´ëÇѹα¹Àº ¼¼°èÀÇ IT »ê¾÷À» À̲ø¾î°¡´Â °±¹ÀÌ´Ù. ÇÏÁö¸¸ Àü ¼¼°èÀûÀ¸·Î ÇØÅ·±â¼úÀÇ ¹ßÀüÀ¸·Î ÄÄÇ»ÅÍ ¹üÁË µî Á¤º¸È¿¡ µû¸¥ »çȸÀû ¿ª±â´ÉÀÌ ¹ß»ýÇÏ°í ÀÖ´Ù. ƯÈ÷ °ø°ø±â°ü ¹× ±â¾÷¿¡¼´Â ±× ÇÇÇØ°¡ ¸·´ëÇÏ´Ù. ÀÌ·¯ÇÑ ½ÃÁ¡¿¡¼ Á¤º¸º¸¾È Àü¹®°¡ÀÇ Á߿伺°ú ±× ¿ªÇÒÀÌ ºÎ°¢µÇ°í ÀÖ´Ù. Á¤º¸º¸¾È Àü¹®°¡°¡ µÇ±â À§ÇÑ À̵éÀ» À§Çؼ ±âº» °¡À̵带 Á¦½ÃÇÏ´Â ÇÑÆí CISSP ÀÚ°ÝÁõÀ» ÃëµæÇÏ´Â À̵éÀ» À§Çؼ´Â ÁÖ¿ä ³»¿ë, ¹®Á¦, ¹®Á¦Ç®ÀÌ µîÀ» Æ÷ÇÔÇÏ°í ÀÖ´Ù. ºÎ·ÏÀ¸·Î´Â CISSP ½ÇÀü ¸ðÀÇ°í»ç¸¦ ¼ö·ÏÇÏ¿© ¼öÇè»ýÀÇ È¿À²¼ºÀ» ³ô¿´´Ù.
1 STEP Á¢±ÙÅëÁ¦(Access Control)
1. Á¢±ÙÀÇ °³¿ä
2. ÀüÈÁ¢¼Ó Á¢±Ù
3. ½Äº°°ú ÀÎÁõ
4. ÀÎÁõ °ü¸®¸¦ À§ÇÑ SSO(Single Sign On)
5. Á¢±Ù ÅëÁ¦ °ü¸®¿Í ÀÎÁõ ÇÁ·ÎÅäÄÝ
6. Data ±â¹Ý Á¢±Ù ÅëÁ¦ ±â¼ú
7. Á¢±ÙÅëÁ¦ º¸¾È ¸ðµ¨
8. °ø°Ý(Attacks)
9. ¹æ¾î
2 STEP Åë½Å
1. OSI 7Layer(Open System Interconnection)
2. VPN(Virtual Private Network)
3. Wireless LAN
3 STEP º¸¾È°ü¸®
1. º¸¾È°ü¸® °³³ä ¹× ¿øÄ¢
2. µ¥ÀÌÅÍ ºÐ·ù(Data Classification)
3. Policy, Standard, Guideline, Procedure
4. À§Çè°ü¸®
5. º¸¾È ÀÎ½Ä ±³À°°ú °³ÀÎ º¸¾È
6. »çȸ °øÇÐ(Social Engineering)
4 STEP ÀÀ¿ë°³¹ß
1. Application ȯ°æ
2. DataBase & Data Warehouse
3. SDLC(Software Development Life Cycle) ¸ðµ¨°ú °´Ã¼ÁöÇâ
4. Application ÅëÁ¦¿Í ¾Ç¼ºÄÚµå, °ø°ÝÀÚ ºÐ·ù
5 STEP ¾ÏÈ£ÇÐ(Cryptography)
1. ¾ÏÈ£ÇÐ
2. ¾ÏÈ£ÀÇ Á¾·ù
3. ´ëĪŰ ¾ÏÈ£È
4. ºñ´ëĪ ¾ÏÈ£È(Asymmetric Cryptography)
5. Hash ¾Ë°í¸®Áò, MAC
6. µðÁöÅÐ ¼¸í°ú PKI
7. ¾ÏÈ£ ½Ã½ºÅÛÀÇ °ø°Ý À¯Çü
8. OSI 7Layer¿¡¼ÀÇ ¾ÏÈ£È
9. À̸ÞÀÏ º¸¾È
10. ±âŸ ¾ÏÈ£ °ü·Ã »çÇ×
6 STEP º¸¾È±¸Á¶ ¹× ¸ðµ¨
1. ÄÄÇ»ÅÍ ±¸Á¶
2. OS º¸¾È ¸ÞÄ¿´ÏÁò
3. º¸¾È ¸ðµ¨
4. ½Ã½ºÅÛ Æò°¡ ±âÁØ
7 STEP ¿î¿µº¸¾ÈÅëÁ¦
1. ÅëÁ¦(Control)
8 STEP BCP/DRP(ºñ»ó°èȹ)
1. BCP/DRP °³³ä
2. BIA(Business Impact Analysis, »ç¾÷¿µÇâºÐ¼®)
3. º¹±¸ Àü·«
4. º¹±¸¿Í ȸº¹
5. CPP(Continuty Planning Process, ¿¬¼Ó¼º °èȹ ÇÁ·Î¼¼½º)
9 STEP ¹ý ¼ö»ç ¹× À±¸®ÇÐ
1. ÄÄÇ»ÅÍ ¹üÁË¿Í »çÀ̹ö ¹üÁË
2. ÄÄÇ»ÅÍ Ä§ÇØ
3. ÄÄÇ»ÅÍ ¹üÁË ¼ö»ç(Computer Forensics)
4. Áõ°Å(Evidence)
5. ¹ý(Law)°ú º¸¾È ¿øÄ¢
6. ±âŸ
10 STEP ¹°¸®Àû º¸¾È
1. ¹°¸®Àû º¸¾ÈÀÇ °³¿ä
2. ½Ã¼³°ü¸®
3. Àü·Â ¹× ȯ°æ º¸¾È
4. ÈÀ翹¹æ ŽÁö Áø¾Ð
5. °æ°è º¸¾È(Perimeter Security)
ºÎ·Ï: CISSP ½ÇÀü ¸ðÀÇ°í»ç