|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Keystroke Monitoring
- BackOrifice
- ³×Æ®¿öÅ© Monitoring
- Sniffing, IP Spoofing
- Æнº¿öµå Cracking
- Brute force attack
- IT Staff Abuse
- Åð»çÀÚ¿¡ ÀÇÇÑ ID/Password µµ¿ë
|
|
|
PasswordÀÇ »ç¿ë±â°£À» Á¤ÇØÁشٰųª ¸î ¹ø ÀÌ»ó ÀÎÁõ¿¡ ½ÇÆÐÇϸé ÇØ´ç ID¸¦
»ç¿ëÇÏÁö ¸øÇÏ°Ô Çϸç, PasswordÀÇ ±æÀ̳ª ¸¸µå´Â ¿ä·É µî¿¡ ´ëÇØ ¸¹Àº
³íÀÇ°¡ ÀÖÁö¸¸ ±Ùº»Àû ÇØ°áÃ¥Àº ¾Æ´Ô.
|
|
|
|
|
|
|