|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ÃÖ±Ù ¹ß»ýÇÏ´Â ³×Æ®¿öÅ©¸¦ ÀÌ¿ëÇÑ
°ø°ÝÀ¸·ÎºÎÅÍ ½Ã½ºÅÛÀ» º¸È£ÇÏ°í, ¾Ç¼º Æ®·¡ÇÈÀ¸·Î ÀÎÇÑ ¿À¿°°ú ³×Æ®¿öÅ©ÀÇ ¸¶ºñ¸¦ ¹æÁöÇÏ°í IT ÀÎÇÁ¶óÀÇ
º¸È£Çϵµ·Ï ħÀÔ¿¡ ´ëÇØ ´Éµ¿ÀûÀ¸·Î ¹æ¾îÇÏ´Â Á¦Ç°ÀÔ´Ï´Ù. |
|
|
|
|
±âÁ¸ÀÇ Á¤º¸
ȹµæÀ» ¸ñÀûÀ¸·Î ÇÏ´Â °ø°Ý°ú ´Þ¸® ÃÖ±ÙÀÇ ³×Æ®¿öÅ©¸¦ ÀÌ¿ëÇÑ °ø°ÝÀº Á¤»óÀûÀÎ ¼ºñ½º¸¦ ¹æÇØÇϰųª ½Ã½ºÅÛÀ»
´Ù¿î ½ÃÅ°´Â °ÍÀ» ¸ñÀûÀ¸·Î ÇÏ°í ÀÖ½À´Ï´Ù.
¿î¿µÃ¼Á¦ÀÇ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ¿© ´ë¿ë·®ÀÇ Æ®·¡ÇÈÀ» ¹ß»ý½ÃÅ°´Â worm ¹ÙÀÌ·¯½ºÀÇ ÃâÇö ¶ÇÇÑ ÃÖ±Ù¿¡ ÀϾî³
»ç°ÇÀÔ´Ï´Ù.
»Ó¸¸ ¾Æ´Ï¶ó P2P, messenger¸¦ ÀÌ¿ëÇÑ ±â¾÷ ³»ºÎÀÇ Á¤º¸ À¯ÃâÀº ºÒƯÁ¤ÀÇ ´Ù¼ö°¡ ¼ö½ÅÀÚ°¡
µÈ´Ù´Â Ãø¸é¿¡¼ º¸¾È¿¡ ±¸¸ÛÀÌ ¶Õ·È´Ù°í Ç¥Çö ÇÒ ¼ö ÀÖ½À´Ï´Ù.
ÀÌ·¯ÇÑ ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇØ ²ÙÁØÇÑ ¼ÒºñÀÚÀÇ ÇÊ¿ä¿¡ ÀÇÇØ °³¹ßµÈ Á¦Ç°ÀÌ SecureFortÀÔ´Ï´Ù. |
|
|
|
|
±âÁ¸ º¸¾È ¼Ö·ç¼Çµé(¹æȺ®, IDS,
¹é½Åµî)ÀÇ ÇÑ°èÁ¡À» ±Øº¹ÇÏ¿©, °ü¸® ³ë·ÂÀ» ÃÖ¼ÒÈ ÇÏ¸é¼ ÃÖ´ëÇÑÀÇ º¸¾È È¿°ú¸¦ Á¦°øÇÒ ¼ö ÀÖ´Â ±â¹Ý
±â¼úÀ» ConceptÀ¸·Î ¼³°èµÇ¾ú½À´Ï´Ù. ±âÁ¸ÀÇ º¸¾È ±â¼úµéÀÇ ¿©·¯°¡Áö ´ÜÁ¡°ú ÇѰ踦 º¸¿ÏÇϸç,
½ÇÁ¦ ³×Æ®¿öÅ© ȯ°æ¿¡ ÃÖÀûȵǾî ÃÖ»óÀÇ ¼º´ÉÀ» Á¦°øÇÒ ¼ö ÀÖ´Â ±â¹Ý ±¸Á¶·Î ¼³°è µÇ¾ú½À´Ï´Ù.
|
|
|
SecureFortÀÇ
±âº» °³¹ß Guideline ¹× Requirements
¤ý°£ÆíÇÏ°Ô ¼³Ä¡ÇÏ°í, ½±°Ô ¿î¿ë ÇÒ ¼ö ÀÖ¾î¾ß ÇÕ´Ï´Ù.
¤ýħÀÔÀ¸·ÎºÎÅÍ ½Ã½ºÅÛÀ» º¸È£Çϴµ¥ °ü¸®ÀÚÀÇ °³ÀÔÀ» ÃÖ¼ÒÈ ÇØ¾ß ÇÕ´Ï´Ù.
¤ý³×Æ®¿öÅ©¿¡ ¼³Ä¡ ÀÌÈÄ Àüü ³×Æ®¿öÅ©ÀÇ ¼Óµµ°¡ ´Ê¾îÁö¸é ¾ÊµË´Ï´Ù.
¤ý°ø°Ý¸¸À» Á¤È®ÇÏ°Ô Â÷´ÜÇÏ¿© Á¤»óÀûÀÎ ¼ºñ½º³ª ³×Æ®¿öÅ© ÀÌ¿ë¿¡ ¿µÇâÀ» ÁÖÁö ¸»¾Æ¾ß ÇÕ´Ï´Ù.
¤ý¾Ë·ÁÁø °ø°Ý, ¾Ë·ÁÁöÁö ¾ÊÀº °ø°Ý¿¡ ´ëÇÑ Å½Áö/¹æ¾î°¡ °¡´ÉÇØ¾ß ÇÕ´Ï´Ù.
¤ýÀüü Æ®·¡ÇÈ¿¡¼ °ø°Ý Æ®·¡ÇÈÀÌ 100%°¡ µÇ´õ¶óµµ ÀåºñÀÇ ¼º´ÉÀúÇÏ°¡ ÀϾÁö ¾Ê¾Æ¾ß ÇÕ´Ï´Ù.
¤ýÀåºñÀÇ ¾ÈÁ¤¼ºÀ» ÃÖ´ëÇÑ º¸ÀåÇØ¾ß ÇÕ´Ï´Ù.
¤ýŽÁö, Â÷´Ü, ·êÀÇ Áõ°¡¿¡µµ Àåºñ´Â Ç×»ó µ¿ÀÏÇÑ ÃÖ»óÀÇ ¼º´ÉÀ» ¹ßÈÖÇØ¾ß ÇÕ´Ï´Ù. |
|
|
|
|
ºê¸´Áö ¹æ½ÄÀ» ÀÌ¿ëÇÑ
³×Æ®¿öÅ©»óÀÇ ÆÐŶó¸® ½Ã½ºÅÛ
- System for processing a packet on a network of computer
System using a multi-bridge mode
¿ÜºÎ ³×Æ®¿öÅ© ¹× ³»ºÎ ³×Æ®¿öÅ©·ÎºÎÅÍÀÇ Ä§ÀÔ ¹æÁö ¹æ¹ý
- Method of Preventing intrusion from on exterior network
and interior network.
2002 ´ëÇѹα¹ À̸Ó¡ ¿ì¼ö ±â¼ú»ó - ¼¿ï°æÁ¦½Å¹® ¼±Á¤
2002 Áß¼Ò±â¾÷ ±â¼úÇõ½Å´ëÀü ±â¼úÇõ½Å»ó - Áß¼Ò±â¾÷û |
|
|
|
|
|