ÄÜÅÙÃ÷ »ó¼¼º¸±â
º¸ÀÌÁö ¾Ê´Â À§Çù


º¸ÀÌÁö ¾Ê´Â À§Çù

º¸ÀÌÁö ¾Ê´Â À§Çù

<±èÈ«¼±> Àú | ÇѺû¹Ìµð¾î

Ãâ°£ÀÏ
2023-08-28
ÆÄÀÏÆ÷¸Ë
ePub
¿ë·®
32 M
Áö¿ø±â±â
PC½º¸¶Æ®ÆùÅÂºí¸´PC
ÇöȲ
½Åû °Ç¼ö : 0 °Ç
°£·« ½Åû ¸Þ¼¼Áö
ÄÜÅÙÃ÷ ¼Ò°³
ÀúÀÚ ¼Ò°³
¸ñÂ÷
ÇÑÁÙ¼­Æò

ÄÜÅÙÃ÷ ¼Ò°³

´«¿¡ º¸ÀÌ´Â °ÍÀÌ ´Ù°¡ ¾Æ´Ï´Ù

»çÀ̹ö º¸¾ÈÀº ±â°è¿Í Àΰ£ »çÀÌÀÇ ¸ðµç ¿µ¿ª¿¡¼­ »ì¾Æ ¼û½®´Ù. Çϵå¿þ¾î¿¡¼­ ¼ÒÇÁÆ®¿þ¾î, ºñÁî´Ï½º, µ¥ÀÌÅÍ, ±ØÈ÷ »çÀûÀÎ ¿µ¿ª¿¡ À̸£±â±îÁö ¿ì¸® ÁÖº¯°ú ¹ÐÁ¢ÇÏ°Ô °ü·ÃµÅ ÀÖ´Ù. ÀÌ Ã¥Àº µðÁöÅÐ Çõ¸íÀÌ °¡Á®¿Â »ê¾÷ º¯È­¿Í »çȸÀû À̽´ ±×¸®°í ¿ªµ¿ÀûÀÎ ±¹Á¦ °ü°è ¼Ó¿¡¼­ »çÀ̹ö º¸¾ÈÀÇ ÀÇ¹Ì¿Í À§»óÀ» Á¶¸íÇÑ´Ù. ÀÌ °úÁ¤¿¡¼­ ¾î¶»°Ô ÇöÀç¿Í ¹Ì·¡¸¦ ÁغñÇØ¾ß ÇÏ´ÂÁö ÅëÂûÀ» ¾òÀ» ¼ö ÀÖ´Ù. ÇöÀå¿¡¼­ Æò»ý Èû½á¿Â ÀúÀÚÀÇ ÅëÂûÀ» ´ãÀº ÀÌ Ã¥À» »çÀ̹ö º¸¾È Á¾»çÀÚ´Â ¹°·Ð C·¹º§ ÀÓ¿øÁø, ¸®´õ¿¡°Ô Çʵ¶¼­·Î ÃßõÇÑ´Ù.

ÀúÀÚ¼Ò°³

¼­¿ï´ëÇб³ ÀüÀÚ°øÇаú¿¡¼­ °øºÎÇÑ µÚ ¹Ì±¹ ÆÛµà ´ëÇб³¿¡¼­ ÄÄÇ»ÅÍ°øÇÐ ¹Ú»ç ÇÐÀ§¸¦ ÃëµæÇß´Ù. ÀÌÈÄ Åػ罺 ÁÖ¸³´ëÇб³ ¿¬±¸¿ø, »ï¼ºÀüÀÚ ÄÄÇ»ÅÍ»ç¾÷ºÎ ¼±ÀÓ¿¬±¸¿ø µîÀ» °ÅÃÄ Á¤º¸ º¸¾È Àü¹® º¥Ã³±â¾÷ ½ÃÅ¥¾î¼ÒÇÁÆ®¸¦ â¾÷ÇØ ±¹³» ÃÖÃÊÀÇ ¹æÈ­º® ¡®¼öÈ£½Å¡¯À» ź»ý½ÃÄ×´Ù.

2000³â Çѱ¹ ±â¾÷ ÃÖÃÊ·Î ¼ÒÇÁÆ®¹ðÅ©º¥Ã³½ºÀÇ ÅõÀÚ¸¦ ¹Þ¾Æ ´ëÇѹα¹ º¥Ã³ ½ÅÈ­ÀÇ ÁÖ¿ª, º¸¾È 1¼¼´ëÀÇ ´ë¸í»ç·Î À̸§À» ¾Ë·È´Ù. 2007³â ½ÃÅ¥¾î¼ÒÇÁÆ®ÀÇ Á¤º¸ º¸¾È »ç¾÷À» ÀμöÇÑ ¾È·¦¿¡¼­ ÃÖ°í±â¼úÃ¥ÀÓÀÚ(CTO)¸¦ °ÅÃÄ ÃÖ°í°æ¿µÀÚ(CEO)·Î ÀÓÇÏ¸ç ¾È·¦À» ¸í½Ç»óºÎ Á¾ÇÕº¸¾ÈÀü¹®È¸»ç·Î À̲ø¾ú´Ù. 2014³âºÎÅÍ´Â SCÁ¦ÀÏÀºÇà ºÎÇàÀåÀ¸·Î¼­ Á¤º¸º¸È£ÃÖ°íÃ¥ÀÓÀÚ(CISO)¸¦ ¸Ã°í ÀÖ´Ù.

7¡¤7 µðµµ½º¿Í °°Àº ±¹°¡Àû À̽´¸¦ Æ÷ÇÔÇØ °¢Á¾ »çÀ̹ö ħÇØ »ç°í ÇöÀå¿¡¼­ ¸®´õ½ÊÀ» ¹ßÈÖÇß´Ù. Áö±Ýµµ ±â¾÷, ±â°ü, ´ëÇÐ µî¿¡¼­ º¸¾ÈÀÇ Á߿伺À» ¼³ÆÄÇÏ°í »çÀ̹ö °ø°Ý ´ëÃ¥ ¸¶·ÃÀÇ ÁÖ¿ªÀ¸·Î È°¾àÇÑ´Ù. Àú¼­·Î ¡º´©°¡ ¹Ì·¡¸¦ °¡Áú °ÍÀΰ¡¡», ¡º¾î¶»°Ô ¹Ì·¡¸¦ Áöų °ÍÀΰ¡¡»°¡ ÀÖ´Ù.

¸ñÂ÷

1Àå ÇÇÇØÀÇ ÇöÀå

¿ìÅ©¶óÀ̳ª ÀüÀïÀÇ ºñ±Ø_Hybrid Warfare
»çÀ̹ö °ø°Ý, ·çºñÄÜ °­À» °Ç³Ê´Ù_Cyber-Physical
À×±Û·£µå´Â ¿Ö ÇØÀû ±¹°¡¿´´Â°¡?_State-Sponsored Attack
¿ª»ç»ó ÃÖ´ëÀÇ Àýµµ_Cyber Crime
8000¸¸ ´Þ·¯¸¦ ÈÉÄ£ µµµÏ_Scenario
¹ÎÁÖÁÖÀÇ ½Ã½ºÅÛÀ» µÚÈçµé´Ù_Hybrid Attack
¾çº¸ÇÒ ¼ö ¾ø´Â ¿øÄ¢_Principle

2Àå ¸®´õÀÇ ¹Ì¼Ç

À§±â¿¡ ´ëóÇÏ´Â ¸®´õ½Ê_Leadership
»çÀ̹ö º¸¾ÈÀº °æ¿µÀÌ´Ù_Management
Àü¹®°¡¿Í Àü¹®°æ¿µÀÎ_Subject Matter Expert
±â¼ú ¸®´õ½Ê_Technology Leadership
±â¼ú Àη ÀüÀï_Role Model
¿Ö ±¹°¡ ¾Èº¸ÀÇ ¹®Á¦Àΰ¡?_National Security
¡®Æ÷µå V Æä¶ó¸®¡¯¿¡¼­ ¹è¿ì´Â ±³ÈÆ_Accountability

3Àå À§ÇùÀÇ ±Ù¿ø

Ãë¾àÁ¡_Vulnerability, Exploit, Zero-day
¼ÒÇÁÆ®¿þ¾î·Î µ¹¾Æ°¡´Â ¼¼»ó_Software
µðÁöÅÐ Çõ¸íÀÇ ½ÃÀÛ, ¹ÝµµÃ¼_Exponential Growth
ÄÄÇ»ÅÍ°¡ ¿¬°áµÇ¾î µ¹¾Æ°¡´Â ¼¼»ó_Network
¼º¹®À» Ȱ¦ ¿­´Ù_Internet
MP3¿¡¼­ ºñÆ®ÄÚÀαîÁö_Digital
ÇÁ¶óÀ̹ö½ÃÀÇ Åº»ý_New Technology

4Àå º¸¾ÈÀÇ ÆÛ½ºÆåƼºê

¸ð¸£´Â °ÍÀ» Áöų ¼ö´Â ¾ø´Ù_Governance
»ó»ó·ÂÀÇ ½ÇÆÐ_Risk
°¡Àå ¾î·Á¿î ½ÃÇè ¹®Á¦´Â?_Risk Management Framework
º¸¾È µî±ÞÀÇ ¼¼ °¡Áö ±âÁØ_CIA
»çÀ̹ö º¸¾ÈÀ» ¹Ù¶óº¸´Â ´«_Business Impact
½Åµ¿¿± °¡Á·ÀÌ ¹ÞÀº Ãູ_Security Control
À¯·´ÀÇ °í¼º¿¡¼­ ¹è¿ì´Â ±³ÈÆ_Threat Model
º¸¾ÈÀÇ ÆÛ½ºÆåƼºê_Perspective

5Àå ºôµå¾÷

¾ÈÀüÇÑ ºôµå¾÷Àº ±âº»ÀÌ´Ù_Deterrence vs. Buildup
±âÃÊ°¡ Ç㹫ÇÏ°Ô ¹«³ÊÁú ¶§_Foundation
À½½Ä¿¡ µ¶ÀÌ µé¾î°£´Ù¸é?_Software Supply Chain
È£ÅÚ ±Ý°í¿Í ¸ñ¿åÅÁ »ç¹°ÇÔ_Identity Access Management
Àûº®´ëÀü ½ÂÆÐÀÇ °¥¸²±æ_Third Party
¾î´À ¾à»çÀÇ ÇÁ·Î´Ù¿î Çൿ_Assurance
Ä¡¸í»óÀ» ÇÇÇ϶ó_Cyber Resilience

6Àå Çѱ¹ÀÌ ºÎÁ·ÇÑ °ÍÀº

»ç°í´çÇÑ °æÇèµµ ½Ç·ÂÀÌ´Ù_Root Cause Analysis
¼ÒÇÁÆ®¿þ¾î Àη°ú »ýÅ°è_Software Ecosystem
Á¤ºÎ¿Í ¹Î°£ÀÇ Çù·Â_Secrecy vs. Sharing
Á¤Ä¡ÀÎÀÇ Å« ¸ñ¼Ò¸®_Priority
ÇöÀå¿¡ ´äÀÌ ÀÖ´Ù_Security Practice
°á±¹ »ç¶÷ÀÇ ¹®Á¦´Ù_Skill Set
¿Ö IT ºÐ¾ß¿¡´Â ¿©¼ºÀÌ ÀûÀ»±î?_Diversity
Á¤º¸º¸È£ »ê¾÷À» À§ÇÑ °í¾ð_Cybersecurity Industry

7Àå À¶ÇÕÀÇ ¸¶Àεå

´«¿¡ º¸ÀÎ´Ù°í ³» °ÍÀΰ¡?_Physical vs. Cyber
°ø±ÞÀÚ¿¡¼­ ¼ÒºñÀÚÀÇ ½Ã´ë·Î_Business Model
º¸¾ÈÀº Çõ½ÅÀÇ °É¸²µ¹Àΰ¡?_Seamless vs. Frictionless
¸ÅÈ­ÃàÁ¦¿Í BTSÀÇ °øÅëÁ¡_Platform
¹«´ë À§¿¡ ¿À¸¥ ÇÁ¶óÀ̹ö½Ã_Surveillance vs. Privacy
Ã౸ Àü¼úÀÇ º¯È­_Offense vs. Defense
ºÀÁØÈ£ °¨µ¶ÀÇ ±ÕÇü°¨_Liberal Arts & Technology
Ä«Ä«¿ÀÅýð¡ Æí¸®ÇÑ ÀÌÀ¯_O2O

8Àå º¸¾ÈÀÇ Æ¯¼º

»çÀ̹ö °ø°ÝÀÇ Çൿ ´ë¿ø, ¾Ç¼ºÄÚµå_Malware
ÆÒµ¥¹ÍÀ¸·Î µå·¯³­ ¹Î³¸_Weakest Link
»çÀ̹ö °ø°ÝÀº Àº¹ÐÇÏ°Ô ÁøÇàµÈ´Ù_Insidious
ºÒÆíÇÔÀÇ »ýÈ°È­_Legacy
ÇÇÇØÀÚÀÇ ´«¹°_Victim
´ÙÀ̾îÆ®´Â ½À°üÀ» ¹Ù²ãÁÖ´Â °Í_Sustainability
¸¸º´ÅëÄ¡¾àÀº ¾ø´Ù_Cyber Hygiene

9Àå ¹Ì·¡¸¦ À§ÇÑ °í¹Î

»ýÅ°踦 ÁöÄѶó_Systemic Cyber Risk
Á×À½À» ¾ÕµÐ ¾î´À Á¤Ä¡°¡ÀÇ °í¹Î_Paradigm Change
ºÎ¸Þ¶ûÀ¸·Î µ¹¾Æ¿Â »çÀ̹ö ¹«±â_Cyber Weapon
º¸ÀÌÁö ¾Ê´Â À§Çù_Safety vs. Security
ChatGPTÀÇ µîÀå_Game Changer
±ÔÁ¦¿Í Çõ½Å_Law & Regulation
AI, µ¥ÀÌÅÍ ±×¸®°í »çÀ̹ö º¸¾È_Core vs. Context