ÄÜÅÙÃ÷ »ó¼¼º¸±â
³ª´® Á¤º¸º¸¾È±â»ç Á¤º¸º¸¾È»ê¾÷±â»ç ÃʱÞÀÚ Çؼ³¼­


³ª´® Á¤º¸º¸¾È±â»ç Á¤º¸º¸¾È»ê¾÷±â»ç ÃʱÞÀÚ Çؼ³¼­

³ª´® Á¤º¸º¸¾È±â»ç Á¤º¸º¸¾È»ê¾÷±â»ç ÃʱÞÀÚ Çؼ³¼­

<ÀÓÈ£Áø> µîÀú | Çѱ¹ÇмúÁ¤º¸

Ãâ°£ÀÏ
2016-05-17
ÆÄÀÏÆ÷¸Ë
ePub
¿ë·®
4 M
Áö¿ø±â±â
PC½º¸¶Æ®ÆùÅÂºí¸´PC
ÇöȲ
½Åû °Ç¼ö : 0 °Ç
°£·« ½Åû ¸Þ¼¼Áö
ÄÜÅÙÃ÷ ¼Ò°³
¸ñÂ÷
ÇÑÁÙ¼­Æò

ÄÜÅÙÃ÷ ¼Ò°³

º» Ã¥Àº IT ±â¼ú ¹ßÀüÀÇ ÀúÇØ¿äÀÎ º¸¾ÈħÇØ¿¡ ´ëÀÀÇÏ°í °ú°Å, ÇöÀçÃø¸é¿¡¼­ °¢Á¾ º¸¾È À§Çù¿ä¼Ò¸¦ ÆľÇÇÏ°í ¹Ì·¡ ¹ß»ýÇÒ ¼ö Àִ ħÇØ¿¡ ´ëÇؼ­ ´ëÀÀ ÇÒ ¼ö ÀÖµµ·Ï Á¤º¸º¸¾È¿¡ ´ëÇÑ ÇнÀ°ú ÈÆ·ÃÀ» ¸ñÀûÀ¸·Î ÀÛ¼ºµÇ¾ú´Ù. ¶ÇÇÑ Á¤º¸º¸¾È¿¡ ±Ù¹«ÇÏ°í ÀÖ´Â Á÷ÀåÀÎ, ÇöÀç Á¤º¸º¸¾È ´ëÇб³ ´ëÇлý, º¸¾È¿¡ °ü½ÉÀÌ ÀÖ°í ÇâÈÄ º¸¾ÈÀÎÀÌ µÇ±â¸¦ Èñ¸ÁÇÏ´Â °íµîÇлý ¹× ÁßÇлýµéÀÌ ÀÚ½ÅÀÌ ¾Ë°í ÀÖ´Â Àü¹®ºÐ¾ß¸¦ Á¶±Ý¾¿ ³ë·ÂÇؼ­ ÁýÇʵǾú´Ù.

¸ñÂ÷

1 STEP Á¤º¸º¸¾È °³¿ä
1. Á¤º¸º¸¾È ¸ñÇ¥

2 STEP ¾Ïȣȭ
1. ¾Ïȣȭ ¹æ¹ý
2. ´ëĪŰ ¾Ë°í¸®Áò°ú °ø°³Å° ¾Ë°í¸®Áò

3 STEP ÀÎÁõ
1. ÀÎÁõ(Authentication)°ú Àΰ¡(Authorization)
2. Á¢±ÙÅëÁ¦(Access Control)
3. »ýüÀνÄ
4. OTP(One Time Password)
5. Ä¿¹ö·Î½º(Kerberos)
6. SSO(Single Sign On)
7. PKI
8. PMI
9. ÀüÀÚ¼­¸í
10. i-PIN

4 STEP ÀÎÅÍ³Ý º¸¾È ÇÁ·ÎÅäÄÝ
1. SSL
2. SET
3. IPSec
4. ¹æÈ­º®(Firewall)
5. IDS(ħÀÔŽÁö½Ã½ºÅÛ)
6. VPN(°¡»ó»ç¼³¸Á)
7. IPS(ħÀÔ¹æÁö½Ã½ºÅÛ)
8. NAC(³×Æ®¿öÅ© Á¢±ÙÁ¦¾î)

5 STEP ¼­¹ö º¸¾È
1. UNIX ½Ã½ºÅÛ ±¸Á¶ ¹× º¸¾È
2. Secure OS
3. ESM(Enterprise Security Management)
4. UTM(ÅëÇÕº¸¾È°ü¸®)
5. PMS(ÆÐÄ¡°ü¸®½Ã½ºÅÛ)

6 STEP Á¤º¸º¸È£ ÀÎÁõü°è
1. ISMS¿Í ISO 27000
2. PIMS
3. ITSEC
4. TCSEC
5. CC ÀÎÁõ

7 STEP »çÀ̹ö ¹üÁË
1. ÇØÅ·
2. BotNet(º¿³Ý)
3. DDoS
4. IP ½º´ÏÇÎ
5. IP ½ºÇªÇÎ
6. ¼¼¼Ç ÇÏÀÌÀçÅ·(Session Hijacking)
7. ÀçÀü¼Û °ø°Ý(Replay Attack)
8. Àº´Ðä³Î(Covert Channel)
9. »çÀ̹ö ¹üÁË¿Í Æ÷·»½Ä(Forensic)

¢Â °³ÀÎÁ¤º¸º¸È£¹ý Áؼö¸¦ À§ÇÑ °¡ÀÌµå ¢Â