¹Ýµð¾Ø·ç´Ï½º ÀÎÅͳݼ­Á¡

³×ºñ°ÔÀÌ¼Ç ½Ç½Ã°£ Àαâ Ã¥

    Á¤º¸°ü¸®±â¼ú»ç & ÄÄÇ»ÅͽýºÅÛÀÀ¿ë±â¼ú»ç Vol. 4 º¸¾È

    • ±Ç¿µ½Ä Àú
    • ¼º¾È´ç
    • 2015³â 01¿ù 05ÀÏ
    • Á¤°¡
      27,000¿ø
    • ÆÇ¸Å°¡
      24,300¿ø [10% ÇÒÀÎ]
    • °áÁ¦ ÇýÅÃ
      ¹«ÀÌÀÚ
    • Àû¸³±Ý
      1,350¿ø Àû¸³ [5%P]

      NAVER Pay °áÁ¦ ½Ã ³×À̹öÆäÀÌ Æ÷ÀÎÆ® 5% Àû¸³ ?

    ǰÀýµÈ »óǰÀÔ´Ï´Ù.

    ȸ¿ø¸®ºä
    - [0]
    ISBN: 9788931553222 321ÂÊ 190 x 260 (§®)

    Áö±Ý ÀÌÃ¥Àº

    ÀÌ ºÐ¾ßÀÇ º£½ºÆ®¼¿·¯

    ÃâÆÇ»ç ¸®ºä

    ÃâÆÇ»ç ¼­Æò
    1. ÀÌ Ã¥Àº Çпø ¼ö°­À» ÅëÇØ ½ÀµæÇÑ ³»¿ë°ú ¸àÅ丵À» ÁøÇàÇϸ鼭 ½º½º·Î ÇнÀÇÑ ³»¿ëÀ» ¹ÙÅÁÀ¸·Î ´ä¾È ÇüÅ·ΠÀÛ¼ºÇÏ¿´°í, ITºÐ¾ß ±â¼ú»çÀÎ Á¤º¸°ü¸®±â¼ú»ç¿Í ÄÄÇ»ÅͽýºÅÛÀÀ¿ë±â¼ú»ç ÀÚ°ÝÀ» ÃëµæÇϱâ À§ÇØ ÇнÀÇϰí Àְųª ÇнÀÇϰíÀÚ ÇÏ´Â ºÐµéÀ» À§ÇØ ¸¸µé¾ú½À´Ï´Ù.
    2. º» ±³Àç´Â ¹ßÀü µ¿Çâ, ¹è°æ ±×¸®°í À¯»ç ±â¼ú°úÀÇ ºñ±³, ´Ù¾çÇÑ µµ½ÄÈ­ µî 25³â°£ÀÇ ½Ç¹« °³¹ßÀÚ °æÇèÀ» Åä´ë·Î ÀÛ¼ºÇÑ ³»¿ëÀ¸·Î dzºÎÇÑ °æÇèÀûÀÎ ¿ä¼Ò°¡ ³»ÀçµÇ¾î ÀÖ´Â ÀåÁ¡ÀÌ ÀÖ½À´Ï´Ù.
    ¡á Ã¥ÀÇ Æ¯Â¡
    Part 1. Á¤º¸º¸È£¿¡¼­´Â,
    Á¤º¸ÀÇ ±â¹Ð¼º, ¹«°á¼º, °¡...
    1. ÀÌ Ã¥Àº Çпø ¼ö°­À» ÅëÇØ ½ÀµæÇÑ ³»¿ë°ú ¸àÅ丵À» ÁøÇàÇϸ鼭 ½º½º·Î ÇнÀÇÑ ³»¿ëÀ» ¹ÙÅÁÀ¸·Î ´ä¾È ÇüÅ·ΠÀÛ¼ºÇÏ¿´°í, ITºÐ¾ß ±â¼ú»çÀÎ Á¤º¸°ü¸®±â¼ú»ç¿Í ÄÄÇ»ÅͽýºÅÛÀÀ¿ë±â¼ú»ç ÀÚ°ÝÀ» ÃëµæÇϱâ À§ÇØ ÇнÀÇϰí Àְųª ÇнÀÇϰíÀÚ ÇÏ´Â ºÐµéÀ» À§ÇØ ¸¸µé¾ú½À´Ï´Ù.
    2. º» ±³Àç´Â ¹ßÀü µ¿Çâ, ¹è°æ ±×¸®°í À¯»ç ±â¼ú°úÀÇ ºñ±³, ´Ù¾çÇÑ µµ½ÄÈ­ µî 25³â°£ÀÇ ½Ç¹« °³¹ßÀÚ °æÇèÀ» Åä´ë·Î ÀÛ¼ºÇÑ ³»¿ëÀ¸·Î dzºÎÇÑ °æÇèÀûÀÎ ¿ä¼Ò°¡ ³»ÀçµÇ¾î ÀÖ´Â ÀåÁ¡ÀÌ ÀÖ½À´Ï´Ù.
    ¡á Ã¥ÀÇ Æ¯Â¡
    Part 1. Á¤º¸º¸È£¿¡¼­´Â,
    Á¤º¸ÀÇ ±â¹Ð¼º, ¹«°á¼º, °¡¿ë¼ºÀ» È®º¸ÇÏ´Â Â÷¿ø¿¡¼­ Á¤º¸º¸È£ÀÇ ¸ñÇ¥, Çʿ伺, À§Çè¿ä¼Ò, À§Çù¿¡ ´ëÇÑ ´ëÀÀ ÀýÂ÷, º¸¾È ÇÁ·¹ÀÓ¿öÅ©¿Í º¸¾È °Å¹ö³Í½º¿¡ ´ëÇÑ ³»¿ëÀ¸·Î ÀÛ¼ºÇß½À´Ï´Ù. [°ü·Ã ÅäÇÈ - 10°³]
    Part 2. ¾ÏÈ£Çп¡¼­´Â,
    º¸¾È ºÐ¾ß¿¡ ÇÙ½ÉÀÌ µÇ´Â ºÎºÐÀ¸·Î ¾ÏÈ£Çп¡ Àû¿ëµÈ ¼öÇÐÀû À̷еé°ú ¿ø¸®¸¦ ÆÄ¾ÇÇÏ°í ¾ÏÈ£ÀÇ ¹ßÀü°úÁ¤°ú Á¤º¸È­ »çȸ¿¡ Àû¿ëµÇ´Â ´Ù¾çÇÑ ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ È°¿ë¹ý¿¡ ´ëÇØ ÇнÀÇÒ ¼ö ÀÖµµ·Ï ÇÏ¿´½À´Ï´Ù. [°ü·Ã ÅäÇÈ - 23°³]
    Part 3. º¸¾ÈÀ§Çù¿¡¼­´Â,
    Network³ª System »ó¿¡¼­ ¹ß»ýµÉ ¼ö ÀÖ´Â º¸¾È À§Çù ¿ä¼Ò¿Í ´ëÀÀ ¹æ¾È¿¡ ´ëÇØ ½±°Ô Á¢±ÙÇÒ ¼ö ÀÖµµ·Ï ´ä¾ÈÈ­ ÇÏ¿´½À´Ï´Ù. Ç×»ó ÃâÁ¦µÇ´Â ºÎºÐÀ¸·Î ¸¹Àº °ü½ÉÀ» °¡Áö°í ÇнÀÇØ¾ß ÇÕ´Ï´Ù. [°ü·Ã ÅäÇÈ ? 23°³]
    Part 4. ±â¾÷ ¹× °³ÀÎÀÇ Á¤º¸º¸È£, ÀÎÁõ¿¡¼­´Â,
    ±â¾÷ÀÇ °ü¸®Àû ¹°¸®Àû ±â¼úÀû Á¤º¸º¸È£ ´ëÃ¥»Ó¸¸ ¾Æ´Ï¶ó °³ÀÎÀÇ Á¤º¸º¸È£ ¹æ¾È°ú System »ç¿ë½ÃÀÇ ¾Ïȣȭ ¾Ë°í¸®ÁòÀ» ÅëÇÑ ÀÎÁõ ¹æ¹ý ±×¸®°í Á¢±ÙÁ¦¾î¿¡ ´ëÇÑ ³»¿ëÀ» ÇнÀ ÇÒ ¼ö ÀÖµµ·Ï ÇÏ¿´½À´Ï´Ù. [°ü·Ã ÅäÇÈ - 30°³]
    Part 5. ³×Æ®¿öÅ© º¸¾È¿¡¼­´Â,
    Network »ó¿¡¼­ ¹ß»ýµÉ ¼ö ÀÖ´Â º¸¾È À§ÇùÀ» SystemÀ̳ª °ü¸® Â÷¿ø¿¡¼­ ¹æÁöÇÏ´Â ±â¼úµéÀ» ÇнÀÇÒ ¼ö ÀÖµµ·Ï ´ä¾ÈÈ­ ÇÏ¿´½À´Ï´Ù. [°ü·Ã ÅäÇÈ - 16°³]
    Part 6. System º¸¾È¿¡¼­´Â,
    System ¿î¿µ Â÷¿ø¿¡¼­ Hardware, Software, Firmware ±×¸®°í ¹«¼± ȯ°æ¿¡¼­ ¹ß»ýµÉ ¼ö ÀÖ´Â º¸¾È À§ÇùÀ» ¹æÁöÇÏ´Â ±â¼úµé°ú Æ÷·»½Ä¿¡ ´ëÇØ ÇнÀÇÒ ¼ö ÀÖ½À´Ï´Ù. [°ü·Ã ÅäÇÈ - 18°³]
    Part 7. Àü¼Û µ¥ÀÌÅÍÀÇ ¹«°á¼º È®º¸¿¡¼­´Â,
    ¼Û¼ö½ÅÀÚ°£ÀÇ Data Àü¼Û½Ã ¹«°á¼ºÀ» È®º¸ÇÒ ¼ö ÀÖ´Â ¹æ¹ý¿¡ ´ëÇØ ½ÇÁ¦ ¿¹¸¦ µé¾î ¼³¸íÇÑ ºÎºÐÀ¸·Î, ÀÌÇØ À§ÁÖ·Î ÇнÀÇÒ ¼ö ÀÖµµ·Ï ±â¼úÇÏ¿´½À´Ï´Ù. [°ü·Ã ÅäÇÈ - 4°³]

    ÀúÀÚ ¼Ò°³

    ±Ç¿µ½Ä

    • ±¸ºÐ : Àú¼­
    • ±¹Àû : ´ëÇѹα¹
    • ºÐ·ù : °úÇÐ/°øÇÐ ÀúÀÚ , ¼öÇè/ÇнÀ¼­ ÀúÀÚ , ±âŸ
    • ÀαâÁö¼ö : 152
    ÃÖ±ÙÀú¼­

    •¼º±Õ°ü´ëÇб³ Á¤º¸Åë½Å´ëÇпø Á¤º¸º¸È£°ú ÀçÇÐÁß(Çö)
    •»ï¼ºÀüÀÚ ¼±ÀÓ/Ã¥ÀÓ ¿¬±¸¿ø
    •µµ½Ã¹Ù »ï¼º ½ºÅ丮Áö Å×Å©³î·¯Áö - ÄÚ¸®¾Æ(ÁÖ) ¼ö¼®¿¬±¸¿ø
    •ÄÄÇ»ÅͽýºÅÛÀÀ¿ë ±â¼ú»ç
    •Á¤º¸½Ã½ºÅÛ ¼ö¼®°¨¸®¿ø, Á¤º¸Åë½Å Ư±Þ±â¼úÀÚ
    •¹Ì·¡Ã¢Á¶°úÇкΠIT ¸àÅä
    •ùÛ(ÇÑ)¡¤ìí(ÀÏ)±â¼ú»ç ±³·ùȸ ȸ¿ø
    •http://cafe.naver.com/96starpe ¿î¿µÀÚ

    ¸ñÂ÷

    ¸ñÂ÷
    PART 1. Á¤º¸º¸È£
    1. Á¤º¸º¸È£ÀÇ ¸ñÇ¥
    2. Á¤º¸±â¼úÀÇ ±¸¼º¿ä¼Ò¿Í Á¤º¸È­ »çȸÀÇ Æ¯¼º, Á¤º¸È­ÀÇ ¿ª±â´É
    3. Á¤º¸º¸È£ÀÇ Çʿ伺
    4. Á¤º¸º¸È£(Information Security)ÀÇ À§Çè¿ä¼Ò
    5. Á¤º¸º¸È£ ´ëÃ¥
    6. OSI º¸?¾È±¸Á¶ÀÎ X. 800 Á¤ÀÇ
    7. NIST(¹Ì±¹ »ê¾÷ Ç¥ÁØ ±â°ü)¿¡¼­ Á¦½ÃÇÑ Á¤º¸ º¸¾ÈÀÇ ÇÙ½É ¿øÄ¢
    8. º¸¾È ¼øÈ¯ »çÀÌŬ(Cycle)
    9. º¸¾È ÇÁ·¹ÀÓ¿öÅ©(Framework), À§Çù ´ëÀÀ ÀýÂ÷
    10. º¸¾È °Å¹ö³Í½º(Security Governance)
    PART 2. ¾ÏÈ£ÇÐ
    11. ¾ÏÈ£ ¹æ½ÄÀÇ ¹ßÀü °úÁ¤(°í´ë, ±Ù´ë, Çö´ë)
    12. ÇöÀç ¾ÏÈ£ÇÐÀÇ ¼öÇÐÀû À̷еé - ¾à¼ö&¹è¼ö, ÃÖ´ë°ø¾à¼ö, ¼­·Î¼Ò, À¯Å¬¸®µå È£Á¦¹ý, ¼Ò¼ö(¼ÒÀμöºÐÇØ), ¸ðµâ·¯ ¿¬»ê, À׿©°è, ¿ÀÀÏ·¯ÀÇ Á¤¸®, Æä¸£¸¶ÀÇ Á¤¸®
    13. mod 89¿¡¼­ 27ÀÇ ½Â»ê ¿ª¿ø
    14. mod 65¿¡¼­ 27¿ø ½Â»ê ¿ª¿ø
    15. ¾ÏÈ£Çп¡ Àû¿ëµÇ´Â À¯Å¬¸®µå È£Á¦¹ý(Euclidean Algorithms)ÀÇ ¿ø¸®¸¦ Áõ¸í, ÀÌ ¿ø¸®¸¦ ÀÌ¿ëÇÏ¿© (252, 198)ÀÇ ÃÖ´ë °ø¾à¼ö¸¦ ±¸ÇϽÿÀ.
    16. Æä¸£¸¶ ¼ÒÁ¤¸®¸¦ ÀÌ¿ëÇÏ¿© ¾Æ·¡ ¿¬»êÀÌ ¼º¸³ÇÔÀ» º¸À̽ÿÀ.
    528 \u003d 4(mod 11)
    17. ¾ÏÈ£ ±â¹ý ? ġȯ, ÀüÄ¡, Àû(product) ¾ÏÈ£¹æ½Ä
    18. ºí·Ï(Block)¾ÏÈ£±â¹ý°ú ½ºÆ®¸² ¾ÏÈ£(Stream Cipher)±â¹ý
    19. ´ëĪŰ¿Í ºñ´ëĪ Key ¾ÏÈ£ ¹æ½Ä
    20. Çö´ë ¾ÏÈ£ÇÐÀÇ ±âÃÊ, Feistel ¾ÏÈ£ÀÇ ±¸Á¶¿Í ¾Ïȣȭ¿Í º¹È£È­ °úÁ¤
    21. Feistel ¾ÏÈ£ ±¸Á¶¿¡¼­ fÇÔ¼ö¿Í S-Box
    22. ºí·Ï¾ÏÈ£, Feistel ¾ÏÈ£±¸Á¶¿Í SPN(Substitution Permutation Network) ºñ±³
    23. AES(Advanced Encryption Standard) ¾Ïȣȭ ¾Ë°í¸®Áò
    24. ±¹»ê ¾Ïȣȭ ¾Ë°í¸®Áò, SEED
    25. ±¹»ê ¾Ïȣȭ ¾Ë°í¸®Áò, ARIA(Academy Research Institute Agency)
    26. DES ¿Í AES ¾ÏÈ£ÀÇ Àå´ÜÁ¡
    27. ºí·Ï(Block)¾Ïȣȭ ±â¹ý¿¡¼­ ECB ¸ðµå¿Í CBC ¿î¿ë¸ðµåÀÇ µ¿ÀÛ ¹× Àå?´ÜÁ¡
    28. °ø°³Å° ¾Ïȣȭ ¹æ½Ä (¾ÏÈ£±â¹ý ºÐ·ù)
    29. RSA°ø°³Å° ¾ÏÈ£¹æ½Ä¿¡¼­ ¼Û½ÅÀÚ ºñ¹ÐŰ(p\u003d7, q\u003d11)ÀÌ°í ¼Û½ÅÀÚÀÇ °ø°³Å°(Ke)°ªÀÌ 13ÀÏ ¶§ ¼ö½ÅÀÚÀÇ °³ÀÎŰ(Kd)¸¦ ±¸Ç϶ó
    30. °ø°³Å° ¾Ïȣȭ ¹æ½ÄÀ» ¼³¸íÇÏ°í ºñ¹ÐŰ(p\u003d3, q\u003d11)ÀÌ°í Æò¹® M\u003d5ÀÏ ¶§ RSA ¾Ïȣȭ º¹È£È­ °úÁ¤À» ¼³¸íÇϽÿÀ.
    31. ÇØ½¬ÇÔ¼ö(Hash Function)ÀÇ Æ¯Â¡
    32. ºñ ´ëĪŰ (°ø°³Å° ¾ÏÈ£¹æ½Ä)¹æ½ÄÀÇ ÀüÀÚ¼­¸í ¹æ¹ý
    33. RSA ¾ÏÈ£¹æ½ÄÀ» ÀÌ¿ëÇÑ ÀüÀÚ¼­¸í¹æ½Ä¿¡ ´ëÇØ 2°¡Áö ÀÌ»ó ¼³¸í
    PART 3. º¸¾È À§Çù
    34. ÇØÄ¿(Hacker) °ø°Ý À¯Çü
    35. ÇǽÌ(Phishing)°ú ÆÄ¹Ö(Pharming)
    36. ÇǽÌ(Phishing)ÀÇ °ø°ÝÀ¯Çü°ú ´ëÀÀ¹æ¹ý
    37. ÆÄ¹Ö(Pharming)ÀÇ °ø°ÝÀ¯Çü°ú ´ëÀÀ¹æ¾È, Phishing°ú ºñ±³
    38. ·¥¼¶¿þ¾î(Randsom-ware)¿Í ÆÄ¹Ö(Pharming)
    39. DDoS(2±³½ÃÇü)
    40. DDoSÀÇ °ø°Ý ´ëÀÀ ¹æ¾È(1±³½ÃÇü)
    41. DrDOS
    42. Sniffing°ú Spoofing
    43 ÀÎÅÍ³Ý Protocol ¿¡¼­ 4´Ü°è ÁÖ¼Òü°è(Specific/Port/Logical/Physical Address)¸¦ ¼³¸íÇÏ°í °¢ ÁÖ¼Òü°è¿¡¼­ ¹ß»ýµÉ ¼ö ÀÖ´Â SpoofingÀÇ À§Çù
    44. ARP Spoofing¿¡ ´ëÇØ ¼³¸íÇÏ°í °ø°ÝŽÁö ¹æ¹ý°ú ´ëÀÀ ¹æ¾È
    45. Malware
    46. Rootkit(·çƮŶ)
    47. º¿ ³Ý(Bot Net)
    48. Session Hijacking(³³Ä¡) Attack
    49. APT(Advanced Persistent Threat) °ø°Ý±â¹ý°ú ´ëÀÀ¹æ¾È
    50. DNS (Domain Name Server) Sinkhole
    51. SQL Injection °ø°Ý±â¹ý
    52. XSS(Cross Site Scripting), CSRF¿Í ºñ±³
    53. CSRF(Cross-Site Request Forgery)
    54. TCP¿Í UDP Â÷ÀÌÁ¡, 3 Way Handshaking, SYN Attack,ÇØ°á¹æ¾È
    55. Buffer Overflow (Sample Code ÀÛ¼º) Ãë¾àÁ¡ ¹× ´ëÀÀ ¹æ¾È
    56. ±â°ü ³»ºÎÀÚ¿¡ ÀÇÇØ ÇàÇØÁö´Â º¸¾È À§ÇùÀÇ ÁÖ¿ä ÇൿÀû Ư¼º
    PART 4. ±â¾÷ ¹× °³ÀÎÀÇ Á¤º¸º¸È£, ÀÎÁõ
    57. ISO 27000 Family
    58. ISO 27001 (ISMS-Information Security Management System)
    59. ±â¾÷ Á¤º¸º¸¾È
    60. Á¤º¸º¸È£ °ü¸® ¹× Á¤Ã¥
    61. Á¤º¸º¸È£ÀÇ Çʿ伺°ú ±â¾÷ÀÇ Á¤º¸º¸È£½ÃÀÇ ÀåÁ¡
    62. Á¤º¸º¸¾È°ü¸®¿¡¼­ÀÇ Áß¿ä ¿ë¾î
    63. CCÆò°¡ ÀÎÁõ ÀýÂ÷ ¹× °¢ ´Ü°èº° ¾÷¹«
    64. Á¤º¸º¸È£ ½Ã½ºÅÛ º¸¾È¼º Æò°¡ ÀÎÁõ ½Ã ÇÊ¿äÇÑ ¹®¼­
    65. CC(Common Criteria)
    66. °³ÀÎÁ¤º¸¿µÇâÆò°¡(PIA: Privacy Impact Assessment) ÀÇ ¸ñÀû, Æò°¡´ë»ó, Æò°¡´Ü°è ¹× Æò°¡ ÀýÂ÷
    67. PIMS(Personal Information management System)ÀÇ ±¸¼º¿ä¼Ò¿Í ÀÎÁõü°è
    68. °³ÀÎÁ¤º¸ÀÎÁõ(PIPL-Personal Information Protection Level)
    69. PMS (Patch Management System)
    70. ±â¾÷ Á¤º¸ º¸È£ Â÷¿ø¿¡¼­ À§Çè °ü¸®(Risk Management)¹æ¾È
    71. Àü»ç º¸¾È °¨µ¶ À§¿øÈ¸(Enterprise Wide Security Oversight Committee) ±¸¼º°ú ¿ªÇÒ
    72. °³ÀÎÁ¤º¸°ü¸®Ã¥ÀÓÀÚ(CPO: Chief Privacy Officer)
    73. OECD °³ÀÎ Á¤º¸º¸È£ 8´ë ¿øÄ¢
    74. Á¤º¸º¸È£ ÀÎÁõÀ» À§ÇØ ISMS, PIMS, PIPLÀÌ ¿î¿µµÇ°í ÀÖ´Â °¡¿îµ¥ ¹æ¼ÛÅë½ÅÀ§¿øÈ¸´Â ISMS, PIMS, PIPLÀ» ÅëÇÕÇÑ ISMS-P(°¡Äª)¿Í ±ÝÀ¶À§¿øÈ¸ÀÇ F-ISMSÀÇ µµÀÔ ³íÀÇ·Î Á¤º¸º¸È£ ÀÎÁõÁ¦µµÀÇ Áߺ¹¼ºÀÌ Áõ°¡µÉ ¼ö ÀÖ´Ù. Á¤º¸º¸È£ ÀÎÁõÀÇ Áߺ¹ÅõÀÚ¸¦ ¹æÁöÇϰí È¿À²¼º°ú ½ÇÈ¿¼ºÀ» ³ôÀ̱â À§ÇÑ ¹æ¾È
    75. °³ÀÎÁ¤º¸ÀÇ °³³ä°ú ±¹³» °³ÀÎÁ¤º¸¹ý·üÀ» ¼³¸íÇϰí, ºòµ¥ÀÌÅÍ(Big Data)µî ½Å »ê¾÷ À°¼º ½Ã ±ÔÁ¦ Ãø¸éÀÇ °í·Á »çÇ×
    76. CCL(Creative Commons License)
    77. SSO(Single Sign On)(1±³½ÃÇü)
    78. SSO(Single Sign On)(2±³½ÃÇü)
    79. Á¢±ÙÅëÁ¦(Access Control)ÀÇ ¹°¸®Àû, °ü¸®Àû, ±â¼úÀû ÅëÁ¦ ¹æ¾È
    80. Á¢±ÙÅëÁ¦(Access Control)ÀÇ ÀýÂ÷
    81. Á¤º¸º¸¾ÈÀÇ Á¢±Ù ÅëÁ¦ À¯Çü
    82. Ä¿º£·Î½º(Kerberos) ÀÎÁõ ÇÁ·ÎÅäÄÝ
    83. AAA(Authentication, Authorization, Accounting)
    84. »ýüÀνıâ¹ýÀÇ Æ¯Â¡°ú ´ÙÁß »ýü ÀÎ½Ä ±â¼ú
    85. I-PIN 2.0
    86. PKI (Public Key Infrastructure)
    PART 5. ³×Æ®¿öÅ© º¸¾È
    87. ¹æÈ­º®(Firewall)
    88. ħÀÔÂ÷´Ü½Ã½ºÅÛ(Firewall)ÀÇ ±¸¼º ÇüÅÂ
    89. ħÀÔŽÁö ½Ã½ºÅÛ(IDS: Intrusion Detection System)ÀÇ ½ÇÇà ´Ü°è
    90. ħÀÔŽÁö ½Ã½ºÅÛ(IDS)¸¦ »ç¿ëÇÏ¿© Suspicious Packet(ÀÚ·á)¸¦ ¼öÁý ¹æ¹ý
    91. ºñÁ¤»ó ħÀÔ Å½Áö(Anomaly Detection)¿Í ¿À¿ëħÀÔŽÁö(Misuse Detection)
    92. ħÀÔÂ÷´Ü ½Ã½ºÅÛ°ú ħÀÔŽÁö ½Ã½ºÅÛÀ» ºñ±³
    93. VPN(Virtual Private N/W)ÀÇ Àû¿ë ±â¼ú
    94. IPSecÀÇ AH¹× ESPÀÇ »ó¼¼±¸Á¶¿Í °¢ ÇʵåÀÇ º¸¾È»ó ¿ëµµ
    95. SET(Secure Electronic Transaction)°ú SSL(Secure Socket Layer)
    96. EAM(Enterprise Access Management)
    97. ESM(Enterprise Security Management)
    98. UTMS(Unified Threat Management System)
    99. RSM(R

    ¹è¼Û ½Ã À¯ÀÇ»çÇ×

    - ¹Ýµð¾Ø·ç´Ï½º¿¡¼­ ±¸¸ÅÇϽеµ¼­´Â ¹°·ù ´ëÇà À§Å¹¾÷ü ¿õÁø ºÏ¼¾À» ÅëÇØ ¹è¼ÛµË´Ï´Ù.
     (¹è¼Û Æ÷Àå¿¡ "¿õÁø ºÏ¼¾"À¸·Î Ç¥±âµÉ ¼ö ÀÖ½À´Ï´Ù.)

    - ±¸¸ÅÇÑ »óǰÀÇ Ç°Áú°ú ¹è¼Û °ü·Ã ¹®ÀÇ´Â ¹Ýµð¾Ø·ç´Ï½º·Î ¹®ÀÇ ¹Ù¶ø´Ï´Ù.

    - õÀçÁöº¯ ¹× Åùè»çÀÇ »çÁ¤¿¡ µû¶ó ¹è¼ÛÀÌ Áö¿¬µÉ ¼ö ÀÖ½À´Ï´Ù.

    - °áÁ¦(ÀÔ±Ý) ¿Ï·á ÈÄ ÃâÆÇ»ç ¹× À¯Åë»çÀÇ »çÁ¤À¸·Î ǰÀý ¶Ç´Â ÀýÆÇ µÇ¾î »óǰ ±¸ÀÔÀÌ ¾î·Á¿ï ¼ö ÀÖ½À´Ï´Ù. (º°µµ ¾È³» ¿¹Á¤)

    - µµ¼­»ê°£Áö¿ªÀÇ °æ¿ì Ãß°¡ ¹è¼Ûºñ°¡ ¹ß»ýµÉ ¼ö ÀÖ½À´Ï´Ù.

    ¹Ýǰ/±³È¯

    »óǰ ¼³¸í¿¡ ¹Ýǰ/ ±³È¯ °ü·ÃÇÑ ¾È³»°¡ ÀÖ´Â °æ¿ì ±× ³»¿ëÀ» ¿ì¼±À¸·Î ÇÕ´Ï´Ù. (¾÷ü »çÁ¤¿¡ µû¶ó ´Þ¶óÁú ¼ö ÀÖ½À´Ï´Ù)

    ¹Ýǰ/±³È¯

    ¹Ýǰ/±³È¯
    ¹Ýǰ/±³È¯ ¹æ¹ý Ȩ > °í°´¼¾ÅÍ > ÀÚÁÖã´ÂÁú¹® ¡°¹Ýǰ/±³È¯/ȯºÒ¡± ¾È³» Âü°í ¶Ç´Â 1:1»ó´ã°Ô½ÃÆÇ
    ¹Ýǰ/±³È¯ °¡´É ±â°£ ¹Ýǰ,±³È¯Àº ¹è¼Û¿Ï·á ÈÄ 7ÀÏ À̳», »óǰÀÇ °áÇÔ ¹× °è¾à³»¿ë°ú ´Ù¸¦ °æ¿ì ¹®Á¦¹ß°ß ÈÄ 30ÀÏ À̳»¿¡ ½Åû°¡´É
    ¹Ýǰ/±³È¯ ºñ¿ë º¯½É ȤÀº ±¸¸ÅÂø¿ÀÀÇ °æ¿ì¿¡¸¸ ¹Ý¼Û·á °í°´ ºÎ´ã(º°µµ ÁöÁ¤ Åùè»ç ¾øÀ½)
    ¹Ýǰ/±³È¯ ºÒ°¡ »çÀ¯
    • ¼ÒºñÀÚÀÇ Ã¥ÀÓ »çÀ¯·Î »óǰ µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì
    • ¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óǰ µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
    • º¹Á¦°¡ °¡´ÉÇÑ »óǰ µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì : ¿¹)¸¸È­Ã¥, ÀâÁö, È­º¸Áý µî
    • ½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆÇ¸Å°¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
    • ÀüÀÚ»ó°Å·¡µî¿¡¼­ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡ ÇØ´çµÇ´Â °æ¿ì
    • ÇØ¿ÜÁÖ¹® »óǰ(ÇØ¿Ü ¿ø¼­)ÀÇ °æ¿ì(ÆÄº»/ÈѼÕ/¿À¹ß¼Û »óǰÀ» Á¦¿Ü)
    ¼ÒºñÀÚ ÇÇÇØº¸»ó
    ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó
    • »óǰÀÇ ºÒ·®¿¡ ÀÇÇÑ ¹Ýǰ, ±³È¯, A/S, ȯºÒ, ǰÁúº¸Áõ ¹× ÇÇÇØº¸»ó µî¿¡ °üÇÑ »çÇ×Àº
      ¼ÒºñÀÚ ºÐÀïÇØ°á ±âÁØ(°øÁ¤°Å·¡À§¿øÈ¸°í½Ã)¿¡ ÁØÇÏ¿© 󸮵Ê
    • ´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ
      ¼ÒºñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ
    ¹Ýǰ/±³È¯ ÁÖ¼Ò °æ±âµµ ÆÄÁֽà ¹®¹ß·Î 77, ¿õÁøºÏ¼¾(¹Ýµð¾Ø·ç´Ï½º)
    • ȸ»ç¸í : (ÁÖ)¼­¿ï¹®°í
    • ´ëÇ¥ÀÌ»ç : ±èÈ«±¸
    • °³ÀÎÁ¤º¸ º¸È£Ã¥ÀÓÀÚ : ±èÈ«±¸
    • E-mail : bandi_cs@bnl.co.kr
    • ¼ÒÀçÁö : (06168) ¼­¿ï °­³²±¸ »ï¼º·Î 96±æ 6
    • »ç¾÷ÀÚ µî·Ï¹øÈ£ : 120-81-02543
    • Åë½ÅÆÇ¸Å¾÷ ½Å°í¹øÈ£ : Á¦2023-¼­¿ï°­³²-03728È£
    • ¹°·ù¼¾ÅÍ : (10881) °æ±âµµ ÆÄÁֽà ¹®¹ß·Î 77 ¹Ýµð¾Ø·ç´Ï½º
    copyright (c) 2016 BANDI&LUNI'S All Rights Reserved