³ª´® Á¤º¸º¸¾È±â»ç Á¤º¸º¸¾È»ê¾÷±â»ç ÃʱÞÀÚ Çؼ³¼
- ÀúÀÚ<ÀÓÈ£Áø> µîÀú
- ÃâÆÇ»çÇѱ¹ÇмúÁ¤º¸
- ÃâÆÇÀÏ2016-05-17
- µî·ÏÀÏ2021-04-28
- SNS°øÀ¯
- ÆÄÀÏÆ÷¸ËPDF
- ÆÄÀÏÅ©±â4 MB
- °ø±Þ»çYES24
-
Áö¿ø±â±â
PC
PHONE
TABLET
ÇÁ·Î±×·¥ ¼öµ¿¼³Ä¡
ÀüÀÚÃ¥ ÇÁ·Î±×·¥ ¼öµ¿¼³Ä¡ ¾È³»
¾ÆÀÌÆù, ¾ÆÀÌÆеå, ¾Èµå·ÎÀ̵åÆù, ÅÂºí¸´, PC
º¸À¯ 1, ´ëÃâ 0,
¿¹¾à 0, ´©Àû´ëÃâ 1, ´©Àû¿¹¾à 1
Ã¥¼Ò°³
º» Ã¥Àº IT ±â¼ú ¹ßÀüÀÇ ÀúÇØ¿äÀÎ º¸¾ÈħÇØ¿¡ ´ëÀÀÇÏ°í °ú°Å, ÇöÀçÃø¸é¿¡¼ °¢Á¾ º¸¾È À§Çù¿ä¼Ò¸¦ ÆľÇÇÏ°í ¹Ì·¡ ¹ß»ýÇÒ ¼ö Àִ ħÇØ¿¡ ´ëÇؼ ´ëÀÀ ÇÒ ¼ö ÀÖµµ·Ï Á¤º¸º¸¾È¿¡ ´ëÇÑ ÇнÀ°ú ÈÆ·ÃÀ» ¸ñÀûÀ¸·Î ÀÛ¼ºµÇ¾ú´Ù. ¶ÇÇÑ Á¤º¸º¸¾È¿¡ ±Ù¹«ÇÏ°í ÀÖ´Â Á÷ÀåÀÎ, ÇöÀç Á¤º¸º¸¾È ´ëÇб³ ´ëÇлý, º¸¾È¿¡ °ü½ÉÀÌ ÀÖ°í ÇâÈÄ º¸¾ÈÀÎÀÌ µÇ±â¸¦ Èñ¸ÁÇÏ´Â °íµîÇлý ¹× ÁßÇлýµéÀÌ ÀÚ½ÅÀÌ ¾Ë°í ÀÖ´Â Àü¹®ºÐ¾ß¸¦ Á¶±Ý¾¿ ³ë·ÂÇؼ ÁýÇʵǾú´Ù.¸ñÂ÷
1 STEP Á¤º¸º¸¾È °³¿ä1. Á¤º¸º¸¾È ¸ñÇ¥
2 STEP ¾ÏÈ£È
1. ¾ÏÈ£È ¹æ¹ý
2. ´ëĪŰ ¾Ë°í¸®Áò°ú °ø°³Å° ¾Ë°í¸®Áò
3 STEP ÀÎÁõ
1. ÀÎÁõ(Authentication)°ú Àΰ¡(Authorization)
2. Á¢±ÙÅëÁ¦(Access Control)
3. »ýüÀνÄ
4. OTP(One Time Password)
5. Ä¿¹ö·Î½º(Kerberos)
6. SSO(Single Sign On)
7. PKI
8. PMI
9. ÀüÀÚ¼¸í
10. i-PIN
4 STEP ÀÎÅÍ³Ý º¸¾È ÇÁ·ÎÅäÄÝ
1. SSL
2. SET
3. IPSec
4. ¹æȺ®(Firewall)
5. IDS(ħÀÔŽÁö½Ã½ºÅÛ)
6. VPN(°¡»ó»ç¼³¸Á)
7. IPS(ħÀÔ¹æÁö½Ã½ºÅÛ)
8. NAC(³×Æ®¿öÅ© Á¢±ÙÁ¦¾î)
5 STEP ¼¹ö º¸¾È
1. UNIX ½Ã½ºÅÛ ±¸Á¶ ¹× º¸¾È
2. Secure OS
3. ESM(Enterprise Security Management)
4. UTM(ÅëÇÕº¸¾È°ü¸®)
5. PMS(ÆÐÄ¡°ü¸®½Ã½ºÅÛ)
6 STEP Á¤º¸º¸È£ ÀÎÁõü°è
1. ISMS¿Í ISO 27000
2. PIMS
3. ITSEC
4. TCSEC
5. CC ÀÎÁõ
7 STEP »çÀ̹ö ¹üÁË
1. ÇØÅ·
2. BotNet(º¿³Ý)
3. DDoS
4. IP ½º´ÏÇÎ
5. IP ½ºÇªÇÎ
6. ¼¼¼Ç ÇÏÀÌÀçÅ·(Session Hijacking)
7. ÀçÀü¼Û °ø°Ý(Replay Attack)
8. Àº´Ðä³Î(Covert Channel)
9. »çÀ̹ö ¹üÁË¿Í Æ÷·»½Ä(Forensic)
¢Â °³ÀÎÁ¤º¸º¸È£¹ý Áؼö¸¦ À§ÇÑ °¡ÀÌµå ¢Â