Mock mock cCyber tTerror rResponse" and enforcement by each sector 6.10 Under the aegis of the central Ministry of Information & and Communication, Korea Information Security Agency and Virus Consult and Support Center, it is necessary to create a mutually cooperative system to anticipate security threats for both the public and private domains. 6.11 Cooperation with relevant agencies, like CONCERT or the Information Security Enterprise, is well advanced. As the operation of major society infrastructure is generally under private management in an advanced country like Korea, an agency for major information communication infrastructure operation is needed for each sector of the economy: e.g., Financefinance, Communicationcommunication, Transportationtransportation, Energy energy, etc; and a government agency is needed to provide better cooperation for incident-handling 6.12 As in the USA, the emphasis is now on the creation of a system of private sector and government co-operations for the protection of major information communication infrastructure (PDD63), and on guidelines and support for the establishment of private ISAC (seven ISACs are now operational or are preparing in preparation). 6.2.5 Strengthening Private private rResponse sSystems 6.13 Strengthening communication and cooperation between the private sector and government will involve:. Preparation of secure operations and management system for shared information by private sector and the government. Private/public cooperation, to increase the ability to rapidly detect cyber attacks and enact emergency responses. As operating major information communication infrastructure is under private management, the Information Security Consultation Organization consists of CEOs of private agencies. Organize and operate a forum for increasing private/public cooperation and raising cooperative response ability. 6.3 Establishing common criteria for evaluating security products 6.3.1 Summary 6.14 It is urgent to establish aA plan is urgently required for estimating the response management plan in the case of cyber-terrorism and countermeasures. Existing countermeasures are insufficient in the light of constantly increasing attacks against the vulnerabilities of information systems. 6.15 Furthermore, it is necessary to establish international common international criteria, and that they bewhich are globally accepted, for the purpose of building confidence in the reliability of security products. This will require the creation of an evaluation method regarding the level of information security for the development of next- generation information security systems. It will also require the setting up of an information security evaluation system and a certification agency to evaluate numerous information security systems in a timely manner. 6.3.2 Status 6.16 The United States and other advanced developed Statesstates have warned against the threat of cyber- terrorism, and have established countermeasures. As the needs for mutual recognition of certification schemes between countries has increased, common criteria that can be used to evaluate various information security systems have been developed as an ISO/IEC standard. 6.3.3 Administrative tasks 6.17 It is necessary to evaluate the management of responses against to cyber- terrorism. This will require classifying the information communication network and the level of protection according to the following criteria: Risk analysis on the national defence network and information super high way; Classify the importance of the each infrastructure;. Establish the level of protection ofn various information communication networks for the purpose of protecting against information warfare;. Establish Evaluation evaluation Criteria criteria for evaluating the level of response management against cyber- terrorism. Table 6.-1: Cyber Terror terror Levellevel AttackersTargetLevel of DamageClassificationIndividual (Hacker)PCIndividual privacy, property lossDOrganization (Terrorist, Crime Org) Enterprise Networknetwork, Financial network, Power infra. Medical info Networknetwork, National geography, Information system, etcDamage on enterprise, Public losses (damage on the public)CNational commerce loss, Damage public organization (loss to national economy)BCountryNational defense network, Foreign affair network, Public peace networkDamage on the important national facilityASource: Case study research. 6.18 It is necessary to update tThe IT Product product eEvaluation cCriteria will need to be updated by: Increasinge the capability for evaluating more IT products, and developing suitable evaluation methods for next -generation information security systems;. Developing automatic evaluation sSoftware; Establishing a certificatione mechanism based on CC.; Establishing information security system evaluation and certification centres.; Promotinge private evaluation centres. Annex 1: References MIC, Act of the information and telecommunication infrastructure protection guide, Nov 2001 NCA, 2002 Korea Internet White Paper, Feb 2002-05-12 MIC, The White Paper of Information and Telecommunication, Nov 2001 Center for Security Studies and Conflict Research, Swiss Federal Institute of Technology, The International Critical Infrastructure Protection Handbook, Nov 2001 KISA, The form of constructing the act of Information and Telecommunication Infrastructure Protection, July 2000 KISA, The forum of constructing the performance of the act of Information and Telecommunication Infrastructure Protection, Mar 2001 KISA, The Forum of How to follow up the act of Information and Telecommunication Infrastructure Protection, July 2001 KISA, 2001 The Survey of the Information System Hacking and Virus, Dec 2001. KISA, The Survey of the Information Security Related Laws , Oct 2001 KISA, The Guidelines of the Response against Hacking and Virus Attack in the season of World Cup Event, Mar 2002-05-12 The Cyber Monitoring, 2001 White paper of Korea Cyber Crime, Dec 2001 Abor Networks, A Snapshot of Global Internet Worm Activity, Nov 2001  HYPERLINK "http://www.gcc.go.kr" http://www.gcc.go.kr  HYPERLINK "http://www.kftc.or.kr/" http://www.kftc.or.kr/  HYPERLINK "http://www.fss.or.kr/" http://www.fss.or.kr/  HYPERLINK "http://www.mnd.go.kr/" http://www.mnd.go.kr/  HYPERLINK "http://www.nhic.or.kr/" http://www.nhic.or.kr/  HYPERLINK "http://www.mohw.go.kr/" http://www.mohw.go.kr/  HYPERLINK "http://www.moct.go.kr/" http://www.moct.go.kr/  Data from ITU World Telecommunication Development Report 2002: Reinventing Telecoms, available at www.itu.int/ti.  Source: ITU World Telecommunication Indicators Database, available at: www.itu.int/ti.  For the latest data, see the: Ministry of Information and Communication website at: http://www. mic.go.kr  Creating trust in critical network infrastructures: Korean case study  PAGE 5/ NUMPAGES 27282826 INTERNATIONAL TELECOMMUNICATION UNIONITU WORKSHOP ON CREATING TRUST IN CRITICAL NETWORK INFRASTRUCTURESDocument: CNI/05 20 May 2002  Seoul, Republic of Korea 20 - 22 May 2002 8?JU_et!@_` ؕ؎}aJ jUaJ PJnHtH cHdhe0JQB*^JphjUPJcHdhenHo(tH>*6] Hhe HhWF 0JQB*phjU jU HhWFPJnHo(tHmH sH  nHo(tH5CJ mH sH .8JKLMNOPQRSU @&^C$$a$<02P3    # $ ٽqX?X1Hh̺e5CJOJQJW̺emHnHu1Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu*j5CJOJQJUW̺enHtH.Hhڳef5CJOJQJW̺enHtH7jHhڳef5CJOJQJUW̺enHtH5CJOJQJW̺e 5\aJ&5CJPJ\cHdh$enHo(tH $ % & 7 8 9 Q R S T U V ٻfL3f0j5CJOJQJUW̺emHnHu3j5CJOJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu5Hh̺e0JQ5OJQJW̺eaJmHnHu:jHh̺e0JQ5OJQJUW̺emHnHuLjXHh̺e5>*B*CJOJQJUW̺emHnHphu W l"J. p% C$Eƀ̺eJ- % C$Eƀ̺eH- % C$Eƀ̺eV W X Y s t u v x y ǮnSS84Hh̺e5CJOJQJW̺emHnHu5Hh̺e0JQ5OJQJW̺eaJmHnHuLjJHh̺e5>*B*CJOJQJUW̺emHnHphu1Hh̺e5CJOJQJW̺emHnHu1Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu ūtY:4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu:jHh̺e0JQ5OJQJUW̺emHnHu0j5CJOJQJUW̺emHnHu3j5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu ʢgFg*6j:;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHuOj<Hh̺e:;>*B*CJOJQJUW̺emHnHphu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu    ɨnP771Hh̺e5CJOJQJW̺emHnHu1Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu    ! 7 8 9 Q R ٻjKj13j5CJOJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu5Hh̺e0JQ5OJQJW̺eaJmHnHu:jHh̺e0JQ5OJQJUW̺emHnHuLj.Hh̺e5>*B*CJOJQJUW̺emHnHphu R S T U V W X Y s t ̭tU::4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu:jHh̺e0JQ5OJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu0j5CJOJQJUW̺emHnHu W { d 6}kkkkkkkkkJ. p% C$Eƀ̺eJ- % C$Eƀ̺e t u v y z ׸eI(I@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHu=jHh̺e0JQ:;OJQJUW̺emHnHuOj Hh̺e:;>*B*CJOJQJUW̺emHnHphu ʮnSn8S84Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu6j:;CJOJQJUW̺emHnHu   ׸fEf)6j:;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHuOjHh̺e:;>*B*CJOJQJUW̺emHnHphu     & ' ɨnP771Hh̺e5CJOJQJW̺emHnHu1Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu ' ( ) + , [ \ ] u v ٻjKj13j}5CJOJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu5Hh̺e0JQ5OJQJW̺eaJmHnHu:jHh̺e0JQ5OJQJUW̺emHnHuLjHh̺e5>*B*CJOJQJUW̺emHnHphu v w x y z { | } ̭tU::4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu:jHh̺e0JQ5OJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu0j5CJOJQJUW̺emHnHu ׸eI(I@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHu=jHh̺e0JQ:;OJQJUW̺emHnHuOjHh̺e:;>*B*CJOJQJUW̺emHnHphu   ʮnSn8S84Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu6jo:;CJOJQJUW̺emHnHu    D E F ^ _ ׸fEf)6ja :;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHuOjHh̺e:;>*B*CJOJQJUW̺emHnHphu _ ` a b c d e f ɨnSnS+SOj Hh̺e:;>*B*CJOJQJUW̺emHnHphu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu ȭpT:p3j:;CJOJQJUW̺emHnHu6jS :;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHu /0ŪŪfEf)6jE :;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHuOj Hh̺e:;>*B*CJOJQJUW̺emHnHphu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu01345678RSɨnP771Hh̺e5CJOJQJW̺emHnHu1Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu STUWXٻjKj13j7 5CJOJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu5Hh̺e0JQ5OJQJW̺eaJmHnHu:jHh̺e0JQ5OJQJUW̺emHnHuLj Hh̺e5>*B*CJOJQJUW̺emHnHphu ̭tU::4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu:jHh̺e0JQ5OJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu0j5CJOJQJUW̺emHnHu ׸fEf)6j) :;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHuOj Hh̺e:;>*B*CJOJQJUW̺emHnHphu  !;<=>AB\]^ɨnSnS+SnSɨOj Hh̺e:;>*B*CJOJQJUW̺emHnHphu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu^vwxz{|}~ǭmRm7R74Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu3j:;CJOJQJUW̺emHnHu6j:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu ׸fEf)6j :;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHuOjHh̺e:;>*B*CJOJQJUW̺emHnHphu ɨnP771Hh̺e5CJOJQJW̺emHnHu1Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu 456NOٻjKj13j5CJOJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu5Hh̺e0JQ5OJQJW̺eaJmHnHu:jHh̺e0JQ5OJQJUW̺emHnHuLjHh̺e5>*B*CJOJQJUW̺emHnHphu OPRSTUVWqr̭tU::4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu:jHh̺e0JQ5OJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu0j5CJOJQJUW̺emHnHu U;aikkkkkkJ. p% C$Eƀ̺eJ- % C$Eƀ̺erstwx׸fEf)6j:;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHuOjxHh̺e:;>*B*CJOJQJUW̺emHnHphu ɨnSnS+OjjHh̺e:;>*B*CJOJQJUW̺emHnHphu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu 45689㭑pT:p3j:;CJOJQJUW̺emHnHu6j:;CJOJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHu 9:;<=WXYZ]^_ŪeeI(I@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHuOj\Hh̺e:;>*B*CJOJQJUW̺emHnHphu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHuʮnS51Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu6j:;CJOJQJUW̺emHnHuͦmRm74Hh̺e5CJOJQJW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu5Hh̺e0JQ5OJQJW̺eaJmHnHu:jHh̺e0JQ5OJQJUW̺emHnHuLjNHh̺e5>*B*CJOJQJUW̺emHnHphu1Hh̺e0JQ5OJQJW̺emHnHu1Hh̺e5CJOJQJW̺emHnHuūtY:4Hh̺e0JQ:;OJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu4Hh̺e5CJOJQJW̺e\mHnHu:jHh̺e0JQ5OJQJUW̺emHnHu0j5CJOJQJUW̺emHnHu3j5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu 1234578@ABZʢfJ)J@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHu=jHh̺e0JQ:;OJQJUW̺emHnHuOj@Hh̺e:;>*B*CJOJQJUW̺emHnHphu4Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu Z[\^_`abc}~ʮnSn8S84Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu6j:;CJOJQJUW̺emHnHu ~׸eI(I@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHu=jHh̺e0JQ:;OJQJUW̺emHnHuOj2Hh̺e:;>*B*CJOJQJUW̺emHnHphu ʮnSn8S84Hh̺e0JQ:;OJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu6j:;CJOJQJUW̺emHnHu   HIJb׸eI(I@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu4Hh̺e0JQ:;OJQJW̺emHnHu8Hh̺e0JQ:;OJQJW̺emHnHtHu=jHh̺e0JQ:;OJQJUW̺emHnHuOj$Hh̺e:;>*B*CJOJQJUW̺emHnHphu bcdfghijkʮnS51Hh̺e0JQ5OJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHu4Hh̺e:;CJOJQJW̺emHnHu=jHh̺e0JQ:;OJQJUW̺emHnHu@jHh̺e:;CJOJQJUW̺emHnHu7Hh̺e:;CJOJQJW̺emHnHu3j:;CJOJQJUW̺emHnHu6j:;CJOJQJUW̺emHnHukͦmNm40j5CJOJQJUW̺emHnHu3j5CJOJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu:jHh̺e0JQ5OJQJUW̺emHnHuLjHh̺e5>*B*CJOJQJUW̺emHnHphu1Hh̺e0JQ5OJQJW̺emHnHu1Hh̺e5CJOJQJW̺emHnHu ƨqaVaC4'4cHdhسefmHnHu0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHucHdhسefnHtHjUcHdhسefnHtH7jHhڳef5CJOJQJUW̺enHtH4Hh̺e5CJOJQJW̺e\mHnHu:jHh̺e0JQ5OJQJUW̺emHnHu=jHh̺e5CJOJQJUW̺emHnHu4Hh̺e5CJOJQJW̺emHnHu i"|5iH8X\'- % . p% -H- % C$Eƀ̺e !"#$>?@ADwҬh[hAh3j>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu'jUcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu)5;CJ\cHdhسefmHnHsH u 0JQaJcHdhسefmHnHu%j0JQUcHdhسefmHnHu3j>*B*UcHdhسefmHnHphuDE\]^vwxyz{|}~нЩнމo^I^н)5;CJ\cHdhسefmHnHsH u 0JQaJcHdhسefmHnHu3j>*B*UcHdhسefmHnHphucHdhسefmHnHu%j0JQUcHdhسefmHnHu'jsUcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu0JQcHdhسefmHnHu#:CJcHdhسefmHnHsH u/01طl[I5'jWUcHdhسefmHnHu#:CJcHdhسefmHnHsH u 0JQcHdhسefmHnHtHu3j>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu)5;CJ\cHdhسefmHnHsH u%j0JQUcHdhسefmHnHucHdhسefmHnHu$jUcHdhسefmHnHu'jeUcHdhسefmHnHu1234567QRSTWXjkl˹˪˪o˹˪U3j>*B*UcHdhسefmHnHphu'jIUcHdhسefmHnHu3j>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu#:CJcHdhسefmHnHsH u%j0JQUcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHuIJ̹̥̹ڒv\K9#:CJcHdhسefmHnHsH u 0JQcHdhسefmHnHtHu3j>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHu'j;UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu)5;CJ\cHdhسefmHnHsH u 0JQaJcHdhسefmHnHuJKcdefghijkp\'jUcHdhسefmHnHu3j>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu#:CJcHdhسefmHnHsH u%j0JQUcHdhسefmHnHu'j-UcHdhسefmHnHucHdhسefmHnHu$jUcHdhسefmHnHu()*BCDEFGHIJde{g{{ҜXKXcHdhسefmHnHu0JQcHdhسefmHnHu'j UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu#:CJcHdhسefmHnHsH u$0JQcHdhسefmHnHsH tHu 0JQcHdhسefmHnHsH u%j0JQUcHdhسefmHnHu3j>*B*UcHdhسefmHnHphuefgjkñã|ұoUD 0JQaJcHdhسefmHnHu3j|!>*B*UcHdhسefmHnHphucHdhسefmHnHu'j!UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu#:CJcHdhسefmHnHsH u0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHu3j >*B*UcHdhسefmHnHphu12356789:TUVWZ[~˸ˤ˸ꑂu[I˸#:CJcHdhسefmHnHsH u3jn">*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHu'j!UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu 0JQaJcHdhسefmHnHu)5;CJ\cHdhسefmHnHsH uطo[ط'j#UcHdhسefmHnHu3j`#>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu#:CJcHdhسefmHnHsH u%j0JQUcHdhسefmHnHucHdhسefmHnHu$jUcHdhسefmHnHu'j"UcHdhسefmHnHu !789QRSUVWXYZtuvwyñã|ұoUD 0JQaJcHdhسefmHnHu3jD%>*B*UcHdhسefmHnHphucHdhسefmHnHu'j$UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu#:CJcHdhسefmHnHsH u0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHu3jR$>*B*UcHdhسefmHnHphuyz;<=U˸ˤ˸ꑂu[I˸#:CJcHdhسefmHnHsH u3j6&>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHu'j%UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu 0JQaJcHdhسefmHnHu)5;CJ\cHdhسefmHnHsH uUVWYZ[\]^xyz{~طo^^Jط'j'UcHdhسefmHnHu 0JQcHdhسefmHnHtHu3j('>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu#:CJcHdhسefmHnHsH u%j0JQUcHdhسefmHnHucHdhسefmHnHu$jUcHdhسefmHnHu'j&UcHdhسefmHnHu !"$%&'()CDEFij񓀓lġ_E3j )>*B*UcHdhسefmHnHphucHdhسefmHnHu'j(UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu#:CJcHdhسefmHnHsH u 0JQcHdhسefmHnHtHu%j0JQUcHdhسefmHnHu3j(>*B*UcHdhسefmHnHphu0JQcHdhسefmHnHuFHIz{|̹̥̹ڒv\K9#:CJcHdhسefmHnHsH u 0JQcHdhسefmHnHtHu3j)>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHu'j)UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu)5;CJ\cHdhسefmHnHsH u 0JQaJcHdhسefmHnHu'nV@ d!$""L & F1$4$7$8$EƀͲef+. p% - %   MNOghiklmn޷o^J޷'ji+UcHdhسefmHnHu 0JQcHdhسefmHnHtHu3j*>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu#:CJcHdhسefmHnHsH u%j0JQUcHdhسefmHnHu'jw*UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHunop!ݶݓ݅r^rrNIFCaJCJnHtHjUcHdhسefnHtH'j[,UcHdhسefmHnHu$jUcHdhسefmHnHucHdhسefmHnHu#:CJcHdhسefmHnHsH u 0JQcHdhسefmHnHtHu3j+>*B*UcHdhسefmHnHphucHdhسefmHnHu0JQcHdhسefmHnHu%j0JQUcHdhسefmHnHu!!"" "!"""########$ $$d$e$f$g$$$$$$$$$$$ʴqqqjccjZHheaJ Hhزef cHdhزef!HhײefaJmH nH sH tH !aJcHdhײefmH nH sH tH aJmH nH sH tH *B*CJOJQJ^JaJcHdhײefph*HhײefB*CJOJQJ^JaJphCJOJQJ^JaJaJaJcHdhefHhefaJHhײefaJaJaJcHdhײef"##eL & F1$4$7$8$EƀͲefL & F1$4$7$8$EƀͲef#g$$(KIZ & F 4x1$4$5$9DEƀͲefH$Z & F 4x1$4$5$9DEƀͲefH$$%%%*%3%X%n%w%%%%%%%%%&.&@&F&R&S&T&f&&&&&&''''(((('(/(=(E(ҫҴthtHhܲefB*phB*cHdhܲefph B*pho(HheaJHhefaJHh۲efaJaJcHdh۲efaJcHdhefaJaJcHdhڲefHhڲefaJHhefaJHheaJHheaJHheaJHhٲefaJHh4efaJ(((,.s22M3vtCEƀͲef.H$CEƀͲef.E(F(](x(((((((((((((9)?)I)V)c)k)s)~)))))))))))))*y*z******+ ++˿ﴫ{HhefB*phB*cHdhefphHh޲efB*phB*cHdhݲefphB*nHphtHB*nHo(phtHHheB*phB*cHdhephB*cHdhܲefphHhݲefB*ph B*phHhܲefB*ph.+++++++, ,,7,^,~,,,,,,,--+-r-s-..;.<.E.H.M.v.z........ƺңҚңңң}q}qңҚHhefB*phB*cHdhefph!B*cHdhefnHo(phtHB*nHphtHB*nHo(phtHHhefB*phHh߲efB*phB*cHdh߲efph B*phHh޲efB*ph!B*cHdh޲efnHo(phtHB*cHdh޲efph'.........../ ////#/(/*/+/N/O/P/^/_/////////0%0&0Q0R0U0~00000 1 1)141?1A1B1c1d111111׿׿׿׷םםHhefB*phB*cHdhefph6B*]nHo(phtH6B*]phHhefB*phB*cHdhefph B*phB*nHphtHB*nHo(phtHHhefB*nHphtH91122M2N2r2s222222222222222233333(33393;3<3B3I3J3K3L3M3P3X3`3i3x333333333ǺǺǺޞǞޛޞ֛ޛHhefaJaJcHdhefaJaJcHdhefnHtHHhefaJnHo(tHHhefaJnHtHaJcHdhefnHo(tHaJnHo(tH aJnHtHo(B*nHphtH B*phB*nHo(phtH3M334L5q*F & FEƀͲefF & FEƀͲefF & FEƀͲef333333333394E4L4M4N4S4W4c4d4i444444444444444444444444!5"5'5,5?5@5K5O5W5_56 6666P6Q6̲̲̲̿mH sH  aJmH sH HhefaJnHo(tHHhefaJnHtHaJcHdhefnHtHaJcHdhefnHo(tH aJnHtHaJnHo(tHaJHhefaJaJcHdhef;L56Q6^Z & F 4x1$4$5$9DEƀͲefH$F & FEƀͲefQ6g6}6~66666666666667(8c8i8o888888ҟҎ}l[J!CJOJQJ^JaJcHdhef!HhefCJOJQJ^JaJ!CJOJQJ^JaJcHdhef!HhefCJOJQJ^JaJ!CJOJQJ^JaJcHdhef!CJOJQJ^JaJcHdh[!HhefCJOJQJ^JaJ!CJOJQJ^JaJcHdhefCJOJQJ^JaJCJOJQJ^JaJmH sH nHtH Hhef cHdhefQ6~66y8::=S?xBDENG1I$ & Fa$R & FCEƀͲef. 889999@::::::::;#;r;y;z;;;;;;<<===S?8@:@v@|@㩢}xgV!CJOJQJ^JaJcHdhef!HhefCJOJQJ^JaJnHtH nHo(tH cHdhef Hhef Hhef cHdhefaJ Hhef cHdhef!CJOJQJ^JaJcHdh[!HhefCJOJQJ^JaJ!CJOJQJ^JaJcHdhefCJOJQJ^JaJ!HhefCJOJQJ^JaJ!|@@@@@@@@@@@@AAAAAAAAAAAAAAAAABBBDDENG5H6HHHHH"I#I0ICIKILISIWI`IaIiIqIrIҰҭ\aJnHtHHhefo(cHdhefo(o( HhefaJ!HhefCJOJQJ^JaJ!CJOJQJ^JaJcHdhefCJOJQJ^JaJ!CJOJQJ^JaJcHdhef!HhefCJOJQJ^JaJ61IrIIIrMPXPRVVY?]`c  & F^H$  & F` & FCEƀͲef. rIvIIIIIIIIIIIIIIIIJJJ$JnJoJJJKKvKwKKKyLzLLLL6M7MqMrMvMNN+N,N-N.NNͿ͚ͤͤͤͤͤͤͤͤ͆xͤj0J0B*UaJphB*H*aJphB*aJnHphtH6B*]aJphB*aJnHo(phtHHhefB*aJphB*aJcHdhefph B*aJphaJo( Hhef cHdhef\aJ Hhef cHdhef nHo(tH/NNNOXOYOcOdOOOOOOPP%P7PIPPPWPXPPPP2R3RJRKRdRfRoRRRRCSDSSSSS^T_TTT˽wnHhefaJaJcHdhefaJnHo(tHj0J0UaJaJ nHo(tHo( Hhef cHdhef%HhefB*aJnHo(phtHHhefB*aJph%B*aJcHdhefnHo(phtHB*aJcHdhefph B*aJphB*aJnHo(phtH+TU U{U|UUU3V4VVVVVVVVVVVVV=W>WOWVW]WqWuWyWWWWWiXjXnXXXXYYYYZZnZoZZZZZG[H[[[[[W\X\\\]]>]?]]B*aJnHphtHHhefB*aJphB*aJcHdhefphaJo( Hhef cHdhefB*aJo(phB*aJnHo(phtH B*aJphA]]]]]]V^W^^^__[_\______``$`%`````````+a5aaaaaDbEbbbbccZc[ccccc(d3d>dPdbdjdrdsd^e_eeeeeףB*aJcHdhefpho( Hhef cHdhefB*aJo(phB*aJnHo(phtH B*aJphaJo(aJcHdhefHhefaJaJaJnHo(tH?cdsdd%edH & FEƀͲefH$H$  & F^F & FEƀͲef.%eee|hhjpIp*tQtolcllcl^ & F  & F^H$H & FEƀͲefH$H & FEƀͲefH$ eff,f5f>fffgfff!g"ggggg=h>h{h|hhhhhhhhhii/i0i{i|iiiiiZj[jjjjjjJkKkkkll;lMUZ`adx˽˽ˮ˽B*aJcHdhefo(phHhefB*aJphB*aJcHdhefph5B*\aJo(ph5B*\aJphB*aJo(ph B*aJphDxyكڃ./FGHZ[ƄDŽ &'OPޅ߅?@opdžȆ%&)8ACB*aJcHdhefphHhefB*aJphB*PJaJphB*aJnHo(phtHB*aJcHdhefphHhefB*aJph B*aJphB*aJo(ph=KCߊЍo'H & FEƀͲefH$H & FEƀͲefH$H & FEƀͲefH$CR{| ?@WXnö͈ֈ݈ވ/0]^z{ĉʼnȉ̉2?RX`ajl廭HhefB*aJphB*aJcHdhefo(phHhefB*aJphB*aJcHdhefphHhefB*aJphB*aJcHdhefphB*aJo(ph B*aJph5B*\aJph3lopyz{Ȋ̊͊ߊCDpqЋы78ghȌɌ، ⼰ⓅwB*aJcHdhefphHhefB*aJphB*aJcHdhefphB*aJcHdhefo(ph5B*\aJo(ph5B*\aJphHhefB*aJphB*aJcHdhefph B*aJphB*aJo(phB*aJcHdhefph, #noύЍݍ ijǎΎ֎Զͬyk]j0J0B*UaJphHhefB*aJphB*aJcHdhefphaJHhefo( Hhef cHdhefcHdhefo(o(5\aJnHtHHhefB*aJphB*aJo(ph B*aJphB*aJcHdhefphB*aJcHdhefphB*aJcHdhefo(ph$Ѝ“^H & FEƀͲefH$H & FEƀͲefH$H$ & F  & F^"(19AC@AMNqr֐א56ijxyƑǑʑ9:klpty~ӒԒHhefB*aJphHhefB*aJphB*aJcHdhefphB*aJo(ph B*aJph5B*\aJo(ph Hhef5B*\aJph 5B*\aJcHdhefph5B*\aJph7.248:OPopuv“ƓǓȓ !`aȔɔ,-[\ʕ˕ܷܷܷܷܭܷܷܷܷܷܷܷܷܷܔ܆xܷ܆xHhefB*aJphB*aJcHdhefphB*aJnHo(phtH5B*\aJo(ph5B*\aJphB*aJo(phB*aJcHdhefphHhefB*aJph B*aJphB*aJcHdhefo(phB*aJcHdhefph/'(FKPXYaitȖӖޖMNPQ{|Ηϗڗߗ 9:AEŷŷŷŨŷŷŷŷB*aJnHo(phtHHhefB*aJo(phB*aJcHdhefo(phHhefB*aJphB*aJcHdhefphHhefB*aJphB*aJcHdhefphB*aJo(ph B*aJph7ELYZklʘҘHIyzљҙ23_`ƚǚ"(.26<=rs˛̛ɹ뫝듇뫝5B*\aJo(ph5B*\aJphHhefB*aJphB*aJcHdhefph5B*\aJmH o(phsH 5B*\aJmH phsH  mH o(sH mH sH B*aJo(ph B*aJphHhefB*aJph5“ZljH & FEƀͲefH$ & FH & FEƀͲefH$'(UVΜ+,?@GJNXYuvٝڝ56acdilžÞʹ🂟B*aJcHdhefo(phHhefB*aJphB*aJcHdhefph5B*\aJo(ph Hhef5B*\aJph5B*\aJphHhefB*aJphB*aJcHdhefph B*aJphB*aJo(ph0Μ)ݡofc^\\ & FH$  & Fh^hH & FEƀͲefH$H & FEƀͲefH$"()YZ$;<stӠԠ*/045DKSpqvݡ)-.45:BFMNTﺱ HhefcHdhefo( cHdhef Hhef cHdhefHhefo( HhefcHdhefo( cHdhefo( Hhef cHdhefBբ!'X£ܣݣ  %&56HJKTväʤˤ .9Xcktյ Hhef cHdhefHhefnHo(tHcHdhefnHo(tH nHo(tHHhefo(cHdhefo( cHdhef Hhefo(Hhefo(Bߣq*F & FEƀͲefF & FEƀͲefF & FEƀͲef'7Kq*(F & FEƀͲefF & FEƀͲefF & FEƀͲefͥѥ!)@HNadv|Ӧܦ(,07dhlADI AB֪תʽʽʽʰʣHh efaJPJaJmH nH sH tH Hh efaJmH sH aJcHdh efmH sH  aJmH sH HhefaJaJcHdhefaJ cHdhefcHdhefo( Hhefo(;7 CVO$ & F1$4$7$8$EƀͲef.a$ x1$5$7$8$9DH$ & FCEƀͲef.C_O$ & F1$4$7$8$EƀͲef.a$O$ & F1$4$7$8$EƀͲef.a$(_O$ & F1$4$7$8$EƀͲef.a$O$ & F1$4$7$8$EƀͲef.a$&'O[\]jt~٭ڭ23PQ|}߮,-ABCVWcw{|ϯׯ꧞HhƺeaJHhźeaJaJcHdhźeaJcHdhƺeHhǺeaJ cHdh efHh efaJaJcHdheaJcHdh efHh efaJ 6]aJaJHh efaJaJcHdh ef5(^a`L & F1$4$7$8$EƀͲefO$ & F1$4$7$8$EƀͲef.a$aeL & F1$4$7$8$EƀͲefL & F1$4$7$8$EƀͲef#ݭcL & F1$4$7$8$EƀͲefL & F1$4$7$8$EƀͲef4eL & F1$4$7$8$EƀͲefL & F1$4$7$8$EƀͲef4R~eL & F1$4$7$8$EƀͲefL & F1$4$7$8$EƀͲef~eL & F1$4$7$8$EƀͲefL & F1$4$7$8$EƀͲefeL & F1$4$7$8$EƀͲef L & F1$4$7$8$EƀͲef.eL & F1$4$7$8$EƀͲef L & F1$4$7$8$EƀͲef .CcfD)C$Eƀúe & FL & F1$4$7$8$EƀͲef  !"#)>?LMN\FGIPXYZUqrsxy߳ľzt 6]aJPJaJmH nH sH tH  5\aJKH6] j6U cHdhɺeHheaJHhɺeaJaJcHdhɺeaJ Wɺe HhɺeHhɺe6] HhȺe j,U HhǺe Hhúe HhźeHheaJ-!#?r-+DC$EƀȺeG$C$Eƀea$DC$EƀúeFHIXYZ $$Ifa$$IfTDC$Eƀɺe)$a$)0p*! $$Ifa$$If$$If84֞(  H RR t04 8aTIJDz˲ϲӲ $$Ifa$ӲԲڲݲ0x*! $$Ifa$$If$$If84֞(  H RR t04 8aTݲ $$Ifa$0T*! $$Ifa$$If$$If84֞(  H RR t04 8aT $x$1$5$7$8$9DH$Ifa$ $$Ifa$ 0T*! $$Ifa$$If$$If84֞(  H RR t04 8aT $$Ifa$%'0d*! $$Ifa$$If$$If84֞(  H RR t04 8aT')+-04 $$Ifa$45;=0h*! $$Ifa$$If$$If84֞(  H RR t04 8aT=?ADHN $$Ifa$NOUY0*! $$Ifa$$If$$If84֞(  H RR t04 8aTY]aekq $$Ifa$qrs߳0...W$$If84֞(  H RR t04 8aTnZ]P & F 1$4$7$8$EƀͲefP & F 1$4$7$8$EƀͲefZ\efWķŷƷǷȷϷзѷҷ׷ط۷ܷݷ aJmH sH PJaJmH sH aJmH nHsH tHCJaJmH sH 5PJ\aJmH sH 5\aJmH nHsH tH5PJ\aJ5\aJnHtH aJmH sH  HheHh˺eaJaJaJcHdh efHh efaJ0Z[\¶ֶ$$&P#$/IfK$a$b$T$&P#$/Ifb$N 1$4$7$8$C$Eƀ˺e =X----$&P#$/IfK$b$$K$L$If48ֈ(`R2b %8 t064 a$&P#$/IfK$b$*$&P#$/IfK$b$$K$L$If4<֞(`R2b % t064 a $(.4$$&P#$/IfK$a$b$457($&P#$/IfK$b$$K$L$If48֞(`R2b %8 t064 a7<AFKQV$$&P#$/IfK$a$b$VW(T$&P#$/Ifb$$K$L$If4֞(`R2b %8 t064 aŷǷn\[[$$&P#$/IfK$a$b$}$K$L$If7\d > #l622 2 24a$$&P#$/IfK$a$b$ ǷȷзҷطܷTn[n[$$&P#$/IfK$a$b$$$&P#$/IfK$a$b$}$K$L$If,\d > #l62 22 24aܷݷ`n[n[$$&P#$/IfK$a$b$$$&P#$/IfK$a$b$}$K$L$If,\d > #l62 22 24a hn[n[$$&P#$/IfK$a$b$$$&P#$/IfK$a$b$}$K$L$If,\d > #l62 22 24a  !"0145=>?@AGHKLQRSTU\]`aijlmn{|}~ӸHhӳefaJaJcHdhӳefaJ 5\aJ Hhe cHdheKHCJaJmH sH PJaJmH sH aJmH nHsH tHCJaJPJaJ aJnHtH@!Ln[n[$$&P#$/IfK$a$b$$$&P#$/IfK$a$b$}$K$L$If,\d > #l62 22 24a!"15>@AHLRT|n[n[Pn[n[$$&P#$/IfK$a$b$$$&P#$/IfK$a$b$}$K$L$If,\d > #l62 22 24a TU]ajmn|~dn[n[`n[n[$$&P#$/IfK$a$b$$$&P#$/IfK$a$b$}$K$L$If,\d > #l62 22 24a ø˸Ӹ` rcOOOV$&P#$/IfK$^Vb$T$&P#$/Ifb$$&P#$/Ifb$}$K$L$If,\d > #l62 22 24aӸԸ ybK7ybV$&P#$/IfK$^Vb$$$&P#$/IfK$]a$b$$V$&P#$/IfK$^Va$b$$K$L$If84F^& !Tty t06    4 8aT5=E˹ٹ!4<DUZ_emuwƺ̺պںߺ (0=>?Nķ aJmH sH HhҳefaJmH sH aJcHdhҳefmH sH  aJmH sH HhӳefaJaJcHdhӳefaJHhҳefaJaJcHdhҳefC!-.FJN7$V$&P#$/IfK$^Va$b$$K$L$If84F^& !Tty t06    4 8aTV$&P#$/IfK$^Vb$$$&P#$/IfK$]a$b$Ĺy,bK;$&P#$/IfK$b$$$&P#$/IfK$]a$b$$V$&P#$/IfK$^Va$b$$K$L$If84F^& !Tty t06    4 8aTKydZC/V$&P#$/IfK$^Vb$$$&P#$/IfK$]a$b$$;$$&P#$/IfK$VD+WD^;`$a$b$$K$L$If84F^& !Tty t06    4 8aTKL`by<bK7V$&P#$/IfK$^Vb$$$&P#$/IfK$]a$b$$V$&P#$/IfK$^Va$b$$K$L$If84F^& !Tty t06    4 8aTydcL8y,V$&P#$/IfK$^Vb$$$&P#$/IfK$]a$b$$&P#$/IfK$WDd`b$$K$L$If84F^& !Tty t06    4 8aTͺк 6$K$L$If84F^& !Tty t06    4 8aT$$&P#$/IfK$WDd`a$b$$$&P#$/IfK$]a$b$$$&P#$/IfK$a$b$56JLc`P9$$&P#$/IfK$]a$b$$$&P#$/IfK$a$b$$K$L$If84F^& !Tty t06    4 8aT$&P#$/IfK$WDd`b$LMNO]i@RR$&P#$/If^`b$$K$L$If84 F^& !Tty t06    4 8aT$&P#$/IfK$b$NV]^_lrxyzǻ ')*34?JUkԽ۽`aryȻȩ}}}}Hh efaJaJcHdh efKHPJaJmH sH 6]\aJ HhemH sH HhӳefaJmH sH aJcHdhӳefmH sH aJmH sH 5KHPJ\aJ 5\aJ Hh ef cHdh efaJ KHPJaJKH 6KH]-]^_ǻ$&P#$/4$IfK$b$$&P#$/IfK$b$T$&P#$/Ifb$ & F:$$Ifl&& 6P64 lae4ǻȻӻٻ߻y`eNe$$&P#$/IfK$]a$b$$&P#$/IfK$^b$$K$L$If848FnP Z$ N t06    4 8ad߻ 2yeNeyeNe$$&P#$/IfK$]a$b$$&P#$/IfK$^b$$K$L$If848FnP Z$ N t06    4 8ad23@CXYmpyeNey eNe$$&P#$/IfK$]a$b$$&P#$/IfK$^b$$K$L$If848FnP Z$ N t06    4 8adļżټۼyeNeyeNe$$&P#$/IfK$]a$b$$&P#$/IfK$^b$$K$L$If848FnP Z$ N t06    4 8ad (yeNeyleNe$$&P#$/IfK$]a$b$$&P#$/IfK$^b$$K$L$If848FnP Z$ N t06    4 8ad()*kptx|yj[KKKKK$&P#$/IfK$b$T$&P#$/Ifb$$&P#$/Ifb$$K$L$If84FnP Z$ N t06    4 8ad$K$L$If4֞(h $\2888 t064 a$&P#$/IfK$b$$&P#$/IfK$b$U$&P#$/1$IfK$b$-$&P#$/IfK$b$$K$L$If4֞(h $\2888 t064 aĽɽνӽ$&P#$/IfK$b$ӽԽս-DW$&P#$/Ifb$$K$L$If4r֞(h $\2888 t064 anp¿ $$Ifa$T:$$Ifl&& 6P64 lae4$&P#$/Ifb$ Ⱦо &/9pxyz¿SUW]^_ajklȼ{t{ aJmH sH mH sH 6]mH sH  j%=Ujj@ CJUVaJ jUHhʺeaJaJcHdhʺeHh ef5\aJ5\aJcHdh ef 5\aJ Hh ef cHdh ef Hhe cHdheHh efaJaJaJcHdh ef+¿ÿſѿؿ߿it`I`< $r$If]ra$$dx$5$7$8$9DH$If $$Ifa$$$If84\*48Lr t04 8a߿i`W`Ji`W $r$If]ra$ $$Ifa$ $$Ifa$$$If848\*48Lr t04 8a%&(7>DES|JS\ $$Ifa$$$If848\*48Lr t04 8a $r$If]ra$ $$Ifa$EGOU[\^lsJx$$If848\*48Lr t04 8a $r$If]ra$ $$Ifa$ $$Ifa$syz|\|SJS\S $$Ifa$ $$Ifa$$$If848\*48Lr t04 8a $r$If]ra$Jd$$If848\*48Lr t04 8a $r$If]ra$ $$Ifa$ $$Ifa$i`W`JiD`` $r$If]ra$ $$Ifa$ $$Ifa$$$If848\*48Lr t04 8aS@$$If848\*48Lr t04 8a $r$If]ra$ $$Ifa$aigeec^\eecV$a$VW$$If84\*48Lr t04 8a  *+69ABIRS[cdklm{|,apq{}}}}} mH o(sH mH sH  nHo(tHHhefo(cHdhefo( cHdh efHh efo( Hh efcHdh efo(o( KHPJaJ6] j8CU+j|%@ CJPJUVaJmH nH sH tH  jU HhʺecHdhʺemH sH 1 |&%$YY  & F^ & FH &8EƀͲef.XV !)*23;<EFLMOPXYnowx 08HI`abij~ #OWv{|ƽcHdhefo( cHdhef Hhef cHdhefcHdhefo( Hhe cHdhe Hhefo(mH sH J!*+3WXY`ijoz"#)+0;CDžžžžžžHhefo( HhefcHdhefo( cHdhef HhecHdheo(o( HhefcHdhefo(Hhefo(GDKST[_deikp{ %'019=CDIKP[hiuy$& cHdhef cHdhԳef HhԳef HheHhefo( HhefcHdhefo(o( HhefcHdhefo(Hhefo(E&+./>?JVWbfght %)-<Hz!"#$»Hhefo( HhefcHdhefo( cHdhԳef cHdhef HhԳefcHdhԳefo(Hheo( HhecHdheo(Hhefo( HhefcHdhefo(o(9$(/KN]op &'01>?psEGIis "#乲橢䛒Hhef6]Hhefo( Hhef cHdhefcHdhefo( HhecHdheo(cHdhefo( cHdhefHhefo(cHdhefo(o( Hhef Hhef cHdhefmH sH 5#TWXY]~$%+./JT_abhkl)789<[]^aϽHhefmH o(sH HhefmH sH cHdhefmH o(sH mH sH  mH o(sH Hhefo( HhefcHdhefo(o( HhefHhefo(A9^y6CEƀͲefCEƀͲefCEƀͲef:;<=arJMPYijl{!$%)8V_úʳʺcHdhefo( cHdhefHhefo( HhefcHdhefo( HhecHdheo( HhecHdheo(o( mH o(sH mH sH C^Pyw0F & FEƀͲef)CEƀͲefCEƀͲef{q*F & FEƀͲef)F & FEƀͲef)F & FEƀͲef)_flyz",5;>?ght}28defklyz о Hhef HhefcHdhefo( cHdhefHhefmH o(sH mH sH HhefmH sH cHdhefmH o(sH  mH o(sH o( HhefHhefo(?{ir/CEƀͲefCEƀͲef@&F & FEƀͲef)f? "kCEƀͲef @&  & F^CEƀͲefBcdm #$%,01[\st '+,KOstv~» cHdheHheo( HhecHdheo(Hheo( HhecHdheo( HhefHhefo(cHdhefo(o(C!$-<?ENVW^ghpz{  r  !";FJKUvw  mH o(sH Hhefo(cHdhefo( HhefmH sH Hhefo( HhefcHdhefo(o(L"Kxy63@&CEƀͲef CEƀͲef CEƀͲef m56;CJKVW_`goǾ mH o(sH cHdhefmH sH HhefmH sH  mH o(sH mH sH  cHdheHheo( HhecHdheo(cHdheo( Hhe cHdhe Hhe cHdhefcHdhefo(o(Hhefo(/~y64CEƀͲefCEƀͲefCEƀͲef *9ABIUVabckrsx{~JRWZrwȿȦȉmH sH  mH o(sH  cHdhef HhefHhefo(cHdhefo(Hheo( HhecHdheo(o(HhemH sH  mH o(sH HhefmH o(sH HhefmH sH cHdhefmH o(sH 4~nk@&CEƀͲefCEƀͲef  & F^")-1dlm )*/1DIKLRUV_koĹĹĹHhefmH o(sH HhefmH o(sH cHdhefmH o(sH HhefmH sH cHdhefmH o(sH  Hhe cHdheHhefmH sH cHdhefmH sH  mH o(sH mH sH 5vy6CEƀͲefCEƀͲefCEƀͲef '(3<=EMNU]t!"#*.øøø{øøøø{cHdhefmH sH HhemH o(sH HhemH sH cHdhemH o(sH HhemH o(sH HhemH sH cHdhemH o(sH  mH o(sH mH sH HhefmH o(sH HhefmH sH cHdhefmH o(sH 0./02;ABFNTUVWt|~&(9:HIjrwxǺǭǭǭǭנHhefmH sH cHdhefmH sH cHdhefmH o(sH HhemH o(sH cHdhemH o(sH HhemH sH mH sH  mH o(sH HhefmH sH cHdhefmH sH cHdhefmH o(sH 6 ypn  & Fe^eCEƀͲefCEƀͲef  %&6:CJKQTU\kl{}')+,:@󣳚| HhefcHdhefo( Hhef cHdhefHhefo(cHdhefo( cHdhef Hhef cHdhef HhefHhefo(cHdhefo(Hhefo( HhefcHdhefo(o( mH o(sH mH sH 0@CDGHLXY[\gnvxy} ߸ߩttcHdhefmH sH mH sH HhefmH o(sH HhefmH sH cHdhefmH o(sH  mH o(sH cHdhefo( HhefHhefo(cHdhefo( cHdhef cHdhefo(cHdhefo( Hhef Hhef Hhef-"#$-234CDEKU_bcijopqxy ɼɼԯԯ~u~Hhefo( HhefcHdhefo( cHdhefo(HhefmH sH HhefmH o(sH cHdhefmH o(sH cHdhefmH o(sH HhefmH sH  mH o(sH cHdhefmH sH cHdhefmH sH HhefmH sH mH sH *XIyw4CEƀͲefCEƀͲefCEƀͲef 'AGILXhkln &'*57JMU] NYbyѹᮡ~HhefmH sH HhefmH o(sH HhefmH sH cHdhefmH o(sH KHPJaJmH sH cHdhefmH sH cHdhefmH o(sH HhefmH sH mH sH  mH o(sH o( Hhef HhefcHdhefo(.zy6CEƀͲefCEƀͲefCEƀͲefy}'(0>?LMX]^btvw ۿ~u~lu~lHhefo(cHdhefo( HhefHhefo( HhefcHdhefo(Hhefo( HhefcHdhefo( nHo(tHo(KHPJaJmH sH cHdhefmH sH  mH o(sH cHdhefmH o(sH HhefmH sH HhefmH o(sH *MRck$If'CEƀͲefkl,uv34K(vvvvvvvvv $$Ifa$$$IfTcF"O, 06    4 ca ,W0ABHI[\]gkuv#$12LQU^v|',JL\hsJO\]u nHo(tHnHtH HhecHdhefo( cHdhefo(TQvu($/IfK$b$ '$/Ifb$ & F  & F^DC$Eƀe +BCEL(@Qf~^yis HhefHhefo(cHdhefo( cHdhefHhefo( HhefcHdhefo(cHdh˺eo( Hh˺e nHo(tHo( HhefB.R & F$/EƀͲefT-Ifb$$/IfK$b$n$K$L$IfTc0"064 ca$XT & F$/EƀͲefV-IfK$b$R & F$/EƀͲefU-Ifb$}.R & F$/EƀͲefW-Ifb$$/IfK$b$n$K$L$IfTc0"064 ca@\}*.67GXct|} "#$3;<=CMitKLNOZcdlmrHhefo( HhecHdhefo( HhefHhefo(cHdhefo( Hhefo(M}<-$/IfK$b$n$K$L$IfTc0"064 caT & F$/EƀͲefX-IfK$b$*XT & F$/EƀͲefZ-IfK$b$R & F$/EƀͲefY-Ifb$&.R & F$/EƀͲef[-Ifb$$/IfK$b$n$K$L$IfTc0"064 ca&<-$/IfK$b$n$K$L$IfTc0"064 caT & F$/EƀͲef\-IfK$b$JKLM< .. $/Ifb$n$K$L$IfTc0"064 caT & F$/EƀͲef]-IfK$b$MNOm Q861 & FF & FEƀͲef..DWC$Eƀe:$$Ifl&&64 lae4n{ #$*.67>GHPQZ>KWx{ ֽֽֽHhefo(cHdhefo( cHdhef HhefHhefo(cHdhefo(o( cHdhef HhefJ'(2?@HIPXY`dlops|).0GImr  %./78STXY_`hirsyռ張Hhefo( HhefcHdhefo( cHdhefHhefo( HhefcHdhefo(o(Hhefo( HhefcHdhefo(DQ2H 82B\Z;F & FEƀͲef. & FT & F EƀͲef.^` yz  2;CPWXwx/04?UW[\ $%/<FNQƽ HhefHhefo( Hhef cHdhefcHdhefo(Hhefo( HhefcHdhefo( cHdhefo(H  #$%)BCIJnop U_ghijklmwӾmH nHo(sH tH mH o(sH mH sH PJcHdhefmH o(sH  PJmH sH HhefPJmH sH PJmH o(sH HhefPJmH sH PJmH o(sH  mH o(sH  Hhef nHo(tHo( cHdhefcHdhefo(2BKpy6CEƀͲef CEƀͲefCEƀͲefmywusnlww$a$)CEƀͲef"CEƀͲef! E!#&-45FGRSefj}>RX\^imȿo( Hh3efHh3efo( cHdh3efcHdh3efo(KHPJaJmH sH B*QJo(ph333 B*QJph333 jieU#j?͏@ PJUVmH nH sH tH  jU?, _  I$NtOQj  & F` & FCEƀͲef.     ' ( ) * 9 : ; L M N \ g h v               ? F G P V          ) + 1 8 9 < A C S ] v ~     ξ cHdhef HhefcHdhefo( cHdhefHhefo(cHdhefo(Hhefo(cHdhefo( Hhef Hhefo( nHo(tHB            2 3 8 ; I P T W _ ` d       ' ( v w x     3:GHQ^ghnxyz» cHdhóef cHdhijef Hhijef Hh³ef cHdh³ef cHdhef nHo(tH HhefHhefo(cHdhefo(o(G"#$39:?@ANR_`&'?@z} 4;BDP\^lz| Hhdzef cHdhdzef nHo(tH HhƳef cHdhƳefmH sH Hhųefo(cHdhųefo( Hhųef Hhijef cHdhijefcHdhijefo(o(A'0;FMT]rOPUbkuv{|} #/0245O[bikv Hhɳef cHdhɳef nHo(tHo( Hhȳef cHdhȳef cHdhdzef HhdzefQ !'()*+opXYab$;<>?uv » Hh˳ef cHdh˳efHhʳefo(cHdhʳefo( cHdhʳef Hhʳef Hhɳef cHdhɳefo( nHo(tHJefgimn01LMNORkltuvy  - 4 B L \ n w x G!H!I!o!p!$"%"+"1":"I"K"R"["k"q""""""# cHdhγefmH sH  Hhͳef cHdhͳef Hh̳ef cHdh̳ef nHo(tHo(cHdh˳efo( Hh˳ef cHdh˳efHiRfF & FEƀͲefF & FEƀͲef  & Fh`hRu$"1"##$qlcaaXaXa  & F`  & F^ & FF & FEƀͲefF & FEƀͲef #########$$ $$$$.$0$6$7$:$?$|$$$$$$$$$"%#%$%&%H%I%J%%%%%%%%%%!&"&.&5&6&7&8&9&:&A&H&I&O&T&U&Y&Z&&&&&&&&&'' ' 'PJmH nH o(sH tH Hhϳefo(cHdhϳefo( cHdhϳef Hhϳef Hhγef cHdhγefo( nHo(tHJ$$%%%q*F & FEƀͲefF & FEƀͲefF & FEƀͲef%.&/&Z&d&k&{&&$If'F & FEƀͲef&&&&&&&&&nhhhbhnh;$If$If$$Ifc\,l!w @ /064 ca&&&& '')'F'Z'r''';$If $IfVD^$If x$1$5$7$8$9DH$If ''')'*'6'7'='D'F'G'X'['q's'''''''''( (&('(>(?(R(T(|(((((((((((((((((((()))))))@)A)N)Z)l)m)v) cHdhѳef Hhѳef Hhгef cHdhгef HhճefcHdhճefo( cHdhճefPJmH nH sH tH 6] Hhϳef cHdhϳefcHdhϳefo(o(@''''''((jPdddddd$If$$Ifc48\,l!`w` @ /064 ca(( (&(>(S(}((jdddddd$If$$Ifc48\,l! w  @ /064 ca(((()nl][ x1$5$7$8$9DH$$$Ifc\,l!w @ /064 cav)w)x))))))))))))))))))))*******R*S*T*V*[*^*_*z*{*|*}**+#+++,,,,r,s,,,,,,, - -p-q-------....z.{.........mH sH  cHdhѳefcHdhѳefo( HhѳefcHdhгefo(o( Hhгef cHdhгefP)))*q*F & FEƀͲef]F & FEƀͲef]F & FEƀͲef]*U*|***qomBF & FEƀͲef]F & FEƀͲef]**$+h+q*F & FEƀͲef-F & FEƀͲef-F & FEƀͲef-h+ ,,-q*F & FEƀͲef-F & FEƀͲef-F & FEƀͲef--}--.q*F & FEƀͲef -F & FEƀͲef-F & FEƀͲef-.../q*F & FEƀͲef -F & FEƀͲef -F & FEƀͲef -.////(//?/@/T/U/V/W/{/|/}/////////////// 0000405060L0M0N0O0s0t0u00000000000000"111?1A1B1>*6] j0J0UKHPJaJmH sH j~UjUj@UjUjU0JQCJjgU 0JQCJo(jU jUo(>/V///q*F & FEƀͲef-F & FEƀͲef-F & FEƀͲef -/0N00q*F & FEƀͲef-F & FEƀͲef-F & FEƀͲef-000A1122 2 2P2Q2r2s2v22 s !$1$5$7$8$9DH$If$If;$a$:$a$1 & FF & FEƀͲef-B111111111111222 2P2Q2R2X2Y2Z2[2\2]2g2h2j2l2n2p2q2s2t2u2v2̲ysf]CJEHmH sH jCJEHUmH sH  >*mH sH 0J2cHdhݳefmHnHu)Hhκe0J2cHdhXemHnHu)HhXe0J2cHdh[mHnHuHh[0J2mHnHu0J2mHnHu0J2 j0J2UmH sH  jU>*B*aJphB*aJo(ph B*aJph j0J0U>*#v2222222233353>3L3M3P3Q3üKHPJaJmH sH :CJmH sH  CJmH sH  CJmH sH mH sH  \mH sH 5\mH sH 5:CJ\mH sH 5:mH sH mH sH CJEHPJnH tH 22222233paOaaa$$& #$/Ifa$b$$& #$/Ifb$$$Ifl4 F>&` 6 0 /'    4 lae4$If33L3o,^<$& #$/Ifb$$$Ifl4 F>&  6 0 /'    2q2q4 lae4L3M3N3O3P3Q3 & F :&dPa$$Ifl4 &/' 6 0 /'4 lae46 00&P 1+/R . A!n"n#$% DyK yK :mailto: chlim@if.kaist.ac.krDyK yK <mailto:chinyong.chong@itu.intyDyK  _Toc9915658yDyK  _Toc9915658yDyK  _Toc9915659yDyK  _Toc9915659yDyK  _Toc9915660yDyK  _Toc9915660yDyK  _Toc9915661yDyK  _Toc9915661yDyK  _Toc9915662yDyK  _Toc9915662yDyK  _Toc9915663yDyK  _Toc9915663yDyK  _Toc9915664yDyK  _Toc9915664yDyK  _Toc9915665yDyK  _Toc9915665yDyK  _Toc9915666yDyK  _Toc9915666yDyK  _Toc9915667yDyK  _Toc9915667yDyK  _Toc9915668yDyK  _Toc9915668yDyK  _Toc9915669yDyK  _Toc9915669yDyK  _Toc9915670yDyK  _Toc9915670yDyK  _Toc9915671yDyK  _Toc9915671yDyK  _Toc9915672yDyK  _Toc9915672yDyK  _Toc9915673yDyK  _Toc9915673yDyK  _Toc9915674yDyK  _Toc9915674yDyK  _Toc9915675yDyK  _Toc9915675yDyK  _Toc9915676yDyK  _Toc9915676yDyK  _Toc9915677yDyK  _Toc9915677yDyK  _Toc9915678yDyK  _Toc9915678yDyK  _Toc9915679yDyK  _Toc9915679yDyK  _Toc9915680yDyK  _Toc9915680yDyK  _Toc9915681yDyK  _Toc9915681yDyK  _Toc9561997yDyK  _Toc9561997yDyK  _Toc9561998yDyK  _Toc9561998yDyK  _Toc9561999yDyK  _Toc9561999yDyK  _Toc9562000yDyK  _Toc9562000yDyK  _Toc9562001yDyK  _Toc9562001yDyK  _Toc9562002yDyK  _Toc9562002yDyK  _Toc9562003yDyK  _Toc9562003yDyK  _Toc9562004yDyK  _Toc9562004yDyK  _Toc9562005yDyK  _Toc9562005yDyK  _Toc9562006yDyK  _Toc9562006yDyK  _Toc9562007yDyK  _Toc9562007yDyK  _Toc9562008yDyK  _Toc9562008yDyK  _Toc9562009yDyK  _Toc9562009yDyK  _Toc9562010yDyK  _Toc9562010yDyK  _Toc9562011yDyK  _Toc9562011yDyK  _Toc9562012yDyK  _Toc9562012yDyK  _Toc9562013yDyK  _Toc9562013yDyK  _Toc9562014yDyK  _Toc9562014yDyK  _Toc9562015yDyK  _Toc9562015yDyK  _Toc9562016yDyK  _Toc9562016yDyK  _Toc9562017yDyK  _Toc9562017yDyK  _Toc9562018yDyK  _Toc9562018# Dd<#AB>  # A"2 . s]:ç+ m -F`!e . s]:ç+ M0H peWZ63 x\ml[W~ϵ|4-R'ƺnR\n:P6i7,4V8,U t[UX Ml(v}!iH6T$$"`S{>{s}c_nss|s y.X -F,"~!wX Schxx !yvXA1Q:JhQm+pd+D!]ޱwX`҃~t;0C`#|ZgXY[L1[ňFo71&[1ankX쮞;ֻNϙ"K%9!tj~1l~z*s->0^ݛJ&DpGEu6^X}>/ gAuͮIk߁]{c`WJkL_sB|kϡ1^֥7/yxc ֵ/n8˽3K:Fl"i ;"e}6e7$d2/Ij#^f` ~-qXxY֗ Gn^R0xKۈ³d e txLx|%i?V/,e];.qS/ς=5 ی4IWJ&G#u|{5ߠV[y-c90΀1|s -?`X ߸7/$~QʗloֻF{Q} 8dB̅`O;349wwvʻȻu1>~ =,wp*W؍j5ð ݾ{0r0"vzؙp*kj&WMO'VƁ: wb+πw#./Ŏ}2[} nS gAg Ԋ%SjgO0]:0\L`eDS:l˓T7G"pT?e}bW5~!Ə{b_zG/c"ƓA]gf$pܶ Qzg2f?җF&Ma iX!!Zy{ v5I~Zc2_ൾ~Ud]p%a?ufIm\/2P˯ gU=GGU{Zoڛxl+Kc>36>9g3v+1[aOw dV믱Wؼ@"iH|l__K<`zW}G#V&{?ώdǍM[yvCue1:ZIX,!ƹ ޙh] ,QѳkMWVlW4JWV]FZv~k9HWfy+=+ XMkc-FZ~$j뺲+3+>ӕuQ3Vװ g/5&>6BW֘vrd6%y +km^Z%y +km^Z%y +k>/ͨԕ뺲ܕWWf4;WNWYLptnӜܫo,.lwWWXXJXܗx ʱxʱ/UlūTl-⊭x[)U*uqVbxkqVZUm!Ѵ2 ImeqkeIT;?B#Bw?(P.Dd0  # A2κyy\8YQ;7F`!~κyy\8YQ!  G8&LxݚmhE3wb# AZּ^bc 1%MФy-&*M`Z_BRAD7)K  ) suw%w63gy?3ϾC(-MT*jaVg\6(DN J9mʛ͝>vgzYmcX% ݛŶ9AoE}Q'.e91ғ][\S>#hӭg˙xtPWΏy_1X,6۠"6Q J*9bsĦM%6JX&bMbbʈ[\g _rhc>b%6AlEb]'veb[5k$C)b'vNf֖=7>U3q~Wp_+ԳLsnyMӝuk4~Vqe|JȔ%1WeV}|ĕ"zb߲M:7 Uۙ_qLm, W435ffWaYcjE\3Sx'Z435Lo`F3S1/tMn63n4v@z*oi#4k9.b Hدʁ,Ef_d1!NUe)23"EGi!ƱMg'2&"j7.rg"3+/e bT9L~b'IPYd) 1iU:UVe)2+"kahc)<,Ef2_d# F:cfr'Lvs= ={W$TS\"\cUKmAM'Πwū;s_Amj0Wy hpGl *sU03@'TUW;ۊ4؆A}e]j.k~i^ \] }{ŕBpmMq\ ^|4sT!|gp>@gʉ594qh0)s]hcqru-|14CҠ:VeYy jǫQQDW"OqEJJyOj^G5u\|1GzC8L_1D8`*'fÊ?8gouK~X񴟟v-b6Vߦx]~oN>C7u+)>8\n9En{ ŵkoU=W޶!_]YDdl P  S A? "2ou? CKi=F`!Cu?   !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~t Root Entry F@NksData WordDocument8ObjectPool0V~s@Nks_1083219306 !F0V~ssOle PRINTCompObjf  !"#$%&'()*+,-./0123456789:;<=>?@ABCEFGIJKLORSTVWXYZ]abcdefgi !FGraphique Microsoft ExcelBiff8Excel.Chart.89qE-    ''  '  "-H-  b   k''   Arial--------------------------------------------------"System-'- k "--  W "---'--- k---'--- WMM_2- "-MM_2- MMMM $lPJllP_2- $Zlrx}   % ) . 3 7 <@DIMMQUY]aeilpswz} "#$%'()+,-/0234679:<=>@ACDFGIJlPlM3_2- M3M3F$!acdfgijllmoprstvaM3_2-$aua3f_2- 3f.$[]^`acdfgijlmoprstva[f_2- ffR$'|}|f_2-$gg_2- .$|}g|f_2- ffb$/}xrmhbb]XRMGB<61+%  |vqlfa\WRMGC>94/+&! ~|{zxwutrqonlki !& + / 4 9 > CGMRW\aflqv|  %+16<BGMRX]bbhmrx}      _2- $}xrmhb]XRMGB<61+%  |vqlfa\WRMGC>94/+&! ~|{zxwutrqonlkihfecb`_]\ZYWVUSRPOMLKIHFEDBA@>==<;987653210/.-, +*)('!&&%+$/#4"9">!C GMRW\aflqv|i---'--- k---'--- k-------'--- U  2 [Win32( 2 l24%$----'--- k-------'--- K1 2 7I-Worm ( " 2 Q66%$----'--- k-------'--- ty 2 Trojan   2 95%$----'--- k-------'--- \K 2 UWin95( 2 5%$----'--- k---'--- k "-_2-  W--' k '  'ObjInfo Workbook!OlePres000 SummaryInformation( D      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ I@Ba=@ =K^8X1Arial1Arial1Arial1Arial1.Times New Roman18Times New Roman Bold1 Arial1$Arial1Arial1Arial1Arial1Arial1Arial1Arial#,##0\ "F";\-#,##0\ "F"!#,##0\ "F";[Red]\-#,##0\ "F""#,##0.00\ "F";\-#,##0.00\ "F"'"#,##0.00\ "F";[Red]\-#,##0.00\ "F";*6_-* #,##0\ "F"_-;\-* #,##0\ "F"_-;_-* "-"\ "F"_-;_-@_-8)3_-* #,##0\ _F_-;\-* #,##0\ _F_-;_-* "-"\ _F_-;_-@_-C,>_-* #,##0.00\ "F"_-;\-* #,##0.00\ "F"_-;_-* "-"??\ "F"_-;_-@_-@+;_-* #,##0.00\ _F_-;\-* #,##0.00\ _F_-;_-* "-"??\ _F_-;_-@_-"Vrai";"Vrai";"Faux""Actif";"Actif";"Inactif"                  + ) , *   8@ @  8 @  8@  8    > Graph2Feuil1.Feuil2 Feuil3!!`iZR3  @@  I**Countrycc TLDCountUSAJapanJPBrazilBZEnglandUKThailandTH NetherlandNLAustriaSTSloveniaSLChilleCHFranceFR AustraliaAUGermanyDEMalaysiaMYPolandPLCanadaCASpainESHongkongHKItaliaITWin32Win95TrojanI-Worm2 H?|;  I@"DST<~?<~?3`  `   ` # @=3d23 M NM4 3QQ ;Q ;Q3_4E4D $% MP+3O& Q4$% MP+3O& Q4FA03O 03" :dd$% XMP+3OQ '43_ M NM  MM< 444% XM ?3O&Q '4%  IXM*?3O "$&Q '4%  DIXM*?3O)"$&Q '44eWin32Win95TrojanI-Worme8@@@P@e>  I@  dMbP?_*+%M0EPSON Stylus COLOR 5(Copie 2)Z 4hh0DLLName16=EPIGUE4Z.dllDLLName32=EPID2E4Z.dllEPSON Stylus COLOR 580dhh hh q*** q***2f4 ^<" d<~?<~?U Country,,,,,,,,, , , , , ,,,,,,Countrycc TLDCount Australia AU~ @Austria ST~ @Brazil BZ~ `s@Canada CA~ 5@Chille CH~ ?England UK~ Z@France FR~ @Germany DE~ k@ Hongkong HK~ ? Italia IT~ ? Japan JP~ 8@ Malaysia MY~ S@  Netherland NL~ 8@Poland PL~ >@Slovenia SL~ @Spain ES~ @Thailand TH~ N@ USA~ I@*h93100010120/2402/2>@?7 I@  dMbP?_*+%"?<~?<~?U Win32~ 8@Win95~ @Trojan~ @I-Worm~ P@ < !(  p  6NMM?sZ]`4  I@M0EPSON Stylus COLOR 5(Copie 2)Z 4hh0DLLName16=EPIGUE4Z.dllDLLName32=EPID2E4Z.dllEPSON Stylus COLOR 580dhh hh q*** q***2f4 ^<" d<~?<~?3` #  `  `   ?I3d23 M NM4 3QQ ;Q ;Q3_4E4D $% MP+3O& Q4$% MP+3O& Q4FAr3Or 3" :dd$% XMP+3OQ '43_ M NM  MM< 444% = =XM*?3O)"$& Q '4% . =XM*?3O "$& Q '4% XM ?3O& Q '44eee >@7 I@  dMbP?_*+%"<~?<~?U >@7 -   "--'-- --'-- MM_2- "-MM_2- MMMM $[8Z8pq[_2- F$!FFFFFFGGG HHIIJKK!L$M'N(N+O-P/Q1R2S4T5U6V7W7X8Y[FM3_2- M3M3"$>_>_=a=a=b<c;d;z<y=x=w=w>u>u>_M3_2-$_;d;zu_3f_2- 3f$ >]>^>_=a=b<c;d_>]f_2- ff"$9f8g7h5i4j2k0l02457~8}9|9ff_2-$a0l0wa_2- $ 9f8g7h5i4j2k0la9ff_2- ff$i l mnoopqqrsstttuuuuvvvvvuuuutttssrqqpoonmlkji~h|g{fzezdycybyaywyxyyzzz{{||}~~   l_2- $T l mnoopqrrsstttuuuvvvvvvuuuuttssrrqpponmlkkji}h|g{ezdycybyay`y_z^z]{\|[}ZYXWVUTSRRQPPONNNMMLLLLLLa l--'-- --'--  Arial-------"System-'--- LC(!  2 +#Win32  2 :'24% ----'--- -------'--- xZ 2 {\I-Worm  2 b66% ----'--- -------'--- K) 2 +Trojan 2 25% ----'--- -------'--- zcVA 2 YCWin95  2 hJ5% ----'--- ---'---  "-_2-  --'  '  'ZOh+'0@H`x  david barmesx david barmesxMicrosoft Excel@;@]=DocumentSummaryInformation8H8_1083254140!Fps sOle MPRINTXZ՜.+,0 PXd lt| 2 Feuil1Feuil2Feuil3Graph2 Feuilles de calcul Graphiques !FMicrosoft Excel ChartBiff8Excel.Chart.89q8A8 ( -   h''  0??w@ +ww0-??w@; 6ww0-"System 0-'- h-- G!!---'--- h-- $ ----'---  ~{- > >    AA  ---'--- h{-    ---'--- h ->>AA iimmqquu##zz''~~,,004 4     9 9     = =     A A   ---'--- G!!---'---  m---'---  m-- ==QQAA>>>>FF>>JJsNsNMM'S'S..WW[[ddQ Q d` d` Q Q   wd wd d d   Qh Qh     m -==AAFFJJ+N+NwwSSwwWWww[[  ` `     d d     h h     m -==QQ+++A+Add>F>FwwddJJddQQNNSSWW[[dd  ` `     d d     h h     m -==AAFFJJNNSSWW[[  ` `     d d     h h     m -==AAFFJJNNSSWWww[[  ` `     d d     h h   w w m -==AAFFJJNNSSWW[[  ` `     d d     h h     m -==AAFFJJNNSSWW[[  ` `     d d     h h     m -==AAFFJJNNSSWW[[  ` `     d d     h h     m -- $---'---   m= $=uR=(=u---'---   mQ $<QfQ<---'---   m $---'---   mA $AVA,A---'---   m> $)>S>)---'---   m> $)>S>)---'---   mF $Fu[F1Fu---'---   m> $)>S>)---'---   m $---'---   mJ $Jj_J5Jj---'---   m $---'---   m $ ---'---   msN $N^csN9sN^---'---   m $---'---   mM $8MbM8---'---   m'S $Sh'S<>'S---'---   m $---'---   m. $.C.---'---   mW $WlWBW---'---   m $---'---   m $---'---   m[ $[p[F[---'---   md $OdydO---'---   mQ  $ < Q fQ <---'---   md`  $` Ou d` yK d` O---'---   mQ  $ < Q f Q <---'---   m  $ "    ---'---   mwd  $d by wd O wd b---'---   md  $ O d y d O---'---   m  $ '    ---'---   mQh  $h <} Qh fS Qh <---'---   m  $     ---'---   m  $ +    ---'---   mm  $m  m X m ---'---   m--  ---'---  m= R(---'---  m ---'---  m ---'---  mA V,---'---  m ---'---  m u---'---  mF [1---'---  m ---'---  m ---'---  mJ _5---'---  m 4 ---'---  m 4  ---'---  m+N @c9---'---  mw b---'---  m ---'---  mS h}>---'---  mw b---'---  m ---'---  mW lB---'---  m ---'---  mw b---'---  m[ pF---'---  m ---'---  m   ---'---  m`  u K ---'---  m   u ---'---  m  "  ---'---  md  y O ---'---  m    ---'---  m  '  ---'---  mh  } S ---'---  m    ---'---  m  +  ---'---  mm   X ---'---  m- -  $---'-- -  m=  $=R(=---'-- -  mQ  $<ff<---'-- -  m+  $@@---'-- -  m+A  $AV@,@A---'-- -  m  $uu---'-- -  md  $OyyO---'-- -  m>F  $F)[S1SF)---'-- -  mw  $bb---'-- -  md  $OyyO---'-- -  mJ  $J_5J---'-- -  md  $OyyO---'-- -  mQ  $< ff<---'-- -  mN  $Nc9N---'-- -  m  $---'-- -  m  $---'-- -  mS  $Sh>S---'-- -  m  $---'-- -  m  $---'-- -  mW  $WlBW---'-- -  m  $---'-- -  m  $---'-- -  m[  $[pF[---'-- -  md  $OyyO---'-- -  m   $   ---'-- -  m`   $` u K ` ---'-- -  m   $    ---'-- -  m   $ "   ---'-- -  md   $d y O d ---'-- -  m   $    ---'-- -  m   $ '   ---'-- -  mh   $h } S h ---'-- -  m   $    ---'-- -  m   $ +   ---'-- -  mm   $m  X m ---'-- -  m- - ----'---  m=- U'-=(=R=(=R---'---  m- ~----'---  m- ----'---  mA- Y+-A,AVA,AV---'---  m- ----'---  m- ----'---  mF- ^0-F1F[F1F[---'---  m- ----'---  m-  ----'---  mJ- b4-J5J_J5J_---'---  m- ----'---  m- -  ---'---  mN- f8-N9NcN9Nc---'---  m- ----'---  m- ----'---  mS- k=-S>ShS>Sh---'---  m- ----'---  m- ----'---  mW- oA-WBWlWBWl---'---  m- ----'---  m- ----'---  m[- sE-[F[p[F[p---'---  m- ----'---  m - ! -      ---'---  m` - x J -` K ` u ` K ` u ---'---  m -   -        ---'---  m - %  -   "    " ---'---  md - | N -d O d y d O d y ---'---  m -   -        ---'---  m - *  -   '    ' ---'---  mh -  R -h S h } h S h } ---'---  m -   -        ---'---  m - .  -   +    + ---'---  mm -  W -m X m  m X m  ---'---  m-- ----'---  m=- U'-=(=R=(=R====---'---  m- ~----'---  m- ----'---  mA- Y+-A,AVA,AVAAAA---'---  m- ----'---  m- ----'---  mF- ^0-F1F[F1F[FFFF---'---  m- ----'---  m-  ----'---  mJ- b4-J5J_J5J_JJJJ---'---  m- ----'---  m- -  ---'---  mN- f8-N9NcN9NcNNNN---'---  m- ----'---  m- ----'---  mS- k=-S>ShS>ShSSSS---'---  m- ----'---  m- ----'---  mW- oA-WBWlWBWlWWWW---'---  mw- a-wbwwwbwbw---'---  m- ----'---  m[- sE-[F[p[F[p[[[[---'---  m- ----'---  m - ! -          ---'---  m` - x J -` K ` u ` K ` u ` ` ` ` ---'---  m -   -            ---'---  m - %  -   "    "     ---'---  md - | N -d O d y d O d y d d d d ---'---  m -   -            ---'---  m - *  -   '    '     ---'---  mh -  R -h S h } h S h } h h h h ---'---  m -  t - u      u  u   ---'---  mw - . a -w b w + w  w b+ w b w  ---'---  mm -  tW -m uX m  m X m u m um m m ---'---  m--  ---'---   m= R(---'---   m ---'---   m ---'---   mA V,---'---   m ---'---   m ---'---   mF [1---'---   m ---'---   m ---'---   mJ _5---'---   m ---'---   m  ---'---   mN c9---'---   m ---'---   m ---'---   mS hu>---'---   m ---'---   m ---'---   mW lB---'---   m ---'---   m ---'---   m[ pF---'---   m ---'---   m   ---'---   m`  u K ---'---   m    ---'---   m  "  ---'---   md  y O ---'---   m    ---'---   m  '  ---'---   mh  } S ---'---   m    ---'---   m  +  ---'---   mm   X ---'---   m--  ----'---  m=- U'-=====(=R---'---  m- ~----'---  m- ----'---  mA- Y+-AAAAA,AV---'---  m- ----'---  m- ----'---  mF- ^0-FFFFF1F[---'---  m- ----'---  m-  ----'---  mJ- b4-JJJJJ5J_---'---  m- ----'---  m- - ---'---  mN- f8-NNNNN9Nc---'---  m- ----'---  m- ----'---  mS- k=-SSSSS>Sh---'---  m- ----'---  m- ----'---  mW- oA-WWWWWBWl---'---  m- ----'---  m- ----'---  m[- sE-[[[[[F[p---'---  m- ----'---  m - ! -       ---'---  m` - x J -` ` ` ` ` K ` u ---'---  m -   -        ---'---  m - %  -       " ---'---  md - | N -d d d d d O d y ---'---  m -   -        ---'---  m - *  -       ' ---'---  mh -  R -h h h h h S h } ---'---  m -   -        ---'---  m - .  -       + ---'---  mm -  W -m m m m m X m  ---'---  m--  ---'---   m= S=---'---   m ---'---   m ---'---   mA WA---'---   m ---'---   m ---'---   mF \F---'---   m ---'---   m  ---'---   mJ `J---'---   m ---'---   m ---'---   mN dN---'---   m ---'---   m ---'---   mS iS---'---   m ---'---   m ---'---   mW mW---'---   m ---'---   m ---'---   m[ q[---'---   m ---'---   m    ---'---   m`  v ` ---'---   m    ---'---   m  #  ---'---   md  z d ---'---   m    ---'---   m  (  ---'---   mh  ~ h ---'---   m    ---'---   m  ,  ---'---   mm   m ---'---   m---'---   m---'---  h---'---  h---'---  h X@0??w@ ww0-. 2 X0'.-1@0??w@ ww0-. 2 110''.-I1@0??w@ ww0-. 2 I120''.-1@0??w@ ww0-. 2 130''.-1@0??w@ ww0-. 2 140''.- 1@0??w@ ww0-. 2 150''.-L1@0??w@ ww0-. 2 L160''.----'---  h-- -  |- ---'-- - z, ---'-- - z, -M  M Mq - $q 9 Mq a] Mq 92 ) Macro7%"%---'--- z, ---'--- z, -    q - ] 2  Trojan)%%%---'---  z, ---'---  z, - %  % %q -  $q  9] 9q  2  File)%---'-- - z, ---'-- - z, -   q - - |\ -q }] q  q ] q } 2 m Boot-%%---'--- z, ---'--- z, -   q -- \ -q ] q  q ] q  q q q q 2  WormB%9---'--- z, ---'--- z, -j  j jq -~ V] 2 F Script-"%---'--- z, ---'--- z, -    q --  \ -q q q q q ] q  2  Boot/File-%%)%---'--- z, ---'--- z, -B  B Bq -F >q  2  Else-"%---'--- z, ---'--- h---'--- h- - G!!--  -4--z U ---- - ----->---- - -~F-- F@0??w@ ww0- .2 FMay 1999;'$''''.- ' h----a>_---- - -NFq-- Fq@0??w@ ww0- .2 FqJan 2000$''''''.- ' h---- ---- - -s '-- '@0??w@ ww0- .2 'Jan 2001$''''''.- ' h----. . ---- - - '@ -- '@ @0??w@ ww0- .2 '@ Jan 2002$''''''.- ' h-- -' h '  'CompObjNbObjInfoPWorkbookOlePres000pOh+'0HPdx  이동련a Tim KellyaMicrosoft Excel@.~n{@>kf@͎՜.+,0$ PX|  한국정보보호진흥원       !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ @\p Tim Kelly Ba=  =%<X@"1˳1˳1˳1˳1˳1˳1˳1˳1 ˳1˳1 ˳1 ˳1˳1˳1˳1˳1˳1˳1˳1˳1˳1˳""#,##0;\-""#,##0""#,##0;[Red]\-""#,##0""#,##0.00;\-""#,##0.00#""#,##0.00;[Red]\-""#,##0.005*0_-""* #,##0_-;\-""* #,##0_-;_-""* "-"_-;_-@_-,)'_-* #,##0_-;\-* #,##0_-;_-* "-"_-;_-@_-=,8_-""* #,##0.00_-;\-""* #,##0.00_-;_-""* "-"??_-;_-@_-4+/_-* #,##0.00_-;\-* #,##0.00_-;_-* "-"??_-;_-@_-#,##0\ "F";\-#,##0\ "F"!#,##0\ "F";[Red]\-#,##0\ "F""#,##0.00\ "F";\-#,##0.00\ "F"'"#,##0.00\ "F";[Red]\-#,##0.00\ "F";6_-* #,##0\ "F"_-;\-* #,##0\ "F"_-;_-* "-"\ "F"_-;_-@_-83_-* #,##0\ _F_-;\-* #,##0\ _F_-;_-* "-"\ _F_-;_-@_-C>_-* #,##0.00\ "F"_-;\-* #,##0.00\ "F"_-;_-* "-"??\ "F"_-;_-@_-@;_-* #,##0.00\ _F_-;\-* #,##0.00\ _F_-;_-* "-"??\ _F_-;_-@_-"\"#,##0;\-"\"#,##0"\"#,##0;[Red]\-"\"#,##0"\"#,##0.00;\-"\"#,##0.00#"\"#,##0.00;[Red]\-"\"#,##0.0050_-"\"* #,##0_-;\-"\"* #,##0_-;_-"\"* "-"_-;_-@_-=8_-"\"* #,##0.00_-;\-"\"* #,##0.00_-;_-"\"* "-"??_-;_-@_-\$#,##0_);\(\$#,##0\)\$#,##0_);[Red]\(\$#,##0\) \$#,##0.00_);\(\$#,##0.00\)% \$#,##0.00_);[Red]\(\$#,##0.00\)"Yes";"Yes";"No""True";"True";"False""On";"On";"Off"                + )    "   8f@ *x *8  *8  (   (   h     (  @ @   (@ @   (@ @   ,@ @   l@ @   (@ @   ,@ @   *x  *x  8f@      (@   (8 "0  $ (0 8 8 *x  *x "8 "8 "8@ @   (  8  )x@ @   (@ @  )x  (8 *0P (8  (8P *0PP   h `Chart1^Chart2  "  @" ??3` k` k?3d23 M NM4 ##3Q:  l\Q ;#Q ;#Q3_4E4 ##3Q: \tǩȹQ ;#Q ;#Q3_4E4 ##3Q:  |Q ;#Q ;#Q3_4E4 ##3Q: Q ;#Q ;#Q3_4E4 ##3Q: Q ;#Q ;#Q3_4E4 ##3Q:  lнQ ;#Q ;#Q3_4E4 ##3Q: / |Q ; #Q ;#Q3_4E4 ##3Q: 0Q ; #Q ;#Q3_4E4D$% MP+3O&Q4$% MP+3O&Q4FA~| 3O13 b43*! M4523  O43" f Z 3Oc bXt% Mp73O&Q423 M NM44444#e99 199 199 199 199 199 199 199 1'99 2'99 2'99 2'99 2'99 2'99 2'99 2'99 2'99 3'99 3'99 3'99 3'99 3'99 3'99 3'99 3'99 4'99 4'99 4'99 4'99 4'99 4'99 4'99 4'99 5'99 5'99 5'99 5'99 5'99 5'99 5'99 5'99 6'99 6'99 6'99 6'99 6'99 6'99 6'99 6'99 7'99 7'99 7'99 7'99 7'99 7'99 7'99 7'99 8'99 8'99 8'99 8'99 8'99 8'99 8'99 8'99 9'99 9'99 9'99 9'99 9'99 9'99 9'99 9 '99 10 '99 10 '99 10 '99 10 '99 10 '99 10 '99 10 '99 10 '99 11 '99 11 '99 11 '99 11 '99 11 '99 11 '99 11 '99 11 '99 12 '99 12 '99 12 '99 12 '99 12 '99 12 '99 12 '99 12 '00 1 '00 1 '00 1 '00 1 '00 1 '00 1 '00 1 '00 1 '00 2 '00 2 '00 2 '00 2 '00 2 '00 2 '00 2 '00 2'00 3'00 3'00 3'00 3'00 3'00 3'00 3'00 3'00 4'00 4'00 4'00 4'00 4'00 4'00 4'00 4'00 5'00 5'00 5'00 5'00 5'00 5'00 5'00 500 600 600 600 600 600 600 600 6'00 7'00 7'00 7'00 7'00 7'00 7'00 7'00 7'00 8'00 8'00 8'00 8'00 8'00 8'00 8'00 8'00 9'00 9'00 9'00 9'00 9'00 9'00 9'00 9'00 10'00 10'00 10'00 10'00 10'00 10'00 10'00 10'00 11'00 11'00 11'00 11'00 11'00 11'00 11'00 1100 1200 1200 1200 1200 1200 1200 1200 12'01 1'01 1'01 1'01 1'01 1'01 1'01 1'01 1'01 2'01 2'01 2'01 2'01 2'01 2'01 2'01 2'01 3'01 3'01 3'01 3'01 3'01 3'01 3'01 3'01 4'01 4'01 4'01 4'01 4'01 4'01 4'01 4'01 5'01 5'01 5'01 5'01 5'01 5'01 5'01 5'01 6'01 6'01 6'01 6'01 6'01 6'01 6'01 6'01 7'01 7'01 7'01 7'01 7'01 7'01 7'01 7'01 8'01 8'01 8'01 8'01 8'01 8'01 8'01 8 '01 9 '01 9 '01 9 '01 9 '01 9 '01 9 '01 9 '01 9!'01 10!'01 10!'01 10!'01 10!'01 10!'01 10!'01 10!'01 10"'01 11"'01 11"'01 11"'01 11"'01 11"'01 11"'01 11"'01 11e@*@@@.@?"@"@,@&@?*@&@$@@@???$@@ @@@$@@?@$@@@@?@ ,@ <@  @   ?   4@ .@ @  ?    .@ 9@  @ ? ?    F@ 9@ "@  @    A@ &@ @  @   @@@@@B@*@@C@3@?@E@@@@I@@@@<@@@@0@@@@@=@@@@@,@@@@@ @@ @@?"@@?? @@??@"@@?@?@@?@?@@??@@@ @@??@@,@@@@"@@@@@ ?  @  @   ?!@!@!?!!@!!!"@"?"""@"""e> " @  dMbP?_*+%JMHP LaserJet 8150 PCL 6 dXXLetter.HP LaserJet 8150 PCL 6L J2xe.DAv,!Cda:of!HՉ$&% 6./"ع_p6jW'wu~#^tt W{ܳ9OR3 j2B,!>1zJ9#crC!I`hKpjܢ.>B:ϐOA> ; :@)QNʔ+\{P鋬Cz}^6Y' wYPÙ>u>7r|c s s;v+W\x)tQ--b9[r'TB" dXX??U} } } } } } @} } @} }   ȴ)  J J J @ ;@ @ @ J J J J @  J J J J J J J J J J J J J J J J  & ! " # $ % #@ %$@Ћ@v@,@@@  '  &  !  "  #  $  %~ !? "e#"`@ %A$#@"K@"e@"@"4@ !@ D "f#"p@ %A#ȃ@"@""@"$@ " !@ D "#"H@  %A#{@"K@"6@ "" !@ D "a#"r@ %A#Pp@"1@"2@ "" .h !@ D "# "b@  % A #V@"F@""@ "" ++ !@ D  "# "X@  % A #R@"@$4@ ""+ !@ D  "y# "V@ % A #O@",@",@ ""+ ! @ D  "# "O@ % A #N@"@ """+ !"@ D  ;g# "I@ % A #.@"6@",@ "": !$@ D  "\#"H@  %A#E@"@ """ :d <$@ D  % #%C@ %A&?@%@%%% <&@ D %T#%=@ %A&=@%%%% <(@ D %#%A@ %A&<@%@%%% <*@ D %U#%:@ %A&8@%@%%% <,@ D %#%7@ %A&5@%@%%% <.@  D %#%5@ %A&0@%@%%%--9----- (#,@ %#@ %#X@ %# q@ %#,@ %#4@ % )"@ DD"@ DD"S@ DD"@W@ DD" DD"*@ DD *#@ %4$@Ћ@v@,@@@- Cw-------- @k~ ?8@//0/--- >l~ ?(@22023-- @m~ ?(@//0/--- >n~ ?$@--0--->0lgvu q0<<< J! J" J# J$ J% J& J' Y ( Y - >o~ ? @ //0/1-!- !>p~ !? @!--0---"- "@q~ "? @"--0---#- #>r~ #?@#//0/--$- $@s~ $?@$--0---%- %>t~ %?@%/-0-1-&- &>u~ &?@&--0---'- 'Av~ 'B?'------(<<<<<<<<PH0(  >@7 @  dMbP?_*+%,",??U} } @} }  } } } } } } }  } !!} ""} ##`} $'$$Y$$,$,$,$,$,$, $, $, $, $,$; $J0$; 'x@# (- )6 )7 )8 )9 ): ); )< )=  )>  )?  )@  )A  )B )C )D )E )F )G )H )I )J )K )L )M )N )O )P ). )/ )0 )1  )Q !)5 ")S #5b (z@@"@,@*@$@$@@$@,@4@.@F@A@@@B@C@E@I@<@0@=@,@ @"@ @"@@@ @,@"@6?7@8@# ({@@@@@<@.@9@9@&@@*@3@@@@@@@@@@@@?@@@67@8?# (|*@.@"@&@&@@ @$@@ @@ @"@@@@?@@@@@ @?????@6@7?8# (}@??@???678# (~?????@@@@@@@??@@@@@@6@7@8@# (@?@@@@@@@@?@??@@@@678# ( ?@678# ( ?@@6?78# ( (4@(6@(2@(:@(8@(7@(8@(:@(K@(I@(D@(I@(T@(I@(F@(I@(P@(K@(N@(D@(@@(E@(9@(;@# (,@  % m# (2@  % m# (4@  % m# (,@  % m# (2@  % m# (3@  % m# (5@ % m# (5@ ! % m# !($@ ! % !!m# "4,@ " % ""m# #8&@ " % ##mJ !# ",@  % "" #N#"6hUR!$"$,#$,$$,%$,&$, !(- !)6 !)7 !)8 !)9 !): !); !)< !)= ! )> ! )? ! )@ ! )A ! )B !)C !)D !)E !)F !)G !)H !)I !)J !)K !)L !)M !)N !)O !)P !). !)/ !)0 !)1 ! )Q !!)5 !")S !#5b "(2"?????@@@@@@@??@@@@@@6@7@8@# #(3#@?@@@@@@@@?@??@@@@678# $(4$?@678# %(R%?@@6?78# &(,&(4@(6@(2@(:@(8@(7@(8@(:@(K@(I@(D@(I@(T@(I@(F@(I@(P@(K@(N@(D@(@@(E@(9@(;@#&(@ # %"%m#&(@& %"%m#&(@& %"%m#&(@& %"%m#&("@& %"%m#&(@& %"%m#&(@& %"%m#& (@& %"% m#&!(@& %"%!!m#&"4@&! %"%""m#&#8@&" %"%##mmd (  p  6NMM?b  s]`x  @"x??3` k` k?'3d~*D23 M NM4 ##3Q: MacroQ ;#Q ;#Q3_4E4 ##3Q: TrojanQ ;#Q ;#Q3_4E4 ##3Q:  FileQ ;#Q ;#Q3_4E4 ##3Q:  BootQ ;#Q ;#Q3_4E4 ##3Q:  WormQ ;#Q ;#Q3_4E4 ##3Q: ScriptQ ;#Q ;#Q3_4E4 ##3Q:  Boot/FileQ ; #Q ;#Q3_4E4 ##3Q:  ElseQ ; #Q ;#Q3_4E4D$% MP+3O&Q4$% MP+3O&Q4FA4 Y 3O3 b43*! M4523  O43" i =O3Of ?Xt% Mp73O&Q423 M NM44444#ee                                                !!!!!!!!""""""""e >@A   7 @  dMbP?_*+%,MHP LaserJet 8150 PCL 6 dXXLetter.HP LaserJet 8150 PCL 6L J2xe.DAv,!Cda:of!HՉ$&% 6./"ع_p6jW'wu~#^tt W{ܳ9OR3 j2B,!>1zJ9#crC!I`hKpjܢ.>B:ϐOA> ; :@)QNʔ+\{P鋬Cz}^6Y' wYPÙ>u>7r|c s s;v+W\x)tQ--b9[r'TB" dXX??U} `} `}  }  @} } @,; J0;,,,,, , , , , ; ;,,,,,,,, ` "  * * * * * * * *  *  *    9\ +++~ +?++++ ~  +?    9a +++~ +?++++ ~  +?    9] +++~ +?++++ ~  +?    9^ +++~ +?++++ ~  +?    9V+~ +?++++++ ~  +?    _ 9W99999~ 9? 99 ~  9?     9X 99999~ 9? 99 ~ 9?    =i 999~ 9? 9999 ~ 9?    =j 999~ 9? 9999 ~ 9?    9Y +Z ++++~ +? ++ ~ +?    +[ +++++~ +? ++ ~ +?  ,<,,?,,@,,@,,,&@                      c   H@@@@?@@@@ # =@ %  H&@,@2@&@1@0@1@,@$@(@&@ # b@ %  H,@2@4@,@2@3@5@5@$@,@&@ # f@ % 82q :&ffffpffffrf^$$$$>@7 s 7A8.  -   w''  ' w--  r--'-- w-- $---'-- n-  qqRR33--'-- wn-  --'-- w 0??w@ ww0-"""qq"RR"33"",,::HHVVccqq  &&44BBOO]]kkyy--"System 0-'--- r---'--- ---'--- --% 33AAOO\\jjxxEEddjj^^XXLL00w-w-;;tItIVVddrr-%33AAOO\\jjxxjjww--;;IIVVddrr-%33AAOO\\jjxx--;;IIVVddrr-%33AAOO\\jjxx--;;IIVVddrr-%33AAOO\\jjxx--;;IIVVddrr-%33AAOO\\jjxx--;;IIVVddrr-%33AAOO\\jjxx--;;IIVVddrr-%33AAOO\\jjxx--;;IIVVddrr%-- $%(%"%---'--- 3 $36303---'--- A $ADA>A---'--- O $OROLO---'--- \ $\_\Y\---'--- j $jmjgj---'--- x $x{xux---'---  $---'---  $---'---  $---'---  $---'---  $---'--- E $BEHEB---'--- d $adgda---'--- j $gjmjg---'--- ^ $[^a^[---'--- X $UX[XU---'--- L $ILOLI---'--- 0 $-"030----'--- w- $-t0w-z*w-t---'--- ; $;>;8;---'--- tI $IqLtIwFtIq---'--- V $VYVSV---'--- d $dgdad---'--- r $ruror---'---  $}---'---  $---'---  $---'---  $---'---  $---'---  $---'---  $---'---  $---'---  $---'---  $---'--- %--  ("---'--- 3 60---'--- A D>---'--- O RL---'--- \ _Y---'--- j mg---'--- x {u---'---  ---'--- j mg---'--- w zt---'---  ---'---  }---'---  }---'---  ---'---  ---'---  ---'---  ---'---  ---'---  "---'--- - 0*---'--- ; >8---'--- I LF---'--- V YS---'--- d ga---'--- r uo---'---  }---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'--- %--   $%("%---'--- 3  $3603---'--- A  $AD>A---'--- O  $ORLO---'--- \  $\_Y\---'--- j  $jmgj---'--- x  $x{ux---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $"---'--- -  $-0*----'--- ;  $;>8;---'--- I  $ILFI---'--- V  $VYSV---'--- d  $dgad---'--- r  $ruor---'---   $}---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'---   $---'--- %--  +!-%"%(%"%(---'--- 3- 9/-30363036---'--- A- G=-A>ADA>AD---'--- O- UK-OLOROLOR---'--- \- bX-\Y\_\Y\_---'--- j- pf-jgjmjgjm---'--- x- ~t-xux{xux{---'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- -  ----'--- -  ----'--- - %-""---'--- -- 3)--*-0-*-0---'--- ;- A7-;8;>;8;>---'--- I- OE-IFILIFIL---'--- V- \R-VSVYVSVY---'--- d- j`-dadgdadg---'--- r- xn-roruroru---'--- - |-}}---'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- %--  +!-%"%(%"%(%%%%---'--- 3- 9/-303630363333---'--- A- G=-A>ADA>ADAAAA---'--- O- UK-OLOROLOROOOO---'--- \- bX-\Y\_\Y\_\\\\---'--- j- pf-jgjmjgjmjjjj---'--- x- ~t-xux{xux{xxxx---'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- -  ----'--- -  ----'--- - %-""---'--- -- 3)--*-0-*-0-------'--- ;- A7-;8;>;8;>;;;;---'--- I- OE-IFILIFILIIII---'--- V- \R-VSVYVSVYVVVV---'--- d- j`-dadgdadgdddd---'--- r- xn-rorurorurrrr---'--- - |-}}---'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- %--  ("---'--- 3 60---'--- A D>---'--- O RL---'--- \ _Y---'--- j mg---'--- x {u---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  "---'--- - 0*---'--- ; >8---'--- I LF---'--- V YS---'--- d ga---'--- r uo---'---  }---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'--- %--  +!-%%%%%"%(---'--- 3- 9/-33333036---'--- A- G=-AAAAA>AD---'--- O- UK-OOOOOLOR---'--- \- bX-\\\\\Y\_---'--- j- pf-jjjjjgjm---'--- x- ~t-xxxxxux{---'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- -  ----'--- -  ----'--- - %-"---'--- -- 3)------*-0---'--- ;- A7-;;;;;8;>---'--- I- OE-IIIIIFIL---'--- V- \R-VVVVVSVY---'--- d- j`-dddddadg---'--- r- xn-rrrrroru---'--- - |-}---'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- - ----'--- %--  )%---'--- 3 73---'--- A EA---'--- O SO---'--- \ `\---'--- j nj---'--- x |x---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  #---'--- - 1----'--- ; ?;---'--- I MI---'--- V ZV---'--- d hd---'--- r vr---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'---  ---'--- ---'--- ---'--- w---'--- w---'--- w  @0??w@ gww0-. 2 0.-@0??w@ hww0-. 2 10.-@0??w@ iww0-. 2 20.-i@0??w@ jww0-. 2 i30.-J@0??w@ kww0-. 2 J40.-+@0??w@ lww0-. 2 +50.- @0??w@ mww0-. 2 60.----'--- w??w@P ww0-- -  n- ---'---  m. ---'---  m. - 6 656'-  $'3*6'9$6'3 2 /8Macro---'-- - m. ---'-- - m. -G G5G'-  J*D$ 2 @8Trojan---'--- m. ---'--- m. - X X5X'-  $'U*[$['U  2 Q8File---'---  m. ---'---  m. - i i5i'-- o-e#-i'f$i'l*i'l$i'f*  2 b8Boot---'--- m. ---'--- m. -{ {5{'-- -w#-{'x${'~*{'~${'x*{'x'{'~'  2 t8Worm ---'--- m. ---'--- m. - 5'- *$ 2 8Script---'--- m. ---'--- m. -  5'--  -#-'''''$'* 2 8 Boot/File---'--- m. ---'--- m. - 5'- +'  2 8Else---'--- m. ---'--- w---'--- w- -  r--  -4--x---- - -----j---- - -f--  @0??w@ sww0- .2 May 1999 .- ' w-------- - --- @0??w@ tww0- .2 Jan 2000.- ' w----4---- - -7-- 7@0??w@ uww0- .2 7Jan 2001.- ' w-------- - --- @0??w@ vww0- .2 Jan 2002.- ' w-- -' w '  'NANISummaryInformation(QDocumentSummaryInformation8UT_1083166015 FssOle [ 피해신종 신종내역Chart1Chart2  WorksheetsCharts FPBrushPBrushPBrush9q CompObj\MObjInfo^Ole10NativeDOle10ItemName_      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~@BM66( コ101sus! !BEBBEB! !cecsussuscec! !BEBBEBRURBEB! !コBEBBEBRURRURRUR101cec! !cec޽BEBBEB! !BEBBEBsusBEBBEB101BEBBEBBEBBEBBEBBEBBEBBEBBEBBEBコBEBRURBEBcec101101BEBBEB! !susBEB101101BEBBEB101sus101! !! !101101101101BEB! !101suscec! !Μsus101101BEB! !sussuscecsus! !RUR! !BEB101101BEB! !BEBBEBBEBBEBBEBcecBEB޽ν! !susBEB! !susRURBEB101cecRURRURRUR! !ceccec! !! !BEB! !susBEBBEBBEBBEBBEB! !BEBcec101susBEBsuscecBEBsus101! !! !RURBEB101cec101sussusRUR101101BEBBEB! !! !! !cecBEBsus! !RUR! !BEB101BEB! !BEBBEBBEBBEBBEBBEBBEBνコBEBBEBBEBBEBsus! !BEBBEBsusBEB! !RURBEBBEBcecBEBcec! !susBEBBEB101RURcecBEBsusBEBBEBތsusBEBBEBsusBEBBEBRURsus! !RURcec101BEBRURBEBBEBBEB! !! !RUR101101BEBsus! !RUR! !BEBcecBEBތ101BEB! !cec! !susBEBコ޽νココRURsus! !BEBcecBEBBEBBEBBEB101101susBEBBEBsussus! !cec! !BEB101101cecBEBBEB101BEBBEBcec! !! !! !έBEBBEB! !BEBBEBsusRURޜcec! !suscecBEBBEB101BEBsusBEBBEBBEBRURsussussus101BEBBEBBEBBEBBEBBEBBEBBEB101BEBBEBRUR! !BEBBEBBEB101! !sus101! !コBEB101! !BEBRURBEBRUR101101sus! !suscecRURsusBEB! !BEBRURBEBRUR101cecRUR101BEB101BEB! !! !! !BEBBEBRUR! !suscecsus101101! !! !BEBsus! !RUR! !BEB101BEB! !BEBcecBEBBEBsusBEBΜコBEBBEBコνννRURcecν޽コBEBsuscec! !101101susBEBBEBcec101101susBEBcecRURBEBBEB! !cecsussus101BEBRUR! !BEBsuscecBEB! !sus101cec! !101BEB101BEBBEBBEBBEBsuscecBEB! !cec101! !! !sussusBEB! !sus! !BEBcec! !! !BEBcecRURBEBBEBBEB! !BEB! !sussussussusRUR101101BEBcecBEB101BEBsusBEBsus101BEBsusBEBRURcecBEBBEBBEBcecBEBcec101BEBBEBsusBEBBEBcec101BEBBEBBEBBEBBEB101ﭪcecsusBEBRUR! !BEBRUR! !BEB! !cecBEBBEBBEBcec101BEBcecBEB! !cecBEBBEBﭪcecsusBEB! !BEBcecRUR! !RURBEBRURBEB! !sus101BEBBEBBEBcecBEBBEBBEBBEBRUR! !! !ceccec101! !101101! !BEBRURBEBBEB101101101cec! !BEBRURBEB101susBEBBEB! !BEBcec! !BEBRURcecBEBBEB101BEBsusRURBEB! !BEBRUR! !susBEB! !101BEB101RUR! !BEBBEBRURsusBEBBEBsus! !suscecsusBEBRURsusBEBBEBRURsus! !cec101cecBEBsuscecsus! !RUR! !BEBBEBBEBBEBBEBBEBBEBsuscec101RUR! !cecsusBEB101BEB! !BEBcecBEB101BEBBEBRURBEBcecBEB101BEBBEBsusBEBBEB! !! !BEB! !! !RURsusBEBsussussussussussusBEB! !RURBEBコνν޽ννコ! !! !BEBBEBBEBBEBBEBBEBsus101101susBEBBEBsusBEB! !sus101101susBEB! !RURBEBコBEBcecsusRURBEBBEBBEB! !BEBsusBEBBEB101101BEBBEB101cecRUR101BEBRURsusBEBBEB! !cecRURRURcecBEB101BEBBEBcecBEBcecBEBcec! !! !BEBBEB! !ceccec! !! !BEBsuscecsus101cecBEB101BEBsus! !BEBcec101BEBBEB101BEB101RURcecBEBBEBBEBsus101BEBsusBEBBEB! !sus101BEBsusBEB! !RUR101RURcecBEBBEB101susBEB101101BEBcecBEBތsusBEBBEBBEB! !BEBBEBBEBBEBRUR! !BEBBEBBEBBEBBEBBEB! !BEBRUR! !BEBBEBRUR101ތsusBEBBEBcecsuscec101cecBEBcec! !BEBRURBEBRURBEBRUR101101susBEBsusRURBEBcecRURBEB! !BEBceccecRUR101BEBsus101! !ތsussusBEBBEBsussuscec! !RURsusRURRURBEB101101cec! !! !BEBRURBEBBEB101cec101! !BEBRURBEB101ΜcecBEB101101BEBsussussusRUR101101BEBBEBBEBBEBBEBsussuscecBEBBEB! !RURBEBBEB! !101RURcecBEB! !RUR! !suscecsus! !! !cecBEBRUR! !susBEBceccec! !RURBEB! !101cecBEB101RUR! !cecsus! !RUR! !sus! !RUR! !101RUR! !cecBEB! !! !BEB! !cec101BEB! !BEB101BEB! !BEB! !BEB! !BEBBEBBEBBEBBEBsussusBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBsusΜコBEBBEBνRURcecνννコ޽BEBcec101101susBEBcec! !sus! !cecBEBBEBsus! !susBEB101BEBBEB101susBEBRURcec! !sus! !BEBcecsussus101BEB101BEBコcec101cec! !RUR101BEBRURBEB101cecBEB101! !cecceccec! !BEBcec! !BEB! !! !BEBcecRURcec! !cecBEBޭBEB! !BEBcecBEBcecBEBBEB! !BEB! !! !sus101BEB101BEBsusBEBRURcecsusBEBBEBBEBBEBBEB! !BEBBEBBEBsusBEBBEBcecBEBcecBEBcec101BEBsusBEB101RUR! !BEB! !BEB! !BEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEB! !BEBBEBBEBBEBcecsusBEBBEBBEB101BEBBEBBEBBEBBEBcec101cecBEB! !cecRURBEB! !sus101BEBBEBBEB! !101BEBsusBEBBEBBEBBEBceccecBEBceccec! !BEBRURBEB101sus101RURBEB101101101BEBBEBΌ! !BEB101cecsus101BEBBEB! !sus! !BEB101! !cec! !BEB101101RURcecBEBsusBEB101RUR! !BEBBEBRURRURcecRUR! !sussusޜsusRURcecBEBsussusBEBsussussus! !cec101BEB! !BEB! !susBEB! !cecsusBEB! !101RURcecBEBBEBsus! !RUR! !BEBcecBEB101RUR! !cecBEB101BEB! !cecBEB! !BEBcecBEB101RURsussus101! !BEB! !BEBsusBEBsusBEB! !ޭ! !ޭ! !コBEBBEBコ޽ν! !޽޽ν! !ココ޽ν޽޽BEBBEBBEBBEBBEBBEB101101susBEBBEB! !cecBEBBEBBEBBEBBEB101101susBEBBEBBEBsusBEBBEBsus! !BEBcecsussus101BEBsusBEB! !sussuscecBEBsusBEBBEBBEBBEB101101cecBEBBEB101BEBBEBBEBceccec! !BEB101101cecBEBBEBBEB101BEBBEBBEBcecRUR101BEBBEBBEBcec! !BEBcec! !RUR101BEBRURBEB101BEB! !! !BEBέBEBBEB! !BEBBEBsuscec! !έBEBBEBBEB! !BEBBEBsus! !BEB! !コBEB! !! !sus101RURBEB101BEBBEBBEB101BEBsusBEBBEB! !susBEBBEBBEB101BEBsusBEBBEB! !cec޽BEBcecBEBcec101BEBsus! !BEBBEB101BEBBEBBEBBEBBEBBEBBEB101BEBBEBRUR! !BEBBEB! !ceccecBEBBEBBEBBEB101BEBBEBBEBBEB101BEBBEBBEBRUR! !BEBBEB! !ceccecBEBBEBBEB101BEBBEBBEBBEBBEBcec101cecBEB! !BEBBEBBEBBEB! !BEBBEBcec101BEBRURsusBEBBEBBEBތ101! !BEBRURBEBRUR101! !101BEBコBEBceccecBEB! !101BEBsusBEBsus101BEBcecBEBRURsus! !cec! !BEBRURRURsussus101101cec! !susRURsus! !cec! !BEBRURBEBsus101Ό! !! !susBEBBEB101! !cec! !BEB101101RURcecΌ! !BEB101cecRURBEBBEBsus! !! !sussusRURsus! !BEBRUR! !susRURcecΜ! !! !BEBsus! !BEBRUR! !suscecsuscecޜsusRUR101sussusRURBEB! !susBEB! !cecsusBEB! !101RURޜsusRURcecBEB! !RURsusBEBBEBBEBcecBEBBEB! !sus! !RUR! !RURBEB! !BEBcecBEB! !BEBcecBEB101RUR! !cec! !! !cecsus101BEB! !BEBBEBcecBEB! !! !! !cecsuscecBEB! !BEB! !BEB! !101101cec! !RUR101101susνν޽ν޽BEB101BEBBEB101susBEB101sussusBEBBEBcecsussus101BEBBEBBEB! !! !! !BEBBEB! !101BEB101cecBEBsusRURBEBBEBcecsus! !BEBBEBRURBEBBEB101BEBBEBRURBEBsuscecBEBBEBcecBEBRUR! !BEBBEB! !cec! !RURBEBBEBRURRURceccec! !! !RURBEBBEBRURRURBEBsusBEBBEBBEBBEBBEBcecBEBBEBcecBEBcec101! !BEBBEB101BEBsusBEBBEB! !BEB! !BEBBEB101BEBBEBBEB! !BEBBEBBEB! !BEBBEBBEBBEBBEBBEBBEB! !BEBBEBBEBBEBcec101BEBBEBBEBBEBBEBBEBcecRURBEBBEBBEB101BEBcecBEBBEBBEBRUR101cecBEBRUR101BEBRUR101cecRUR101susBEBceccecRURBEB101sus101BEBBEBBEBRURRUR101BEB! !RURcec! !! !101101101BEBsus101! !! !101101101RURsussus101! !101RUR! !RURcecsussusBEBsussusRURsusέBEBsuscecsusBEBBEBBEB! !cecsus! !101BEBsuscecsus101101sus! !101BEBsusRUR101101BEB101cecsusRURBEB101101susBEBcecBEB! !cecRURBEBތBEBBEBcecBEB101! !101101BEBBEBBEBsusRUR101susBEBcec! !BEBBEB! !cecBEBBEBコνコν޽޽! !BEBsusBEBBEB! !BEBsusBEBBEBcecRUR! !susBEBBEBBEBcecBEB! !susBEBBEBBEBcec! !BEB101BEBBEBコcec! !BEB101BEBBEBBEB101RURcecތ101BEBBEBRUR101BEBcecތ101BEBBEBBEBcecRURRUR! !BEBBEBcecRURRUR! !BEBBEB! !cec! !BEB! !cec! !BEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBBEBsus101ceccec101BEBcecBEBsus101ceccec101BEBRUR! !RUR101cec! !! !BEB101! !RUR101cec! !BEBRURcecsusBEB101! !BEBRURcecsusRURsus! !cecޜ! !101101101! !sus! !! !RURcecsus101101101! !sus! !! !RURcecBEBBEBcec! !BEB! !susBEB! !sussusBEB! !BEBcec! !sus! !BEBBEBBEBcecRUR! !BEBBEBBEBsussusRURcecRUR! !BEBBEBBEBsusBEBBEBBEB101BEBcec! !RURRURcec101BEBcec101101BEB101cecޜΌΌコν޽޽޽コ޽コ޽コcec! !! !suscecsussus101BEBRURcecsusBEBcecsussus101BEBcec! !BEBBEBBEBBEB! !! !BEBBEB! !101! !BEBBEBBEBBEB101cecRURcecBEBRUR101BEBsus101BEBcec101cecBEBBEB101101cecsusBEBRURBEBBEBBEBcecBEBBEB101101cecsusBEBRUR101cecBEB! !BEBBEB101! !޽cecBEB! !cec! !101cecBEBBEBέcecBEBRURBEBsusBEBBEBsusBEBcecBEBέcecBEBsussussusBEBBEB! !cecBEBcec101BEBRUR101BEBBEBcecBEBcec101sus! !sussusBEBBEBBEB101RURcecBEB! !RURBEB101BEBBEBBEB101RURcecBEB! !RURBEBBEBBEBBEBBEBBEB! !BEBcec101BEBBEBBEBcecBEB! !BEBBEBBEBBEBcec101susRURBEBBEBBEBBEBBEBBEBBEB101ތsusBEBBEBRURBEB101101BEBcecBEBBEBBEBBEBBEBBEBBEBBEB101ތsusBEBBEB101101RURsus! !BEBsuscecBEBBEBBEB101! !sussus101cecコBEBcecBEBRURsus! !BEBcec101BEB101RUR101BEBBEB! !! !susBEBcec101BEB101BEBcecRUR101101! !BEB101ceccec! !BEBRURsusRURBEB101susBEBRURBEB101cec! !101cecceccecRUR101101BEBތceccec! !BEBBEBRUR101101RURBEBތceccecBEBcecBEB! !cecBEBcecsussussusBEB101コ101! !sussusRURRURceccecsuscecBEBcecsus! !! !! !! !RUR101RURBEBBEBBEBceccecBEBsus! !! !! !! !RURRURBEBBEBBEBcec101BEBcec! !101sus! !RUR! !BEBcecsus! !BEBBEBcecceccec101BEB101101101101BEB! !BEBBEBBEBBEBBEBcec101BEB101101BEBRURBEBBEBcec101BEBRURcecBEBsusBEBޜΌBEBRURRURތBEBsusBEBތsussusBEBތ޽コνコココBEBBEBBEBBEB! !! !susBEBcecBEBBEBsus! !BEBcecBEBBEBBEBBEBBEBsus! !BEBceccecRUR! !! !BEB101101cecBEB! !RURコRURBEBBEB101RURcec! !BEBBEBBEBcec! !BEB101RUR101έ! !BEBBEB! !ތBEB! !! !! !ތBEB! !BEBBEB! !RURBEBBEBBEBBEB! !susコ! !101BEBBEB! !BEBBEBBEBcec101BEBBEB! !BEB! !BEBBEBcecBEBBEBBEBBEBBEB101! !susBEBBEBBEBBEBBEB! !BEBRUR101BEB101BEBBEBBEBBEBRUR101BEBsusRURBEBBEB101BEBBEBBEBBEB! !RURBEB101BEBcecBEBsus! !susBEB! !! !sus! !101BEB! !susBEBBEBRUR101BEB! !101RUR101RURBEB101101cecBEB101BEB101101BEB101ceccecBEB101cecBEB! !RUR! !suscecBEBceccecBEB! !suscecBEBRUR101101cec! !BEB! !101! !! !101BEBBEBBEBBEB101BEB! !101cecBEB101BEBsusBEBBEBBEB! !101BEB101susBEBsuscecsus101BEB101susBEB101BEBBEBBEB! !cecBEBBEBBEB! !sus! !cec101101BEB! !BEBsusBEBBEBBEBBEBBEBBEBBEBBEBBEBBEB101BEB101ΜތΜތνココννココν޽νコ޽コތcec! !cec! !susBEB! !! !cec101sus101! !101cec! !cec! !susBEB! !! !cec101susBEBsus101! !RURBEBBEB101cecBEB! !cecRURBEBRURBEB101cecBEBsus101BEBBEBBEBBEBBEBBEBBEBsusBEB! !! !sus! !BEB101101sus101BEB101! !101cec! !BEB101101sus101BEB101! !101BEBBEB! !sus101BEB101ceccec101BEBRURRUR! !BEBcecBEB101BEBBEBRURRURBEB! !susBEBBEBBEBBEBBEBBEB101BEBsus! !! !susRURcecBEBcec! !RUR޽! !! !susRURcecBEBcec! !RURBEBceccecRURBEBBEBBEBcec! !! !RURBEBBEBBEBBEBBEBcecBEBBEBBEB! !101RURBEBBEBBEB101BEBBEBBEBBEBBEB! !sus! !BEBBEBBEBBEBsuscec101RURBEBBEBBEB101BEBBEBBEBBEBBEB! !sus! !BEBBEBBEBBEBsusBEBBEB! !! !cec101BEBBEB! !BEBBEBBEBBEBsusRUR101BEBBEBBEBBEBBEBBEBBEBBEB! !! !cecsus! !BEBBEBBEBBEBBEBBEBBEBsus! !susBEBcec! !BEBBEBBEBcecBEBBEBcec! !BEBBEBcecBEBsusceccecBEBBEBBEBcecBEBBEBcec! !BEBBEBcecBEBBEB101BEBBEBBEBBEBcecBEBBEBBEB! !BEBBEB101BEBBEBBEBBEBBEBBEBBEBRUR! !BEB101! !101RUR101BEBBEB! !BEB101101RURRURsusRUR101BEBBEB! !BEB101101BEBcecBEB! !101޽BEB! !! !BEBRUR101cecBEB! !101޽101BEBBEBBEB101sussussusBEBΌBEBBEBcec101RUR! !BEBsussuscecBEBBEBRURBEBBEBRURsussusBEBBEBBEBcec101RUR! !BEBsussuscecBEBBEBRURBEBBEBRURsussusBEBBEBRUR! !cecΜBEBcec101101ceccec! !! !BEBRURsuscec101! !! !BEBsuscec! !! !RUR! !cecΜBEBBEBBEBBEB! !sus101BEBsusceccecBEBBEB101ceccec! !RUR! !BEB101έcec101BEB! !BEBcecBEBcecRURRURsus101έcec101BEB! !BEBcecBEBcecRURRURsusBEB! !BEB! !! !cecsusBEBcecRURBEB101BEB! !cecsusBEB! !BEBBEBsusBEBsusBEBBEBBEBcec! !101BEBsusRUR! !101susBEBcec! !101susBEBBEBcecceccec101BEBBEBBEBBEB! !BEB! !BEBBEBsussus! !BEBBEBBEB101BEB! !BEB101BEB! !BEBBEBBEB101BEB! !BEB! !BEBBEBBEBBEB101ceccecBEBBEBsusBEBBEBBEBBEBBEBRURBEBcecceccecBEBBEBsusBEBBEBBEBBEBBEBRURBEBBEBBEBsus! !sus! !RURsusBEBBEBBEBBEBBEBBEBBEBBEBBEBsusBEB! !susBEBBEBBEBsussusBEBBEBsussus! !! !BEBC?xklTEn[m!F""U|ؖJAKl}Ƕe]#+ &5DcIT?4"`̽wnT1~`7ܹsfsg\TH\Gt#M/}Gr[ðFYaѳU6è>3YŨL< ι::׏;5yiiHj yDjV>sIR,yVM۬tkrq]͒_e ^/iHIYF I J H!9&+:A=>cCpc_wFeƈm'u#!D)JnQrkcCZ$6Q4U"hAZNڎZ(ڇAZ&#fǩd<{k2:c[P7LQ`|O}lWpywz e|9*TvԮ0OT7]e{c0g7skW5 W{Ƕ^Ύus~'_J3vn7q5Q'1I1"Dd$LP  S A? "2!q38VXVki!|CF`!a!q38VXVk.wX[v#/!x] tWuo%H7I15B@BHs9jF`X16V0n?% ul faO%:55'MiHqF4?\v5}Ι۫;3~{ofy o`>7 y$RSSS^QѷD/zhSLM?)7xg+,]'|$1oTRW*SǷׯЮ ?Kp>A߬i| S_#^uKX߈;k S2 D3q{{,D )I,Ksw4}jgӛ3p[5S.G.R5GфlɶlF65M;Ok\>&4Ʒ@kASS%@Cd [n"MdLdپ@vپJd:F6J4&6Ad~A_Wd/[l ɶl ;v1.&dldk'GQ}l$dlwN}l_"5 }l!8Cl?#KlAqJ,|k"ZOoy4;TfY3oNRJ07ΩKwwmi銻w`BR`o JM!hmA):}[PRj]d![]K~OQ/=L=oo JM`ܷ:8ۂRS ԔKmA)u=4JMT+,mA)S,mA)V8m[M~iK_ @/mΗekL5&| |[PjJo JM<ڞʟlɶldk'['Iyqt%H9q鸋ttt{Zcsw Ax,=<ֺ 2p (z%dN5˼~KȂ(d0@y톕~CNDs#(a,x FP^`k YY"l{^#^lwoYY?r(6Ȇ-KCg;ȂwsQȆ^8A﵄,xC,x_R^CAd{(dp<Cp_a Y4 QX ρZGZKȂwQȎ#@ymzKȂ7Q&xZ8o,xA\Ox-zb4 gz--X(68۷XBDD!k[U(~%dA\Cb,k.,! +aP^joÈZ#nXmу7Q |kz~;uuU([,mDF4;;=By=gAROeBya5zAE!ۃ\IxۏXYƈ,5kgcFdck7Z*P^#PZ@0Npy$;MQN`<)/z%dy2 ))*k"}LXFm-ÔaPNNmF, VkX\XYnIJ ӈFIJ|xh Kb.9lh KCZ’,a{;,a,aa e[ĸf ga7l99s,#%,Cp`%,鈱;bKe܈r%,9xX21"Y$#%,# KXWQ/lq?V-:jg3-aq"FKXXG-t?j[R=,aq`>_jM/+zYzZzg5f53e=e5t/i#/;;>az)2p:0Ѡ7g1W"ap1kdd'ݏƌx?:dMlGEa1a=F~lM/'z9zyZ;:elGzMz-k5? Gꪹ6gxx!8S,mĮm hUѴ3je樢"TE8;jqFڱV!-TFT*RFDNks.#t9lH8]JE(nQ؊*A?b.@ {.Dޘq3G51vǶ< ;qSe[58dD5mZ "TÐ} MUΈ*䑧,n9k\ Pc? 0nv'b/@u p7U*1:y7Uդ$yy:ۤ5܈U-QHlFT O3>埉*AU P-gѹvPɈU r*p>nlQ-Z[h.mt"FT+JDt5n+,0j,хոuXCe*EqmDՍmEo­݈ۚQU{؃!WψDDm0jQ.!-T{ }1!-T#P#+jcFTcBMnc8FTsA4E&,nj!xmfUڃZY.f++`+{j+[YY{7زڦykgQC߫qk+Ʀg1 52tD[w16E?[ !C^FV+ MsC1z M:IXW碟-D<0U(@[碟-dE5:S[͌MsCb2:*C YŌMSsdl16d]Uj12tiZbhiL#CR#Cj+ac\Њ #CWUehun~.b#&CЪ uZ[5MsCb2ԅ }*C @.zƶY+y5c2ԃ Vn#C͋mb2mP:&C262t>vv06E?[ d*C}FV /NƦg !C_Ѐ]Z" 26E?[ 02hUzLˈP}1&#>ak1#1jcac|;elG }ƌ:e(aƦx,[ Md(2LU&  E8؊Ln#:Џ2tЏL*jn\Љ M"C? #C/j8p~.bTLRժ 22y)ݦ=[ -82Z/F8\723VgCE+-f2ؖ0.Ix;*f[wXE|Τks(n<%Ms?+f$9M3P-g]nL^L~*F&Wj/Xn\er՟ 9&W:c;rd=u˚&S4Y8EcM15y/jjרL.0~ך&cj+jߨɝZ"=t?s̓E~g2HzG!!k{8f&oTmֽOv.)ܦ9dO?[rL3RcstbeJxUeL:Ƹ[:xKݦe-?v]37o(.3Oq,~9/Gyˏ=j펓\'wǩgn;{ŃrL3TM2NZc2QzƍaK9&_0.drqCmcYb23^mɊxUɜ1^5Kq9CSjM2~Y>1Z VQc\ūRZnF>vd/UB8T=_ ZuW` ~)| KLbɺ)ՙ,dZWdm_ OOva?:c?Ve~)|:ak;f4WF0\DO8lel9~)|l5&1E&?Wɴ;Dgl9~)|lZ?~dGg~)|l{@{޻\=`waRn _$|5&dr|*{L>&~x_ݦ_ LɑLfL>!~gW`<0c3֘82ݪL<$~aݦ_ ;fɉLE&䄑ɢuW` ~)|%&1p\V-LfqGRN3;z[}X |qXG;3;z,F,e%,9Cvy'12ƾ.}ִ;fa!kX&X 嘱=F,'3;z,X[ʜBQs MZ6ɬM )N?Ð9P?HI&L>Pk p W$L>Pkp W$FL>Ps9s6JNP9Jw)\}NCJds )N0P/?H9LN!'Bϭ4d[υIfnL>Ps9s96̙d(B CBL &B2B b2U?Y\bHMqJ0Ð98?HI&L>P$C b2:m)$)\s!\s~nxM2se9C1dCIfL>Ps9sܕ6 J7ǐy7?G&92B2^W$3[&S(s 1 s 0tdr s E2`N!!sNL &B2B %SaȜSh?HI&L>P$C b2`6d(B CBAM29d9"J0Ð9P7?HI&L>P$C b2J3tdr s E2`N!!sN>&nLN!|NH)0d)4m)$)P990tdr s E2PPPFCm: P99ƘAM29d9"J0Ð9?HI&L>P$C b2:m)$)P99N0tdr s E2`N!!sNSLN!&B2Bsd"Ȫsd_ja]03Ot,L*,G,mְ,7b ,݈e5biӈc.#K5,=F,C,=ְ܍Xza7b2b鷆eȈQ2d ˰b%g]Ēe܈E[rԈG5,ǍX~X[2i*b%z2G\;F,oB, aYd6IJ# K5,KX.G,KaYaIJ#@,ְ3bbYg k#{N?g7y5^F^yI[g b鳄1̑={g,{X#=(coaea3bq˘5,F,?@,c?9fF^y9a )#"Lu>˰-5ro{h*p&SS'=mgVrh ;<.Ω>Ξm{ 6^կ?߻:"P#P+;}Մ`CjEGVkkGZ\#&ԎZ\#x_MΨZ# $7 nA' ?5<{oH%FnNyUK6T#kuJh*VBװӕac =v[n+ioQ As>!wQ I CL g RBbsc~_yխ7)7θ`W _َg%ƚUa P2Ji!5 iSO=O=<Sb}Gڹڵٿf;ųp/;_νr?Ϧ)gĽν,"{ܛ έrFJ!*o,}^#8#ۀ#8#pt/pGpmpG8nO8#68#7'݋tGp{pGpNE:#8n 8#8'@ @"Gp7Gp ?OG?ZL GpG Ǫ e|4ZD]A]/p>VClj-pPmɅqG_ ^OGpcϟ?Ͽ~?)}߽7#P`iA\\BNVHܓ|4oy~|hA(s!_~/* ]@Vg|􊶚"Gv|d{]؜"-hm4W@2NwK%Ó?K$77[gϞ-%H1Y\Tɧ"=><#?>cTgOVHԗ&QD}feaʳC*,H#h3(u RZ*?*jmT5d՝q۽S%Uժ_OE˳'M[>a0~!0ʉ@OR|٧fP[.2G_ҙ%ʖ4l>< eȗ;Y\Hq(U]Uofcu508ύѨ=LVV}Dec|-Nꉾz~mKZ 0S,q\(s|`A}ſ+uyE:󃩸IMV~rj2OkdEPRu*..ӝ4W53VgP']CuXkʲZi0liS>R$~;㈝PW`h)^.=f):WT=Z8J8}'}A9wp_-Jh!%L*ꥃcS>ZoJhzxBF^{k<xQܗZ280"%w>E猒(, %EUDWPIBbdPV5FgGXO}|mr`P!@SGItbV~sPi8eQj / dn{N~ F4Ƞ~o%<{Lg,[)ڌGb˟#sfO?JН6["ԓ/̈n U  @׆4si`Up_2A<&8+O҃dj7Jr7@yZDdBr1Z#=_O_{58YY9LyV_L טU%.˾'4(_.ݗẀz(6jp3a `9Im o b+G8 zw5VzmG5KO2K][ޗIe`;d_m.Wp6O)C 5qgĒk]Acn'}A y5վ?-pEٚmB_lCVQjiU053]ZċnˊsRjAE֋qJj[g" CebxԌajѺY1ojoiR&,9P"<C'[ꗽS l[I|]~ieuy6J;9J@2EۿS{doCpp;DljBgmlqniƛ8iٜMnNiy˄GV!!U"oQᎌ`-Lhehc彩{)ӷ'lՠN"ybt ɂ[lRNiO WZm#}\Ĩ0]\KD<[IfIdcȩt4C؛<%R[6ICM،3IbN嗊(τTW'hQᎌR NR?B:[m `a\*p<j+}VK{|$Ga/|5*8!P$O&S:#8F`z#8[L7hEVޝd NМx.6!pG5+8#0wAGE.RѮ( Z&ҪN kMs%bx.@[EnIO@MZE."}Zr\bOsX brn W|٧!R NI+\۔MkgO è5LŰuC7 pr`B_yKF0@zIlb " a:!OxxDVT1➪VW5ElL2&wCW DFuin㤧9CbTNҠ|խe\L)Yʴ)D㺘 r kaQ²%"de1dD,ʢi#-f 9e"@~V@ ]-?ʗf.#Q6LwTK|!7xARqQ>RC,BE=a"j?U( Xƶ4ۤVs>ܿL b`u5=.;Z>);=nt,œ|K&+i:F&z |a6M$AP7c5>L&YqgCER||M{adT&#0KBJr_5',e(}^#8# lԢ8?R/8nwZj]# 9 <W o&b;#\|q{GpF@ 80QƼKT;#Tx% ū Q hg& piD|Y ղprȨ2WTzyFRZWW0\?!uxN(~Ӣi*<ʗVQ'X$ /Dh|yeXeϥTk_eK.䬆$48Y:|KRݢ!*G~J1|s>ِ^&P]d>:5UL5 ș&] QY|J)q@HXYi*#L[z8\@P̆/!]ij3XZq VZ WEz%(7)4d\ImEX X:h{t# Oo>Y_;-䴱"yӽՎqvM4ENz\쾨?3ԗ0o[,^с/OZ~瞞1ĥ A.252rzuodZ*-iEup)Mu=ƒuVAU$h!)c03&8$&Й H>XwdkC)奱;-ޟ3Kǒ'+=,n2rI&O,Dēk Ge/de]m]n)Qh+5I4-)]D)D_] &SaXpvC0cHa#:3&8ǻpgeMJ{l/NwUh7T9]zņ1Au#86adr1}屘 `g(A4&]E +E7M􃥛qeץj7PiXYz 8ɪU*`h #nʬ&۴lIvI&.Af3>4Eqg^)>q]@xd޵w_g^@Btb8Fzm^{Ɗ,xV!Y|x4a"WFJ^F ̈́z1YQD&Z^np6Hp\E;cAQ=^M4Wg.S(/T@}᤯JP9_Ylp)~i7V肦 c| ReuƜjAκǣAko2AVVm7&`8k)qGde2nǙh!p N$XA~-EK ^p4U'jnZc4M|vGOK8#;#8#`/,[`3],qe5# q9!];mB.#8!kGWpG`;뽿juG~78g̼;rsB,F }yeb2Q'^'+4uH0QsRbNy:L2,I31w3Rjtb)Z/Rn9s|L\T =*fv]rsҋZiq C"]]]qDEa:_#”O:Ts_z:bz%>X=UDN\"*B*Zd x%"!I~A\HbckW Q&W>ױcGmvf^gtmN Z~*Ƕ+ŔusGbJ;,)(R1& H:>%iz3RYʜ@6M*7w,Wi8|>>.J)!HeuSW¡W\N|~miNZs *'K^ r^T@uUXbXNOP1RdMH'a*fe8giye Ck=D(Nk *0~kx56Y 2kNo!+͂1tA"MPxE +t/^{5{ܿ@YE϶*eNwEbM-7]IvLz`9F'5@줯Hۇtܘ^"{pm xqG`wMŒ; Q`W^bu0QH|@z`F_?*Id}ONm(kͰ[{чE&Q&vSbd;dҪ FA*d-iMO?q]ğ~).m祄r'kHKvA+2-b]sM>:Nf -0>m|fϴo_1R_$u0à7mE_^/3Y>Q 7' MZ;YOgY.ᣯqzԎk uWPC/_oQB4ts%$D+G-ԍ۳4{>'kq"rϹL2[Ny&+AF&L8H7NU]8U$O\ŜG"Wri0|$Ga$ *P)!n]<.#8#0 z;9SqGpwAiAiهk9d?U_2Qt!3=#8#7GpNcyCE >kq[!MyxQœi"`3 ^1 ` 68\(õ"tBIcWsuL+Yl_RC1_K"߸qcW/dx \ «?zU^5+UY\Zps(x~8bsL`ߨI͝Sӊր_hEd)U0eAj ɶkvj"ЏEwQ{IHm'm&[]]rw\7!]N_<8)6ۆQ':u8,6< d|1qsx'L>tYi;Ϯ IR;qPKN }1|ҎEca%m UʔA9E^ʧ|w*,uctwCn<S -}U93Ue8G@r΃Z /B4fq[K8#-.sbapGp~.j-6q N"Y F@r2{2W28q.hչ؎#8F sGpv@Q,/ )4 b:Ons(:) Q`dPn.#lB몇aQ׊):c+zl.pY5י Q&b7t 0%G,DA:ˆ_ZNLWJ*`V覆YiQa;tJ1oל6Gx)z2M u$|ѡ 9uL3Oa2*rr,0\Α% С-dC&[Mb2II `՛%kT(H)"ճaAmͨX {שjo mm[W 3^4V1 K$N.j])*pKiuA_7Z& EM30j fէ]r5 ӞBwe=nq'lP.2Ltٴ0S|DsdɐHd!}ȓN Y`跜!GX 8zwgvt"Gqƻ͑sM|aof#"xQ5i4E ",\a{wus0mxpu|RnZǯ4#k6F-+1#i8moZnxGd尣[?ykս&R=@(ꡆܴhe%?FZ;mC~x 8ڒqt/*PCjÙxƘVG[V, Y.'ׇp "AÕD|vY6ɴn{(f NLEt8YCL1`nf=s吩zJCBHCE_Zգɱ>oL&${|B=Ў4Ӫ;jo$mV+pu:USȆbt~) h*2OduQ-W{:lߥ2YT=ҠheME``h9cC`>y6Ghϟ {8 דLmh(m/`xۇAK [u~s;J[D]9)=l~;kSmd)m*fo_kLcǏULwj0{-6ʚbNZҷIhfw9Z7F S gR̝f/p첺9GQmTV,]іzڍ_cQ!^(RnؐheYv;si6ٍ|0bC.wwBb/F&hN3#;a3CBnc€3CjId)s`pO}892@1?o2@&%˔!zGa@̧v‹:'g5Zq2E4#yhmONJ[zߢ2Ue|2dȄ8 ^G2\AW]5q[ g8#9~eU&3˫8#lt7ȮېYH C&\{O*S!3:pG`7.#8N`9sW:SņaL;ű]l`{YE9DaΊĜ~#VrN (׾ '9Ю/R!#)tfk t"ښx޲0^#ѩ 9&Ϣ:]t`Yo^]M(z|V,wG<$䤰O>D#5m @ΐGIR-Yn/'hHhcp;ƙa$FKTT`l&2av+Z~ nbE4, 8}si5Od"CQBȗA e)MI;>{|vKQ5d&Ha陮J_ŭWHuʿ4ȉ+-[մԁ`uiP.ݑ8rڋ'(g-4 &x܏oR` H 59gvQ+{,5 GiEi5`:{D#Ip:^*5ŕրa@AY4FPC %Q8ZrT?BH{ E(]o=J_tpw[,vX_HFkK0|X˴6E$ -W %sڞt]X_-~(0= UO>ܸV CcNpo&gHy2൅" #kgFi٧ +^PֱzA&dl''E 4֢dU7>آ“ꭔ *6>'A&Um2kYv;GGjvNB޾FE(4$Fxd}J01=ުI\nD(9AcXe)H![ s,_.Gj(W+nY/R沥]1G  "'o$n FO{ߜYz>D)K".Aˡ[52zi8}xm=GpG`zn;j.#8#tAoV  kL1#ȐخS qpA xvG7n͟K8#S:.^@-.yzxҼN͞:" lԋš -o'#[GGݿv\<׉!R=hZu]S* t]'clθݸױ}{~%";ʊÒ8C([(ԁjP z$peh޴;ҕ"A`ϫɟ6:܎@:(cETO 摢~3uG8< v -l+8ِV8ۂGTۜH(1+92o&Ϣ$W43nP c-v > ]!$!Q-f)EWhQᎌ4c権EIN8$|@~ɇAqJ-'/_t&-xSrVy_vD9/_H)HCb$HG,D+$wOxqGGꕗ_!0npBEt܅,_:vH WMKJehH"i fMwZ˓gIX=0'ͱժJb̌M!0cLῦ\>LCcFSNA34ir$[ ~3X CqY◉/M/"s_ϊk׊W4\nL+&A]*Ѣl~hZzln$iʯ}~VPPtW[wFSܕ\ Kk¸P9ˆPJ) #( 35֓身t)sZ4v/8lATTJkUp4hթUݟVC!VP푓[߭dtAݔ=V?+:.U=+H'BGبL$hR}BX1g{oU z̈́U8,72iE+݋Ņ>5S9WaA4>[;J|.ag 7&VkɪfE|#k5RJE 9U;)V]6~|Z"ՋAdm~BZٿW|C `Q9'y;X"Yᤃ%=לG >K qw0R[4 ',$ܸq)d״-|*zpX־0! WFx ֐?j4LnrP v?嵠ENZva2YΖ!W tungiaY/b?F =:*=a;4fԊ $/o1ETà Ɖ1sqGKJXY0SDn+>}ўٱb7O@[XB6p~~Dkl"ÿqs1KHpr3YAP1ḧJ =ms\CKSS[mã{-z/MZ>g@mfGw3XJ"W䭟m`鑚x6^f⳻dB !xiN>$]}x!}1AS*Gև? F>9,LuDc}1mFR'~sa\ʈb[䋖 %ES[r&KXFܲ + XKYS/ZKhkȣm&jenixMn &8uuYT&m )=VskHz>H&i^r]z*-ّ5|avi퓝Ss]w8 ta-j􍧱tHM }UW >ܒQG{!BnGIKQYͳ)6M2qHR^E'X~R.!AKິ\'qu p(pG@?}6a] ^eGpGwAgqc8^l.*ј !31K8#p>sz#8c"GI+>׉M&@t-ǙԉH vLɇ@HڹEׂds=I^0Epړ6'LlЁE1Ǹw'yB}0ZaZ\*-CυM~ ]~4̩aC'0}z&ы8*&/T_EtS0}L}z6>#f DT,p2ύV(.#&cd' 8REP q1گ4-/'rG0*#ɷ/!QTG':dHnTݯޠlwnkDnGW~;|րzHF6J%sד&h/c֯`mJXG(P.5PNv儌Ych:jچ><+B^rգMWX!v4$]^z)2.{U1)+̤ecU= qKx VE09AYGyx{D{7cE*ft hچ}PKފv0P/`k! qlY3+٘gϟQa;FPe:k;g1kΡC^D.C澨32 !ƣk9[2/] +&:dzf; o> d|t0~n+-gYͥd=?2Vb1cL+Ѧ*=lmѳVho[I(lrm;&,:T6)T˶>QI7Fƺ &,FpZ٦=`ZAl_l.JۢGņGv֯sB&H -āYl3  A#naC!%c w0h|yƉQ?^`(Ff>S!ٱ0"B-cz$䙜HV D5`S<3Ov.8ĩ.Et38nGy@_.E]v$t p|15\ʬuS;]R/٫R<qs8#B ܺ Ğ#8#pQ낾(q䴼*# 9 BN πw\lGp}#x#8;EE#6džW$יaĕ>UQ&TAn HBO8#W&NtoZ7nXԜܰ>5 K(f΄;=KY#8 t0I^4nΗ)i}٧v2N< KwGX>0!>5)"aձWB'͋ٶ|$#:a8>Y9lOå߽~e)@$ ]: ggEGt$㕗_!vg8w)s%ou*6 g|ס$!ZË$"8YT:\>OsSѕޤWRo?39OC# 9 ]8ECϚ0Lz8d i 2JïSFvWƉ/:w^2Ĕ*C ?}QS8.gp C>yj:f~o/a*{!GGrNzuwEqA`𝲢uQ (KHPd*Xl|z$v/XkKff̤Vۇė _U#8Cֆۿ=֮fLݵ7Gb.o1N3>J"%̰1~2dQ.>r~7+)|.d}#8F g[5L?SJi$Ҷ&]0֤)SL Ӈ*]lוJ5\K>8_L +3d6&MX<2'1 |ÖTa=~ 65=y)h^!NbɳQ4$gߓYG52z7G4LΜ2e6m1I"tGq"rx^#A^x͉7qH Nl+Rz]## 9 <W tSz\lGpG`3ι:o)8#8_q\Fp H(ங8ĩE xͦy;#838#>ׄ8'8* j8^:l)8#=0<3_jeGWKW})zoQn/xG@rz9x>ƒ4'8I"yzE"лhzUavovMbX r5C8#8"?<`]$GpG`p݇q 苵;G*<8AEu,jH>ހ/pGpmpG8\мz,BB'*0)#/Rgޫny˝H C/<ϧ]{UI/Br$v< 0q %g55Z"FH\z$0v8GL~g UW/:܎dpߪ9ExC 0>yA4N,Oa?>b \{ps Ӣ}*\8U׀9K~p_.X``8`}γ |p_T 2)S(3q8ԨN*>3^4*܈pW1>Yx)߹d`Ob&V/2ѯ/XY}rb'.>=LX5$)*UAK&.|j$GBp9EC|̀'׀5}ŔWeBb+C̪m;ʄ "g&ٖ-!~( ppk_]>WC=8# ]8qH׀#!߸qޯa}B@.B9L|9/nlOb}O[/pG  0Vx1Ή̲n)5ă3CpB_qRR/}׷Ƒ%qGX 0u笳&06k%%۸; շ>dwڋ :g, + 8#b4l U&f}{ϕY2寖b&{y>,U!4΀dUg{2\-*"'q;&vE<16E#LS k$.Zx_Cwpw$G*<8AsC$,.W"]v/xG@rz9x>ƒtx؎#8f/ߦ tfGpptǑr; #q,+fZ358# ؛#8#p:998EUxj)EnII8CpVKd'wZ"z$GӮ½*!9q.cn9YJ7t# Nxa9Y4[?yםy79hIG0(dpߪ9ExC p qsLD 0GlrF'(Rr[## 9 eiź)K&: |p$GB9EC\YY!Z 04 {i8t_0fHh<HfW2Ef.1 ss.zp$GK۫a8qxt1 ۲p swvGQ@7x3x-YvO5e4x6rFxWJd?9# Zkw`8 mԈƍ~u}IΟ|I"CZxUO3Ygf?8#0>`4kb>XW/]5B5%\xk6=%1QnL|SG;fY9# @ͷ0G39˷qcsL@gwMΘ͟smPHc8$#8 ܭRFbawQ.aBWᶩpV~f5sQCv~=3M&#O~4~Fa+^8UlpVθ*^{$$EJa8/[9 2'H CVgUx$C,g#Sj.=?ۊeW6H C/<Uxpu NqGpJhgVNIpGp ,8#8}p_<=7GpG 7Y0y"GpG/n9#8Y΂9#8}pOpGB pLpG苀xzn#8@n`D#8@_ssGpp'rGp"/#8#,<#8#7}Gp,gGp8#d![n>>7IENDB`DyK yK ,http://www.gcc.go.kr/DyK yK .http://www.kftc.or.kr/DyK yK ,http://www.fss.or.kr/DyK yK ,http://www.mnd.go.kr/DyK yK .http://www.nhic.or.kr/DyK yK .http://www.mohw.go.kr/DyK yK .http://www.moct.go.kr/Dd+V  c $A? "2pxm<n4a`!pxm<n4\.  r xڭY tEN Gv!oalA ω8 *"*" ȀAaDYUu꾗9o;3<~Nﮪ`  i%Pʀ+(Y^JKh1m$@DhsJkKqN;:6mƗ%Vġ Zxm΁e[^"pً8BlKmGa7R_O㸿CmKmd;g)؎Gm^`LLU <1XHAcm MA{دp}p\[oei~eu`u:8)O`<-o `|dʱ^ԗxލ'l~a_8|a׶=MdאGVe%KH ̢FRIyA̡JIu| ge?y;p"x̅-Hxl 4s|GI)y1{:dN5X2?4RC6ʛ8~ Rp\+nL9,cJc)S1A1Pp sޒ()óP/B"吡<KJX8p9ׄ+nĝ銡{g·<.삎]P|ʛO\Np)N8iy6R>!Tz.KE.G>)q. 3ɇ|N^q՛χdWʵW9I1J,2Jˁ%=]li y< (,Oa5nq5a7w #&PB'J8MИjM"x -x?x ,V[KY-̟0>f?.4C7dǘ'pY%gI_Yf=7oX}3AmkSsߨ9CEḮϳ޳.I8zΡ|Q}^}{>1{.+(Foeݥ*zMҔ_;#GVٻf:КV -x 4%Ѐ_Zh-'ոUE)gF*PBm^s&X(gSn6Zz+2ϒx$g)rNo?tCv mi]MŴΠCSlp"Sx XC-V{l2uҗV7ہz-9]uweG=me-KUlg/`xB?Sup+3-9>|B~V5 a'W}%q}sVKH$iJGNkYnG9KoTy?x,m0,> m| %eE7'celL1y,46p)MMSւ\Z6Q[sxOG_Su6Ro3Qu{j&H;J9r.a^A3Daa{:XܠwoG8{gz?0I-acg4/Q6"SiyOifZorLUh.QMT:OSVK|zÚ#M4N}MT0e8]KΗpVZ\lͺep%=$l ՠ@^ ݯKA}x=ۂYC/<4ժ>secO>  ~qM3#ηq]}k;3چ\Zt.QCS0YDSe"- zJRvIYN~ŋWL=XUo"V87S-]ߥwR=% jLVoYpW>\OY^-fMcoQL \aJbp1`)rf84ѬV+AWL6XތT)-=~w_Ic L2{)ReG/}@֒ C&ajm2O,8D& {}or{Ę,keA>RQ0GB &+ k}77Le =rTۅ{dd1yp:ȉѾ Zq0JٲdoOk[1 9u*>&~W"^.NըsVG},эFލU4ǬxCx` zh g?1HWTj)ŷgE 7=c)>Eh\ݣVEc%~(zhvH11|ppKXܨ7$q~wjHeut,ӱX`}8ĐwHL.7dKQx+g;$\wV/`o9֏vry.?0QoU7}77z*[gxأ־=q!Ysm(y(.FN': ̽KOʐ- w=ULO-5G7r%TI3ˌ.8Kw} z68hgVz* u$f]LוV8_:K8Qڞ[C?n%]2 .ql.ϖx;!yVN-i|OYrKzXQ=mG-ԃI9(B#ToWZVy8p"z;Ű*ƞdDF[=cʷ:hꌁ{GV:ƽ9*ˌɣc6ɜd΄*k\?kɜl=cU*G\?r=eٝŚ<nP Qe1pj=~BH?!1Y8qړ ġ ϓx?Js^4j1oY-KT,R'Kcc#R BlZ1LBT9TO&G<~PRxr,q+Su'x"ƞcp2 =m?-E< SAi~e4fit9|e1!e۩l<2 Uv#Ϗ -/uH7{W٘<:3 2]=)E3F/gUlL/i1mɮv5[h)5^3eQ;INZ;Jmo *BZ݇$@V)hAZA\uš?l2JJuQƋvdЬԖI*O՜'cU>Ygl/ytt_.VT5}_|x? 1TableXSummaryInformation(`DocumentSummaryInformation8~ CompObjhj      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstvwxyz{|}~{ iT@T Normal$ 4xa$CJ_HaJmH sH tH @ Heading 1K$$ & F 84&&5$7$8$9D@&H$^&`a$'5CJOJPJQJ^JmH nHsH tHz@z Heading 21$ & F 41$5$7$8$9D@&H$#5CJOJPJQJmH nHsH tHv@v Heading 31$ & F 41$5$7$8$9D@&H$5OJPJQJmH nHsH tHp@p Heading 44$$ & F 41$5$7$8$9D@&H$6PJmH nHsH tH8A8 Heading 5  & F@&OJQJ8Q8 Heading 6  & F@&OJQJ8a8 Heading 7  & F@&OJQJrr Heading 8. & F <1$5$7$8$9D@&H$6OJPJQJmH nHsH tHx x Heading 9. & F <1$5$7$8$9D@&H$&56CJOJPJQJmH nHsH tH<A@< Default Paragraph Font\C\ Body Text Indent" 4s^`smH sH fOf Even_footer& s !1$5$7$8$9DH$CJPJmH nHsH tHfOf enumlev1/ & F h4V5$7$8$9DH$aJmH nHsH tHVO"V enumlev2+ & F 4@^`mH sH JOABJ Figure_subtitleUU]U^U6OB Figure_body>$ eUU-D5$7$8$9DH$M ]U^UCJPJaJmH nHsH tHO Figure_source@U&d-DM P]U^`CJPJmH nHsH tHOb Box$ e$d %%d %&d %'d %-D5$7$8$9DH$M N %O %P %Q %]^CJPJaJmH nHsH tHF!rF enumlev3# & F -nnW^n`WrOr Toc_title_list $1$5$7$8$9DH$#5CJOJPJQJmH nHsH tHtt Even_header'$ x1$5$7$8$9DH$a$#5CJOJPJQJmH nHsH tHO Table_sourceI$ 77<&d1$5$7$8$9DH$P^7`CJPJmH nHsH tH00 Box_source6CJ0ab0 Box_subtitle6 Table_subtitle-$$$ x1$5$7$8$9DH$a$#6CJOJPJQJmH nHsH tH Footnote separator+$ q1$5$7$8$9DH$a$#5CJOJPJQJmH nHsH tHTOT Table_text)$$d.<<5$7$8$9DH$a$aJtOt Annex_ref4 $ 4x1$5$7$8$9DH$a$OJPJQJmH nHsH tHj"j Country_Name!$ 4a$"5CJ<OJQJ\mH nHsH tHLL Normal_after_title"@mH nHsH tHXX Section_title#$<@& ^`$a$mH sH && Box_table?zz Even footer:@ 4_$s !x1$5$7$8$9DH$CJPJmH nHsH tHL"L Annex_NoA$ 4a$5CJOJQJxO"x Annex_title,B$ 41$5$7$8$9DH$a$#5CJOJPJQJmH nHsH tH<2< Heading_iC56OJQJmH sH FLF DateD 4xPJmH nHsH tH4!"4 Appendix_titleECJ*R* Appendix_NoFNN Ref_titleG$a$"5CJOJQJ\mH nHsH tHRR Ref_textH 4^`mH nHsH tH,, NoteId CJmH sH FF Enumlev1_dashJ & F 4>!> Enumlev2_dash K & FmH sH FF Enumlev3_dashL & F 4nZZ Enumlev1_carr+M & F 4e^e`bb Enumlev2_carr+N & F 54SR^R`mH sH RR Enumlev3_carrO QQ^Q`mH sH 4"4 CaptionPx5CJ\aJ,U@, Hyperlink >*B*CJV^@"V Normal (Web)Rdd[$\$CJOJQJ^JaJnHtH$2$ H3S1$5CJfOBf table titleT$<x$d  N  5B*PJmH nHphsH tH OR H4U1$5pObp figure title1'V$$d -DM N 5PJ^JmH nHsH tHO Table SourceEW$ 77<&d1$5$7$8$9DH$P^7`CJPJmH nHsH tHzOz Figure Body:X$$$ -D1$5$7$8$9DH$M a$CJPJmH nHsH tH2P@2 Body Text 2YmH sH BBB Body Text,Ne Zdd1$ B*phbb Outline001_18[ p@ P 1$^`(O( Default Para,O, annotation rCJ00 annotation t^CJ00 Definition T_1$dd Definition L9` ) hp@ P !h1$^h(O( Definition6$"$ H1b1$5CJ0$2$ H2c1$5CJ$$B$ H5d1$5CJ$R$ H6e1$5CJ*b* Addressf1$6hrh BlockquoteAg ) hp@ P !hh1$]h^hO CITE6$O$ CODE CJOJ QJ ,O, WP9_Emphasis60O0 WP9_Hyperlink>*B*.O. FollowedHype>*B* 0O0 Keyboard5CJOJ QJ bb Preformatted+n # ~< z9!$1$ CJOJ QJ PP zBottom of o$$d1$Na$ CJOJQJPP zTop of Forp$&d1$Pa$ CJOJQJ$O$ SampleOJ QJ (O!( WP9_Strong50O10 Typewriter CJOJ QJ $OA$ Variable6,OQ, HTML Markup<B*"Oa" Comment<r figure source8w7x&d-DM P^7`6CJPJmH nHsH tH`` Table_#$x$$ 40xa$;CJPJmH nHsH tH@@  Balloon TextyCJOJPJQJaJ>V@> FollowedHyperlink >*B* ph+J2NQ/t9<Q/8JKLMNOPQRSUWW {d 6  } U ; ai"|5iH8X\'nV@d$g $$(*s..M//0L12Q2~22y4669S;x>@ANC1ErEEErILXLNRRU?Y\_`s``%aaa|ddflIl*pQpnpJqzqjsswK|C߆ЉZlΘ)ݝߟ'7K7 C(^a#ݩ4R~.Cc!#?FHIXYZĮǮˮϮӮԮڮݮ %')+-045;=?ADHNOUY]aekqrs߯nZ[\²ֲ $(.457<AFKQVWųdzȳгҳسܳݳ !"15>@AHLRTU]ajmn|~ô˴ӴԴ !-.FJĵKL`bͶж 56JLMNO]^_Ƿȷӷٷ߷ 23@CXYmpĸŸٸ۸ ()*kptx|ĹɹιӹԹչnp»ûŻѻػ߻%&(7>DEGOU[\^lsyz|ʼмּ׼ڼa |Ǿ־&%$Y9^P{if? "Kx~v XIzMRckl,uv34KQvu($}*&JKLMNOm Q2H 82BKpm,_I  $ N tOQjiRu$1  %!!."/"Z"d"k"{""""""""""""" ##)#F#Z#r########$$$ $&$>$S$}$$$$$%%%&U&|&&&&$'h' (()}))***+V+++,N,,,,A--.. .P.Q.r.s.v.......///L/M/N/O/R/0@0@0@0@<0@<0@0@0@0@0@0@0@0@0@0@00@0@0@-0@-0@.0@-0@.0@.0@-0@.0@.0@.0@.0@-0@.0@.0@.0@-0@.0@.0@.0@-0@.0@.0@.0@-0@-0@.0@-0@.0@.0@-0@.0@.0@.0@.0@-0@.0@.0@.0@-0@.0@.0@.0@-0@.0@.0@.0@0@0@+0@0@0@0@0 0 0 0 0 0@0 0g @0$@0$@0$ 0$@0s. 0s. 0s. 0s. 0s. 0s. 0g @0Q2R0~2R0@0Q2@06@06@R06@R06@R06@06@06 0g @01E(@0rE@0E@0E(@0rE@0L@0L(@0rE@0R@0R@0R@0R 01E(@0_@0` 0` 0` 0`@0`(@0_@0|d@0|d(@0_@0l@01E(@0*p@0Qp(@0*p@0Jq 0Jq 0Jq 0Jq 0Jq 0Jq(@0*p8@0Љ@0 0 0 08@0Љ 0Z 0Z 0Z(@0*p@0@01E@0ݝ@0ݝ!0ݝ!0ݝ!0ݝ!0ݝ!0ݝ!0ݝ@0ݝ 0g @0@0@ 0 0 0 0 0 0 0@0!0!0!0!0@0!0!0!0!0!0!0!0!0!0!0 !0 !0 @0@0C@)0C@0C@0C@0C@0C@)0C@)0C@0C@0C@0C@0C@T0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@ 0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@W0C@W0C@W0C@0C@0C!0C!0C@0C@0C@T0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@T0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@T0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0C@C@0C@0C@0C@0C@0C@0C@0C@C@0C@0C@0C@0C@0C@C@0C@0C@0C@C@0C@0C@0C@0C@0C@0C@0C@0C@0C@0@T0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@T0_@0_@0_@0_@0_@0_@0_@0_@0_@U0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@W0_@W0_@0_@0_@0_@0_@T0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@0_@W0_@0_@0_@V0_@V0_@0_@0_@0_@V0_@V0_@X0_@0_@0_ 0g @0(@0|@Y0Ǿ@0Ǿ@0Ǿ@0Ǿ@0Ǿ(@0|@0@0 0 0 0 0 0@0 0 0 0 0 0@0 0 0 0@0@0(@0@0 0 0 0 0 @0 0 0 0@0(@0@0~ 0~ 0~@0 0 0 0 0 0(@0@0 0 0@0 0 0 0 0@0@'0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0(@0@0@0(@0Q@0v@0v@0v@0v@'0v@0v@0v@0v@0v 0v 0v 0v@0v@0v 0v 0v@0v@0v 0v 0v@0v@0v 0v 0v@0v@0v 0 v@0v@0v@0v@0v@W0v(!0Q@0O(@0Q@0 @0 !0 (@0Q@0 @0 @0 !0@;0 0 0 0 0 0 @0@)0@0@0@0@0@0 0g @0@0@0@0@0@0@0(@0@0(@0@0@0(@0@0(@0@0@0@0(@0@0@!0@!0@!0@!0@0(@0@0@0(@0@0(@0@0@!0@!0@!0@!0@0@'0@0@0@0@0@0@0@0@0@;0@0@0@0@ 0@0@@0@0@0@0@0@0@;0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@ 0@0A 0A 0A 0A 0A 0@B0@0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 00@10@10@10 0@0@:0@0@;0@0@0@0@0@0@0@0@0@0@0@0@0@0@:0@0 0JJlHHK $ V  R t  ' v  _ 0S^Or9Z~bkD1JeyUFn!$E(+.13Q68|@rINT]eDM[eghijklnqtuwy{}~ i'"#(M3L5Q61Ic%eQtKЍ“C(a4~.Ӳݲ'4=NYqZ47VǷܷ!TӸKL]ǻ߻2(ӽ¿߿Es^{"~k}&MQBR$%&&'(()**h+-.//023L3Q3   !"#$%&'()*+,-./023456789:;<=?@ABCEFGHIJKLNOPQRSTUVWXYZ\]^_`abcdfmoprsvxz|P3%8RTUWu8RTUWu (\vxy{ E _ a b d  0 3 4 6 T     = ] w z { } 5 O R S U s  5 8 9 ; Y 3A[^_aIcfgi "@]wyz|0235SkJdfgi)CEFHf2568V8RUVXv<VYZ\z!$%'E{Nhkln+?+T+V+|+++++++ ,,5,L,N,t,,,,,Q/XX  X%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%TĕX%Tĕ̕ tX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕX%tĕ̕:::XXXXXXXJQSU`iK!4   0e0e     @  5% 8c8c     ?A)BCD|E||S"@H 0(  0(  B S  ?4 _Hlt9915682 _Hlt9915683 _Hlt9844240 _Toc9915658 _Toc9561997 _Toc9915659 _Toc9561998 _Toc9915660 _Toc9561999 _Toc9915661 _Toc9562000 _Toc9915662 _Toc9562001 _Toc9915663 _Toc9562002 _Toc9915664 _Toc9562003 _Toc9915665 _Toc9562004 _Toc9915666 _Toc9562005 _Toc9915667 _Toc9562006 _Toc9915668 _Toc9562007 _Toc9915669 _Toc9562008 _Toc9915670 _Toc9562009 _Toc9915671 _Toc9562010 _Toc9915672 _Toc9562011 _Toc9915673 _Toc9562012 _Toc9915674 _Toc9562013 _Toc9915675 _Toc9562014 _Toc9915676 _Toc9562015 _Toc9915677 _Toc9562016 _Toc9915678 _Toc9562017 _Toc9915679 _Toc9562018 _Toc9915680 _Toc9915681dnumddatedorlang**$$s.s.Q2g2~2~2661E1ErErE__*p*pݝݝCC__||QQ__uu}&../R/@@@  !"#$%&'()*+,-./0123++$$..g2}22266qEqEEE``PpPp66bb{{¾ƾtt&../R/~-4el)%/%%%%%,,44555@6D8L8::OOPPPPTT UUqUzUUUWW2X2|q@<۾EJ !&e6)~-&蚘bhU&eTbJ$v!TK i $S!R?!fQ%A^!nrs}!`le$;c!&c"6۾E 6Y7h}7Z\8H4YI8"Y5i8s?8B=8 N3: E;t& w; X` =^'>̐@> ؍1 C?N+OtH?LBqL @^!@R"H@x-tl(ChkgCuH7HD~V>EC;#G =7GxbB}GZ<f$#H|x|-.I|'v:I( cI"%J$>FJJ68sJ ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r u v w x y z { |  0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... `^``o(........808^8`0o()^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.^`OJPJQJ^Jo(- ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( hh^h`56o(.88^8`o()L^`L.  ^ `.  ^ `.,,^,`o(()HH^H`.^`.L^`L.^`CJOJ QJ o( pp^p`OJ QJ o(o @ @ ^@ `OJ QJ o( ^`OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( PP^P`OJ QJ o(o   ^ `OJ QJ o(^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.808^8`0o(.^`o(.808^8`0o(..808^8`0o(... ^`o( .... ^`o( ..... `^``o( ...... `^``o(....... pp^p`o(........h hh^h`OJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(?^`OJPJ QJ^Jo(-l^`lo(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJQJo(@ @ ^@ `OJPJ QJ^Jo(-h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(88^8`CJOJ QJ o(^`OJPJQJ^Jo(-^`.  ^ `.\ \ ^\ `.,,^,`.^`.^`.^`.hh^h`o(88^8`o(.p0p^p`0o(..@ 0@ ^@ `0o(... xx^x`o( .... HH^H`o( ..... `^``o( ...... P`P^P``o(....... ^`o(........^`OJQJ^Jo(  55^5`OJ QJ o( ^`OJ QJ o( ^`OJQJo( mm^m`OJQJo(   ^ `OJ QJ o( = = ^= `OJ QJ o(   ^ `OJQJo(   ^ `OJQJo(h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(^`o(.\^`\()E\E^E`\\^`\. \ ^ `\()1 \1 ^1 `\ \ ^ `\.y\y^y`\()\^`\--^-`OJQJ^Jo( ^`OJ QJ o( ^`OJ QJ o( ee^e`OJQJo(   ^ `OJQJo( 5 5 ^5 `OJ QJ o(   ^ `OJ QJ o( ^`OJQJo( mm^m`OJQJo( ^`OJQJo(^`OJPJQJ^Jo(% @p@^@`pOJ QJ o(u p^`pOJ QJ o(l ` p` ^` `pOJ QJ o(n  p ^ `pOJ QJ o(u  p ^ `pOJ QJ o(l p^`pOJ QJ o(n p^`pOJ QJ o(uh ^`OJ QJ o(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(h^`.h^`.hpLp^p`L.h@ @ ^@ `.h^`.hL^`L.h^`.h^`.hPLP^P`L.^`OJQJ^Jo(- ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o( 88^8`OJ QJ o(^`OJPJQJ^Jo(-^`.  ^ `.\ \ ^\ `.,,^,`.^`.^`.^`.h ^`OJQJo(h pp^p`OJ QJ o(oh @ @ ^@ `OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h PP^P`OJ QJ o(oh   ^ `OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(h ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hh^h`)^`)88^8`)^`()^`()pp^p`()  ^ `.@ @ ^@ `.  ^ `.^`o(.\^`\()E\E^E`\\^`\. \ ^ `\()1 \1 ^1 `\ \ ^ `\.y\y^y`\()\^`\h^`B*OJQJo(phh ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(**^*`o(. \ ^ `\()\^`\R\R^R`\. \ ^ `\() \ ^ `\> \> ^> `\.\^`\()\^`\hh^h`OJPJ QJ^Jo(- H\H^H`\OJ QJ o( \^`\OJ QJ o( \^`\OJ QJ o(l 4\4^4`\OJ QJ o(  \ ^ `\OJ QJ o( | \| ^| `\OJ QJ o(l  \ ^ `\OJ QJ o( \^`\OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.t^`t0^`0.  ^ `..  ^ `... `^`` .... ^` ..... PP^P` ...... (^`(....... X (X ^X `(........^`o(()\^`\()\^`\E \E ^E `\. \ ^ `\() \ ^ `\1\1^1`\.\^`\()y\y^y`\ p^`pOJ QJ o(l @p@^@`pOJ QJ o(n p^`pOJ QJ o(u ` p` ^` `pOJ QJ o(l  p ^ `pOJ QJ o(n  p ^ `pOJ QJ o(u p^`pOJ QJ o(l p^`pOJ QJ o(n 0p0^0`pOJ QJ o(uh 55^5`OJ QJ o(qh ^`OJ QJ o(oh   ^ `OJ QJ o(h   ^ `OJQJo(h uu^u`OJ QJ o(oh EE^E`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(@xh ^ `^`OJPJ QJ^Jo(- \^`\OJ QJ o( +\+^+`\OJ QJ o( \^`\OJ QJ o(l s\s^s`\OJ QJ o(  \ ^ `\OJ QJ o(  \ ^ `\OJ QJ o(l _ \_ ^_ `\OJ QJ o( \^`\OJ QJ o(k^`ko(. H\H^H`\OJ QJ o(l\^`\\^`\.4\4^4`\() \ ^ `\| \| ^| `\. \ ^ `\()\^`\?^`OJPJ QJ^Jo(-l^`lo(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........h ^`OJQJo(h ^`OJ QJ o(oh vv^v`OJ QJ o(h F F ^F `OJQJo(h   ^ `OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh VV^V`OJ QJ o(^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(  ^ `o(.\^`\()\^`\H\H^H`\. \ ^ `\() \ ^ `\4 \4 ^4 `\.\^`\()|\|^|`\@xhh^h`.Vh^`Vo(.8^`o(..^`o(...xp^`xo(....  ^`o( .....  X ^ `Xo( ......  ^ `o(....... 8^`8o(........ `H^``o(.........hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........^`CJOJQJo(^`CJOJ QJ o(opp^p`CJOJ QJ o(@ @ ^@ `CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(^`CJOJ QJ o(PP^P`CJOJ QJ o(^`o(^`o(.^`o(..^`o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... `^``o(........ ^`OJQJo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(^`5OJPJ QJ^Jo(- ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(  p ^ `pOJ QJ o(l^`OJPJQJ^Jo(% @p@^@`pOJ QJ o(u p^`pOJ QJ o(l ` p` ^` `pOJ QJ o(n  p ^ `pOJ QJ o(u  p ^ `pOJ QJ o(l p^`pOJ QJ o(n p^`pOJ QJ o(uh^`OJQJ^Jo( ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(h hh^h`OJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(808^8`0o(.0^`0o()pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........hh^h`o(88^8`o(.p0p^p`0o(..@ 0@ ^@ `0o(... xx^x`o( .... HH^H`o( ..... `^``o( ...... P`P^P``o(....... ^`o(........88^8`o(.^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.808^8`0o(.^`o(.808^8`0o(..808^8`0o(... ^`o( .... ^`o( ..... `^``o( ...... `^``o(....... pp^p`o(........^`56CJOJQJo(^`56CJOJQJo(.^`56CJOJQJo(..^`CJo(... mYm^m`Yo( .... mYm^m`Y56CJo( ..... mYm^m`YCJo( ...... f`f^f``o(....... ^`o(........ ^`OJPJQJ^Jo(- ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(h 88^8`OJQJo(h ^`OJ QJ o(oh   ^ `OJ QJ o(h   ^ `OJQJo(h xx^x`OJ QJ o(oh HH^H`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(0^`05o(0^`05o(.0^`05o(..0^`05o(... 88^8`5o( .... 88^8`5o( ..... `^``5o( ...... `^``5o(....... ^`5o(........h ^`OJ QJ o(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(h ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(k^`ko(.)^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. Y\Y^Y`\OJ QJ o(l \^`\OJ QJ o( \^`\OJ QJ o( E \E ^E `\OJ QJ o(l  \ ^ `\OJ QJ o(  \ ^ `\OJ QJ o( 1\1^1`\OJ QJ o(l \^`\OJ QJ o( y\y^y`\OJ QJ o(h Q^`Q56CJo(h^`.hpLp^p`L.h@ @ ^@ `.h^`.hL^`L.h^`.h^`.hPLP^P`L.h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(808^8`0o()^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.?^`OJPJ QJ^Jo(-^`o(.^`o(..^`o(... ^`o( .... ^`o( ..... ^`o( ...... ^`o(....... ^`o(........hhh^h`.h88^8`.hL^`L.h  ^ `.h  ^ `.hxLx^x`L.hHH^H`.h^`.hL^`L.p^`p.@p@^@`p.p^`p.` p` ^` `p. p ^ `p. p ^ `p.p^`p.p^`p.0p0^0`p.h^`o(.8^`o(..^`o(...xp^`xo(....  ^`o( .....  X ^ `Xo( ......  ^ `o(....... 8^`8o(........ `H^``o(......... ^`OJ QJ o(q ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........88^8`o(.^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.hh^h`o(.hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........0^`0o(0^`0o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........ ^`OJQJo( @p@^@`pOJ QJ o(n p^`pOJ QJ o(u ` p` ^` `pOJ QJ o(l  p ^ `pOJ QJ o(n  p ^ `pOJ QJ o(u p^`pOJ QJ o(l p^`pOJ QJ o(n 0p0^0`pOJ QJ o(uh ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(h^`B*OJQJo(phh ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(h hh^h`OJQJo(h 88^8`OJ QJ o(oh ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(hh^h`o(.  ^ `o(()\^`\\^`\.4\4^4`\() \ ^ `\| \| ^| `\. \ ^ `\()\^`\hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... `^``o(........hh^h`o(hh^h`o(.0^`0o(..0^`0o(... 88^8`o( .... 88^8`o( ..... `^``o( ...... `^``o(....... ^`o(........h 88^8`OJ QJ o(h ^`OJ QJ o(oh   ^ `OJ QJ o(h   ^ `OJQJo(h xx^x`OJ QJ o(oh HH^H`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(^`OJPJQJ^Jo(- ^`OJ QJ o(o pp^p`OJ QJ o( @ @ ^@ `OJQJo( ^`OJ QJ o(o ^`OJ QJ o( ^`OJQJo( ^`OJ QJ o(o PP^P`OJ QJ o(@xhh^h`.hh^h`o(.  ^ `o(()^`o()TT^T`OJPJ QJ^Jo(-4\4^4`\() \ ^ `\| \| ^| `\. \ ^ `\()\^`\ H\H^H`\OJ QJ o(l \^`\OJ QJ o( \^`\OJ QJ o( 4\4^4`\OJ QJ o(l  \ ^ `\OJ QJ o( | \| ^| `\OJ QJ o(  \ ^ `\OJ QJ o(l \^`\OJ QJ o( h\h^h`\OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(h hh^h`OJQJo(h88^8`.h ^`OJ QJ o(h   ^ `OJQJo(h   ^ `OJ QJ o(oh xx^x`OJ QJ o(h HH^H`OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(88^8`.^`. L ^ `L.  ^ `.xx^x`.HLH^H`L.^`.^`.L^`L.`0`^``0o(-p^`p.@p@^@`p.p^`p.` p` ^` `p. p ^ `p. p ^ `p.p^`p.p^`p.h ^`OJQJo(h ^`OJ QJ o(oh pp^p`OJ QJ o(h @ @ ^@ `OJQJo(h ^`OJ QJ o(oh ^`OJ QJ o(h ^`OJQJo(h ^`OJ QJ o(oh PP^P`OJ QJ o(^`o(.\^`\()E\E^E`\\^`\. \ ^ `\()1 \1 ^1 `\ \ ^ `\.y\y^y`\()\^`\~}|q@# lTq&2JdxT"5vTK H@G4p7ptSH"bn* Hk 6E;!P5%E;;jx[i r!@XK!k cIhl4V+9_VrH` JR!UC#i'w{[p&ye!^1K_@T0%0jHcXvPsvF/r)'~Xp\%0 m% ,WIb89v]oM'>7X&FR0xJ$vgilqi=8XOFf/ qYikEckEc{ 0Kti0Kti0 | 0z(z(X| 0q"q"| 0}}| 0<} 0''} 0X` =X` =}0f$#Hf$#H} 0@^^@^^,~ 0-U-Ux~ 0rA,rA,~ 0 UL UL 0\0MD){0q'3i/+[Y~7WDHo?!7HD& w;s}!5i8&').[J\<53L$'lDpj k NZq=-e3lq*_ 0q*_ 0q*_H 0(-|Yb56)Y~2q<!OjtH?_P2%A^!3m_i .l"%J{8O&h}7H'm;c!K<FJTb2 9!d~_GA-!p>E#j3I-oqqd)68s9v+R/jzOdNVhM j+xp.w5/5kgI8B#kc"6+Z8u>2nwTP Dj~BU[G{ @xh h^h`OJQJo(8.@or@li@ow5pbo@ef@;m@de@000h @h h^h`OJQJo(  @)D!)|"@)#()쀪$()$%()\&.'^0.́(.P @.!."@.#)0$()h%()&()؃'^0()(() @.̄!.."@...H#....$ .....ԅ% ...... & .......p'^0 ........Ć( .........( @CJ OJQJo(" | @CJOJQJo("                   ֊        P        j+                 _ά        *          Oh+'0, <H d p |  Template emp Tim Kelly im %Traitement des cas -- Formatage SPUft SPU template.dots -kellymp3llMicrosoft Word 9.0-@F#@@֑s@Us+                 X        .\R            bT                                                          ~O^                                             rX      3        X        $        V @n                ,xY        )~        6ȷH8*(ZDd`M        VvL.8       BU:                          .\R        6                 M        .\R                                           M                          @6?2~7 ˘6|fd֋rh        0                  J[        M        TH                                   .\R          rX        Trl                        $        Fx        E                 (                  -        ~O^   @&\   8G                         TZ         ,xY         ~_                         hb@        `8                          ,xY        t        ,xY                         TH           ՜.+,D՜.+,D px  ITU~0  Template Title(OW _PID_HLINKSHeaderA<Jp =http://www.moct.go.kr/s+:http://www.mohw.go.kr/h47http://www.nhic.or.kr/4http://www.mnd.go.kr/ 1http://www.fss.or.kr/f,.http://www.kftc.or.kr/+http://www.gcc.go.kr/! _Toc9562018! _Toc9562017! _Toc9562016!  _Toc9562015! _Toc9562014! _Toc9562013! _Toc9562012! _Toc9562011! _Toc9562010  _Toc9562009  _Toc9562008  _Toc9562007  _Toc9562006  _Toc9562005  _Toc9562004  _Toc9562003  _Toc9562002  _Toc9562001  _Toc9562000* _Toc9561999* _Toc9561998* _Toc9561997# _Toc9915681# _Toc9915680, _Toc9915679, _Toc9915678,| _Toc9915677,v _Toc9915676,p _Toc9915675,j _Toc9915674,d _Toc9915673,^ _Toc9915672,X _Toc9915671,R _Toc9915670-L _Toc9915669-F _Toc9915668-@ _Toc9915667-: _Toc9915666-4 _Toc9915665-. _Toc9915664-( _Toc9915663-" _Toc9915662- _Toc9915661- _Toc9915660. _Toc9915659.  _Toc9915658Z#mailto:chinyong.chong@itu.int[.mailto: chlim@if.kaist.ac.krChapter_Titlel      L'                hp(                 bͰATp;6,dd@tN*         ,xY        tnJؔEvgYwxV                  ~_       d ^6                 $        j                                   h                          ;o        䇄                  t                  @AHLRTU]ajmn|~ô˴ӴԴ !-.FJĵKL`bͶж 56JLMN]^Ƿȷӷٷ߷ 23@CXYmpĸŸٸ۸ ()kptx|ĹɹιӹԹ»ûŻѻػ߻%&(7>DEGOU[\^lsyz|ʼмּ׼ڼMRckl,uv34KJKMNZ"d"k"{"""""""""r######$$$ $S$}$$$. .s.v......//L/M/R/@55"55Q/`@Unknown Srivastavagoodricksrivastakelly Dodoo, Avita  Gz Times New Roman5Symbol3& z Arial;|i0Batang9& |i0Dotum˳I& ??Arial Unicode MS9& |i0GulimtqTimes New Roman BoldTimes New RomanQ '[SOArial Unicode MS?5 z Courier New;Wingdings=& hMS PGothic=hMS PMinchoG5  hMS Mincho-3 fg"1Vh[[ݳef+~*!Vnn+0d012qV<C:\program files\microsoft office\templates\SPU template.dotTemplate Tim Kellykelly  FMicrosoft Word Document MSWordDocWord.Document.89q