Ã¥¼Ò°³
°ø°ø±â°ü ¹× ±ÝÀ¶±Ç¿¡ ´ëÇÑ »çÀ̹ö Å×·¯´Â ±ÝÀ¶»ç±â, °³ÀÎÁ¤º¸Ä§ÇØ, DDoS °ø°Ý°ú °°Àº ´Ù¾çÇÑ ÇüÅ·Π¹ßÀüÇÏ°í ÀÖÀ¸¸ç ÀÌ·Î ÀÎÇÑ ÇÇÇØ´Â Áö¼ÓÀûÀ¸·Î Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ ½ÃÁ¡¿¡¼ IT±â¼ú°ú IT¼ºñ½º ¹ßÀü°ú ħÇØ»ç°í·Î ÀÎÇÑ ¹®Á¦Á¡ ³õ°í Á¤º¸ º¸¾ÈÀεéÀº ¸¹Àº °í¹Î¿¡ ºüÁø´Ù. ¼ºñ½ºÀÇ Çâ»ó°ú º¸¾È»ç°í °ú¿¬ ¾î´À ÂÊ¿¡ ¹«°Ô Áß½ÉÀ» ³õ°í ¹ßÀüÇØ¾ß ÇÏ´ÂÁö ÂüÀ¸·Î °í¹Î½º·¯¿î ÀÏÀÌ´Ù.
º» Ã¥Àº IT ±â¼ú ¹ßÀüÀÇ ÀúÇØ¿äÀÎ º¸¾ÈħÇØ¿¡ ´ëÀÀÇÏ°í °ú°Å, ÇöÀçÃø¸é¿¡¼ °¢Á¾ º¸¾È À§Çù¿ä¼Ò¸¦ ÆľÇÇÏ°í ¹Ì·¡ ¹ß»ýÇÒ ¼ö Àִ ħÇØ¿¡ ´ëÇؼ ´ëÀÀ ÇÒ ¼ö ÀÖµµ·Ï Á¤º¸º¸¾È¿¡ ´ëÇÑ ÇнÀ°ú ÈÆ·ÃÀ» ¸ñÀûÀ¸·Î ÀÛ¼ºµÇ¾ú´Ù. ¶ÇÇÑ Á¤º¸º¸¾È¿¡ ±Ù¹«ÇÏ°í ÀÖ´Â Á÷ÀåÀÎ, ÇöÀç Á¤º¸º¸¾È ´ëÇб³ ´ëÇлý, º¸¾È¿¡ °ü½ÉÀÌ ÀÖ°í ÇâÈÄ º¸¾ÈÀÎÀÌ µÇ±â¸¦ Èñ¸ÁÇÏ´Â °íµîÇлý ¹× ÁßÇлýµéÀÌ ÀÚ½ÅÀÌ ¾Ë°í ÀÖ´Â Àü¹®ºÐ¾ß¸¦ Á¶±Ý¾¿ ³ë·ÂÇؼ ÁýÇʵǾú´Ù.
ÀúÀÚµéÀº »çȸ¿¡ Á¤º¸º¸¾È Áö½ÄÀ» È®»ê½ÃÅ°°í, Á¤º¸È·Î ÀÎÇÑ »çȸÀû ÇÇÇØ¿¡ Á¶±ÝÀ̳ª¸¶ µµ¿òÀÌ µÇ±â¸¦ Èñ¸ÁÇÑ´Ù. ¶ÇÇÑ º» Ã¥ ÁýÇÊÀ» ÅëÇؼ ¹ß»ýÇÏ´Â ÀÛÀº ¼öÀÍÀ̳ª¸¶ ¿ì¸®»çȸÀÇ ¾îµÎ¿î ±×¸²ÀÚ¸¦ ÇؼÒÇÏ°íÀÚ ÀúÀÚµéÀÇ ÀúÀÛ±Ç »ç¿ë·á¸¦ ±âºÎÇϱâ·Î °øµ¿ÀúÀÚ´Â ÇÕÀÇÇß°í ±× ¶æÀ» °°ÀÌÇß´Ù. ÀúÀÚµéÀº Èñ¸ÁÇÑ´Ù. ÀÌ Ã¥À» ½ÃÀÛÀ¸·Î ¸¹Àº Àü¹®°¡µéÀÌ ÀÚ½ÅÀÇ Áö½ÄÀ» »çȸ¿¡ µÇµ¹¸®±â¸¦ ¹Ù¶õ´Ù.
ÀúÀÚ¼Ò°³
Á¤º¸º¸¾ÈÀü¹®°¡ ÀÓÈ£Áø ¿Ü 18ÀÎ
(úÞ) SPE ±â¼ú»ç ÄÁ¼³Æà CEO, ¼¿ï°úÇбâ¼ú´ëÇб³ ¹Ú»ç¼ö·áÇѱ¹ °øÀΰ¨¸®´Ü °¨¸®¿ø, ISMS ÀÎÁõ ½É»ç¿ø
(îñ) LIG ½Ã½ºÅÛ¤ýÇѱ¹IBM SCC Â÷Àå, µ¿¾çÁ¾ÇÕ±ÝÀ¶Áõ±Ç °úÀå
74ȸ Á¤º¸°ü¸®±â¼ú»ç, ¼ö¼®°¨¸®¿ø, PMP, ITIL, MCSE, OCP, ÅõÀÚ»ó´ã»ç, ±³¿øÀÚ°Ý
°æ·Â
-IBM: °Ç°º¸Çè½É»çÆò°¡¿ø Â÷¼¼´ë DW ±¸Ãà ÄÁ¼³ÆÃ
-µ¿¾çÁ¾ÇÕ±ÝÀ¶Áõ±Ç: Â÷¼¼´ë ±ÝÀ¶½Ã½ºÅÛ(ISP/EA/SOA), Ȩ Æ®·¹À̵ù ½Ã½ºÅÛ, °í°´Á¢Á¡ CRM, ¿Â¶óÀÎ °æ¿µÁ¤º¸½Ã½ºÅÛ ¿Ü ´Ù¼ö
-ÀϺ» NTT Data, NTT DoCoMo CTI ÇÁ·ÎÁ§Æ®
-ÅäÁö°³¹ß°ø»ç, ¼Ò¹æ¹æÀçû ¿Ü ´Ù¼ö °¨¸®
°ÀÇ
-Á¤º¸Ã³¸®±â¼ú»ç ¼ö°ËÀü·«, °æ¿µ, ¼ÒÇÁÆ®¿þ¾î°øÇÐ, µ¥ÀÌÅͺ£À̽º, ³×Æ®¿öÅ©, ÄÄÇ»ÅÍ ±¸Á¶, º¸¾È µî Àü ºÎºÐ °ÀÇ(8³â)
-OWASP(The Open Web Application Security Project) ´ëÀÀ¹æ¹ý °ÀÇ
-»ï¼ºÀüÀÚ: ¼ÒÇÁÆ®¿þ¾î ºÐ¼®¼³°è °ÀÇ
-ºñÆ®ÄÄÇ»ÅÍ: ¼ÒÇÁÆ®¿þ¾î °øÇÐ °ÀÇ
-Áß¼Ò±â¾÷Çùȸ: Á¤º¸½Ã½ºÅÛ º¸¾È °ÀÇ
-ÇàÁ¤¾ÈÀüºÎ: IT ÇÁ·ÎÆä¼Å³Î, IT ÃֽŠ±â¼ú °ÀÇ
¸ñÂ÷
1 STEP Á¤º¸º¸¾È °³¿ä
1. Á¤º¸º¸¾È ¸ñÇ¥
2 STEP ¾ÏÈ£È
1. ¾ÏÈ£È ¹æ¹ý
2. ´ëĪŰ ¾Ë°í¸®Áò°ú °ø°³Å° ¾Ë°í¸®Áò
3 STEP ÀÎÁõ
1. ÀÎÁõ(Authentication)°ú Àΰ¡(Authorization)
2. Á¢±ÙÅëÁ¦(Access Control)
3. »ýüÀνÄ
4. OTP(One Time Password)
5. Ä¿¹ö·Î½º(Kerberos)
6. SSO(Single Sign On)
7. PKI
8. PMI
9. ÀüÀÚ¼¸í
10. i-PIN
4 STEP ÀÎÅÍ³Ý º¸¾È ÇÁ·ÎÅäÄÝ
1. SSL
2. SET
3. IPSec
4. ¹æȺ®(Firewall)
5. IDS(ħÀÔŽÁö½Ã½ºÅÛ)
6. VPN(°¡»ó»ç¼³¸Á)
7. IPS(ħÀÔ¹æÁö½Ã½ºÅÛ)
8. NAC(³×Æ®¿öÅ© Á¢±ÙÁ¦¾î)
5 STEP ¼¹ö º¸¾È
1. UNIX ½Ã½ºÅÛ ±¸Á¶ ¹× º¸¾È
2. Secure OS
3. ESM(Enterprise Security Management)
4. UTM(ÅëÇÕº¸¾È°ü¸®)
5. PMS(ÆÐÄ¡°ü¸®½Ã½ºÅÛ)
6 STEP Á¤º¸º¸È£ ÀÎÁõü°è
1. ISMS¿Í ISO 27000
2. PIMS
3. ITSEC
4. TCSEC
5. CC ÀÎÁõ
7 STEP »çÀ̹ö ¹üÁË
1. ÇØÅ·
2. BotNet(º¿³Ý)
3. DDoS
4. IP ½º´ÏÇÎ
5. IP ½ºÇªÇÎ
6. ¼¼¼Ç ÇÏÀÌÀçÅ·(Session Hijacking)
7. ÀçÀü¼Û °ø°Ý(Replay Attack)
8. Àº´Ðä³Î(Covert Channel)
9. »çÀ̹ö ¹üÁË¿Í Æ÷·»½Ä(Forensic)
¢Â °³ÀÎÁ¤º¸º¸È£¹ý Áؼö¸¦ À§ÇÑ °¡ÀÌµå ¢Â