Ã¥¼Ò°³
ÀÌ Ã¥Àº Çпø ¼ö°À» ÅëÇØ ½ÀµæÇÑ ³»¿ë°ú ¸àÅ丵À» ÁøÇàÇÏ¸é¼ ½º½º·Î ÇнÀÇÑ ³»¿ëÀ» ¹ÙÅÁÀ¸·Î ´ä¾È ÇüÅ·ΠÀÛ¼ºÇÏ¿´°í, ITºÐ¾ß ±â¼ú»çÀÎ Á¤º¸°ü¸®±â¼ú»ç¿Í ÄÄÇ»ÅͽýºÅÛÀÀ¿ë±â¼ú»ç ÀÚ°ÝÀ» ÃëµæÇϱâ À§ÇØ ÇнÀÇÏ°í Àְųª ÇнÀÇÏ°íÀÚ ÇÏ´Â ºÐµéÀ» À§ÇØ ¸¸µé¾ú´Ù. º» ±³Àç´Â ¹ßÀü µ¿Çâ, ¹è°æ ±×¸®°í À¯»ç ±â¼ú°úÀÇ ºñ±³, ´Ù¾çÇÑ µµ½ÄÈ µî 25³â°£ÀÇ ½Ç¹« °³¹ßÀÚ °æÇèÀ» Åä´ë·Î ÀÛ¼ºÇÑ ³»¿ëÀ¸·Î dzºÎÇÑ °æÇèÀûÀÎ ¿ä¼Ò°¡ ³»ÀçµÇ¾î ÀÖ´Â ÀåÁ¡ÀÌ ÀÖ´Ù.
¸ñÂ÷
PART 1. Á¤º¸º¸È£1. Á¤º¸º¸È£ÀÇ ¸ñÇ¥2. Á¤º¸±â¼úÀÇ ±¸¼º¿ä¼Ò¿Í Á¤º¸È »çȸÀÇ Æ¯¼º, Á¤º¸ÈÀÇ ¿ª±â´É3. Á¤º¸º¸È£ÀÇ Çʿ伺4. Á¤º¸º¸È£(Information Security)ÀÇ À§Çè¿ä¼Ò5. Á¤º¸º¸È£ ´ëÃ¥6. OSI º¸¾È±¸Á¶ÀÎ X. 800 Á¤ÀÇ7. NIST(¹Ì±¹ »ê¾÷ Ç¥ÁØ ±â°ü)¿¡¼ Á¦½ÃÇÑ Á¤º¸ º¸¾ÈÀÇ ÇÙ½É ¿øÄ¢8. º¸¾È ¼øȯ »çÀÌŬ(Cycle)9. º¸¾È ÇÁ·¹ÀÓ¿öÅ©(Framework), À§Çù ´ëÀÀ ÀýÂ÷10. º¸¾È °Å¹ö³Í½º(Security Governance)PART 2. ¾ÏÈ£ÇÐ11. ¾ÏÈ£ ¹æ½ÄÀÇ ¹ßÀü °úÁ¤(°í´ë, ±Ù´ë, Çö´ë)12. ÇöÀç ¾ÏÈ£ÇÐÀÇ ¼öÇÐÀû À̷еé - ¾à¼ö&¹è¼ö, ÃÖ´ë°ø¾à¼ö, ¼·Î¼Ò, À¯Å¬¸®µå È£Á¦¹ý, ¼Ò¼ö(¼ÒÀμöºÐÇØ), ¸ðµâ·¯ ¿¬»ê, À׿©°è, ¿ÀÀÏ·¯ÀÇ Á¤¸®, Æ丣¸¶ÀÇ Á¤¸®13. mod 89¿¡¼ 27ÀÇ ½Â»ê ¿ª¿ø14. mod 65¿¡¼ 27¿ø ½Â»ê ¿ª¿ø15. ¾ÏÈ£Çп¡ Àû¿ëµÇ´Â À¯Å¬¸®µå È£Á¦¹ý(Euclidean Algorithms)ÀÇ ¿ø¸®¸¦ Áõ¸í, ÀÌ ¿ø¸®¸¦ ÀÌ¿ëÇÏ¿© (252, 198)ÀÇ ÃÖ´ë °ø¾à¼ö¸¦ ±¸ÇϽÿÀ.16. Æ丣¸¶ ¼ÒÁ¤¸®¸¦ ÀÌ¿ëÇÏ¿© ¾Æ·¡ ¿¬»êÀÌ ¼º¸³ÇÔÀ» º¸À̽ÿÀ. 528 = 4(mod 11)17. ¾ÏÈ£ ±â¹ý ? ġȯ, ÀüÄ¡, Àû(product) ¾ÏÈ£¹æ½Ä18. ºí·Ï(Block)¾ÏÈ£±â¹ý°ú ½ºÆ®¸² ¾ÏÈ£(Stream Cipher)±â¹ý 19. ´ëĪŰ¿Í ºñ´ëĪ Key ¾ÏÈ£ ¹æ½Ä20. Çö´ë ¾ÏÈ£ÇÐÀÇ ±âÃÊ, Feistel ¾ÏÈ£ÀÇ ±¸Á¶¿Í ¾ÏÈ£È¿Í º¹È£È °úÁ¤21. Feistel ¾ÏÈ£ ±¸Á¶¿¡¼ fÇÔ¼ö¿Í S-Box22. ºí·Ï¾ÏÈ£, Feistel ¾ÏÈ£±¸Á¶¿Í SPN(Substitution Permutation Network) ºñ±³23. AES(Advanced Encryption Standard) ¾ÏÈ£È ¾Ë°í¸®Áò24. ±¹»ê ¾ÏÈ£È ¾Ë°í¸®Áò, SEED25. ±¹»ê ¾ÏÈ£È ¾Ë°í¸®Áò, ARIA(Academy Research Institute Agency)26. DES ¿Í AES ¾ÏÈ£ÀÇ Àå´ÜÁ¡27. ºí·Ï(Block)¾ÏÈ£È ±â¹ý¿¡¼ ECB ¸ðµå¿Í CBC ¿î¿ë¸ðµåÀÇ µ¿ÀÛ ¹× Àå?´ÜÁ¡28. °ø°³Å° ¾ÏÈ£È ¹æ½Ä (¾ÏÈ£±â¹ý ºÐ·ù)29. RSA°ø°³Å° ¾ÏÈ£¹æ½Ä¿¡¼ ¼Û½ÅÀÚ ºñ¹ÐÅ°(p=7, q=11)ÀÌ°í ¼Û½ÅÀÚÀÇ °ø°³Å°(Ke)°ªÀÌ 13ÀÏ ¶§ ¼ö½ÅÀÚÀÇ °³ÀÎÅ°(Kd)¸¦ ±¸Ç϶ó30. °ø°³Å° ¾ÏÈ£È ¹æ½ÄÀ» ¼³¸íÇÏ°í ºñ¹ÐÅ°(p=3, q=11)ÀÌ°í Æò¹® M=5ÀÏ ¶§ RSA ¾ÏÈ£È º¹È£È °úÁ¤À» ¼³¸íÇϽÿÀ.31. Çؽ¬ÇÔ¼ö(Hash Function)ÀÇ Æ¯Â¡32. ºñ ´ëĪŰ (°ø°³Å° ¾ÏÈ£¹æ½Ä)¹æ½ÄÀÇ ÀüÀÚ¼¸í ¹æ¹ý33. RSA ¾ÏÈ£¹æ½ÄÀ» ÀÌ¿ëÇÑ ÀüÀÚ¼¸í¹æ½Ä¿¡ ´ëÇØ 2°¡Áö ÀÌ»ó ¼³¸íPART 3. º¸¾È À§Çù34. ÇØÄ¿(Hacker) °ø°Ý À¯Çü35. ÇǽÌ(Phishing)°ú ÆĹÖ(Pharming)36. ÇǽÌ(Phishing)ÀÇ °ø°ÝÀ¯Çü°ú ´ëÀÀ¹æ¹ý37. ÆĹÖ(Pharming)ÀÇ °ø°ÝÀ¯Çü°ú ´ëÀÀ¹æ¾È, Phishing°ú ºñ±³38. ·¥¼¶¿þ¾î(Randsom-ware)¿Í ÆĹÖ(Pharming)39. DDoS(2±³½ÃÇü)40. DDoSÀÇ °ø°Ý ´ëÀÀ ¹æ¾È(1±³½ÃÇü)41. DrDOS42. Sniffing°ú Spoofing43 ÀÎÅÍ³Ý Protocol ¿¡¼ 4´Ü°è ÁÖ¼Òü°è(Specific/Port/Logical/Physical Address)¸¦ ¼³¸íÇÏ°í °¢ ÁÖ¼Òü°è¿¡¼ ¹ß»ýµÉ ¼ö ÀÖ´Â SpoofingÀÇ À§Çù44. ARP Spoofing¿¡ ´ëÇØ ¼³¸íÇÏ°í °ø°ÝŽÁö ¹æ¹ý°ú ´ëÀÀ ¹æ¾È45. Malware46. Rootkit(·çƮŶ)47. º¿ ³Ý(Bot Net)48. Session Hijacking(³³Ä¡) Attack49. APT(Advanced Persistent Threat) °ø°Ý±â¹ý°ú ´ëÀÀ¹æ¾È50. DNS (Domain Name Server) Sinkhole51. SQL Injection °ø°Ý±â¹ý52. XSS(Cross Site Scripting), CSRF¿Í ºñ±³53. CSRF(Cross-Site Request Forgery)54. TCP¿Í UDP Â÷ÀÌÁ¡, 3 Way Handshaking, SYN Attack,ÇØ°á¹æ¾È55. Buffer Overflow (Sample Code ÀÛ¼º) Ãë¾àÁ¡ ¹× ´ëÀÀ ¹æ¾È56. ±â°ü ³»ºÎÀÚ¿¡ ÀÇÇØ ÇàÇØÁö´Â º¸¾È À§ÇùÀÇ ÁÖ¿ä ÇൿÀû Ư¼ºPART 4. ±â¾÷ ¹× °³ÀÎÀÇ Á¤º¸º¸È£, ÀÎÁõ57. ISO 27000 Family58. ISO 27001 (ISMS-Information Security Management System)59. ±â¾÷ Á¤º¸º¸¾È60. Á¤º¸º¸È£ °ü¸® ¹× Á¤Ã¥61. Á¤º¸º¸È£ÀÇ Çʿ伺°ú ±â¾÷ÀÇ Á¤º¸º¸È£½ÃÀÇ ÀåÁ¡62. Á¤º¸º¸¾È°ü¸®¿¡¼ÀÇ Áß¿ä ¿ë¾î63. CCÆò°¡ ÀÎÁõ ÀýÂ÷ ¹× °¢ ´Ü°èº° ¾÷¹«64. Á¤º¸º¸È£ ½Ã½ºÅÛ º¸¾È¼º Æò°¡ ÀÎÁõ ½Ã ÇÊ¿äÇÑ ¹®¼65. CC(Common Criteria)66. °³ÀÎÁ¤º¸¿µÇâÆò°¡(PIA: Privacy Impact Assessment) ÀÇ ¸ñÀû, Æò°¡´ë»ó, Æò°¡´Ü°è ¹× Æò°¡ ÀýÂ÷67. PIMS(Personal Information management System)ÀÇ ±¸¼º¿ä¼Ò¿Í ÀÎÁõü°è68. °³ÀÎÁ¤º¸ÀÎÁõ(PIPL-Personal Information Protection Level)69. PMS (Patch Management System)70. ±â¾÷ Á¤º¸ º¸È£ Â÷¿ø¿¡¼ À§Çè °ü¸®(Risk Management)¹æ¾È71. Àü»ç º¸¾È °¨µ¶ À§¿øȸ(Enterprise Wide Security Oversight Committee) ±¸¼º°ú ¿ªÇÒ72. °³ÀÎÁ¤º¸°ü¸®Ã¥ÀÓÀÚ(CPO: Chief Privacy Officer)73. OECD °³ÀÎ Á¤º¸º¸È£ 8´ë ¿øÄ¢74. Á¤º¸º¸È£ ÀÎÁõÀ» À§ÇØ ISMS, PIMS, PIPLÀÌ ¿î¿µµÇ°í ÀÖ´Â °¡¿îµ¥ ¹æ¼ÛÅë½ÅÀ§¿øȸ´Â ISMS, PIMS, PIPLÀ» ÅëÇÕÇÑ ISMS-P(°¡Äª)¿Í ±ÝÀ¶À§¿øȸÀÇ F-ISMSÀÇ µµÀÔ ³íÀÇ·Î Á¤º¸º¸È£ ÀÎÁõÁ¦µµÀÇ Áߺ¹¼ºÀÌ Áõ°¡µÉ ¼ö ÀÖ´Ù. Á¤º¸º¸È£ ÀÎÁõÀÇ Áߺ¹ÅõÀÚ¸¦ ¹æÁöÇÏ°í È¿À²¼º°ú ½ÇÈ¿¼ºÀ» ³ôÀ̱â À§ÇÑ ¹æ¾È75. °³ÀÎÁ¤º¸ÀÇ °³³ä°ú ±¹³» °³ÀÎÁ¤º¸¹ý·üÀ» ¼³¸íÇÏ°í, ºòµ¥ÀÌÅÍ(Big Data)µî ½Å »ê¾÷ À°¼º ½Ã ±ÔÁ¦ Ãø¸éÀÇ °í·Á »çÇ×76. CCL(Creative Commons License)77. SSO(Single Sign On)(1±³½ÃÇü)78. SSO(Single Sign On)(2±³½ÃÇü)79. Á¢±ÙÅëÁ¦(Access Control)ÀÇ ¹°¸®Àû, °ü¸®Àû, ±â¼úÀû ÅëÁ¦ ¹æ¾È80. Á¢±ÙÅëÁ¦(Access Control)ÀÇ ÀýÂ÷81. Á¤º¸º¸¾ÈÀÇ Á¢±Ù ÅëÁ¦ À¯Çü82. Ä¿º£·Î½º(Kerberos) ÀÎÁõ ÇÁ·ÎÅäÄÝ83. AAA(Authentication, Authorization, Accounting)84. »ýüÀνıâ¹ýÀÇ Æ¯Â¡°ú ´ÙÁß »ýü ÀÎ½Ä ±â¼ú85. I-PIN 2.086. PKI (Public Key Infrastructure)PART 5. ³×Æ®¿öÅ© º¸¾È87. ¹æȺ®(Firewall)88. ħÀÔÂ÷´Ü½Ã½ºÅÛ(Firewall)ÀÇ ±¸¼º ÇüÅÂ89. ħÀÔŽÁö ½Ã½ºÅÛ(IDS: Intrusion Detection System)ÀÇ ½ÇÇà ´Ü°è90. ħÀÔŽÁö ½Ã½ºÅÛ(IDS)¸¦ »ç¿ëÇÏ¿© Suspicious Packet(ÀÚ·á)¸¦ ¼öÁý ¹æ¹ý91. ºñÁ¤»ó ħÀÔ Å½Áö(Anomaly Detection)¿Í ¿À¿ëħÀÔŽÁö(Misuse Detection)92. ħÀÔÂ÷´Ü ½Ã½ºÅÛ°ú ħÀÔŽÁö ½Ã½ºÅÛÀ» ºñ±³93. VPN(Virtual Private N/W)ÀÇ Àû¿ë ±â¼ú94. IPSecÀÇ AH¹× ESPÀÇ »ó¼¼±¸Á¶¿Í °¢ ÇʵåÀÇ º¸¾È»ó ¿ëµµ95. SET(Secure Electronic Transaction)°ú SSL(Secure Socket Layer)96. EAM(Enterprise Access Management)97. ESM(Enterprise Security Management)98. UTMS(Unified Threat Management System)99. RSM(Risk Management System)100. Honey PotÀÇ µ¿ÀÛ¿ø¸®, ±¸¼º, ÁÖ¿ä±â´É101. TCPÀÇ Á¤»óÀûÀÎ 3-Way Handshaking °ú TCP SYN Attack ¹æ¹ý°ú ÇØ°á ¹æ¾È102. TCP SYN Attack¿¡¼ L7 ½ºÀ§Ä¡·Î ´ëÀÀÇÒ ¼ö ÀÖ´Â ¹æ¹ýPART 6. System º¸¾È103. TEE/SEE(Trusted Execution Environment/Secure)104. TPM(Trusted Platform Module)105. Trust Zone106. ¹«¼± LAN(Local Area Network)ÀÇ º¸¾È À§Çù107. ¹«¼± LAN º¸¾È(2±³½ÃÇü)108. IEEE 802.11i109. Gray Hacker110. Smart Work ÀÇ º¸¾ÈÀ̽´(Issue)¿Í À̽´ ´ëó ¹æ¾È111. Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ(Cloud Computing)112. DB(Data Base)º¸¾È113. Software º¸¾È Å×½ºÆ® ¹æ¹ý·Ð114. ¿î¿µÃ¼Á¦¿¡¼ º¸¾È Ä¿³Î(Kernel)±¸Çö Àü·« ¹× °³¹ß¹æ¹ý115. Smart Grid º¸¾È116. µðÁöÅÐ Æ÷·»½Ä(Digital Forensics)117. ÄÄÇ»ÅÍ(Computer) Æ÷·»½Ä(Forensic)118. ½º¸¶Æ® Æù(Smart hone) Æ÷·»½Ä(Forensic). 1) ½º¸¶Æ® Æù(Smart hone) Æ÷·»½Ä Data¿Í ÀýÂ÷ 2) ½º¸¶Æ®Æù³»ÀÇ Data ÃßÃâ ¹æ¹ý119. ¾ÈƼÆ÷·»½Ä(Anti- Forensics)120. OWASP(Open Web Application Security Project)-Web App. º¸¾ÈPART 7. Àü¼Û µ¥ÀÌÅÍ ¹«°á¼º È®º¸ ¹æ¾È121. ÇعÖÄÚµå(Hamming Code)ÀÇ ¿À·ù °Ë»ö°ú ¼öÁ¤¹æ¹ý, È°¿ë¹æ¾È122. ¼ø¹æÇâ ¿¡·¯ ¹ß°ß(Forward Error Detection) ÀýÂ÷¸¦ ´ÙÀ̾î±×·¥, CRC(Cyclic Redundancy Check) °ªÀ» ±¸ÇÏ´Â °úÁ¤123. 2Â÷¿ø ¦¼ö Æи®Æ¼¸¦ »ç¿ë, ´ÜÀÏ ºñÆ® ¿À·ù ¹ß°ß(Detection)°ú Á¤Á¤(Correction) °úÁ¤124. Internet Checksum »ý¼º ¹× °ËÁõ °úÁ¤
ÇÑÁÙ ¼Æò