Post

[Security] Basic Concepts of Cybersecurity(1) - CIA+AN

[Security] Basic Concepts of Cybersecurity(1) - CIA+AN

๐Ÿ”’ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ธฐ์ดˆ ์ˆ˜์—… ์ •๋ฆฌ

โ€˜์ •๋ณด ๋ณด์•ˆโ€™์—์„œ ์ •๋ณด๋Š” ์–ด๋–ป๊ฒŒ ์ฒ˜๋ฆฌ๋˜๋Š” ๊ฑด๊ฐ€?์— ๋Œ€ํ•ด Russell L. Ackoff๊ฐ€ ์ œ์‹œํ•œ ์ง€์‹ ๊ณ„์ธต ๋ชจ๋ธ์ธ DIKW pyramid๊ฐ€ ์žˆ๋‹ค.

alt text

  1. Data
    • ๊ด€์ฐฐ์ธก์ •์„ ํ†ตํ•ด ์ˆ˜์ง‘๋œ ๋‹จ์ˆœํ•œ ์‚ฌ์‹ค์˜ ๋‚˜์—ด
  2. Information
    • ์˜๋ฏธ ์žˆ๋Š” ๋ฐ์ดํ„ฐ, ๋งฅ๋ฝ๊ณผ ๋ชฉ์ ์„ ๊ฐ€์ง„ ๊ฐ€๊ณต๋œ ๋ฐ์ดํ„ฐ
  3. Knowledge
    • ๊ฐ€์น˜ ์žˆ๋Š” ์ •๋ณด, HOW(์–ด๋–ป๊ฒŒ)์— ๋Œ€ํ•œ ์ดํ•ด
  4. Wisdom
    • ์ ์ ˆํ•œ ๊ฒฝํ—˜์„ ํ†ตํ•œ ๋ฏธ๋ž˜ ์˜ˆ์ธก, WHY(์™œ)์— ๋Œ€ํ•œ ํ†ต์ฐฐ

Informaion Security


๐Ÿ“š์ •๋ณด ๋ณด์•ˆ(Informaion Security): ์ •๋ณด์™€ ์ •๋ณด์‹œ์Šคํ…œ์„ ๋ฌด๋‹จ ์ ‘๊ทผ(access), ์‚ฌ์šฉ(use), ๊ณต๊ฐœ(disclosure), ์ค‘๋‹จ(disruption), ์ˆ˜์ •(modification), ๋˜๋Š” ํŒŒ๊ดด(destruction)๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜์—ฌ ๋ฌด๊ฒฐ์„ฑ(Integrity), ๊ธฐ๋ฐ€์„ฑ(Confidentiality), ๊ฐ€์šฉ์„ฑ(Availability)์„ ์ œ๊ณตํ•˜๋Š” ๊ฒƒ

alt text

๐Ÿ“šCIA triad: Informaion Security์˜ 3๋Œ€ ์›์น™

  • ๋ฌด๊ฒฐ์„ฑ(Integrity), ๊ธฐ๋ฐ€์„ฑ(Confidentiality), ๊ฐ€์šฉ์„ฑ(Availability)

์ •๋ณด โ€˜๋ณด์•ˆโ€™๊ณผ โ€˜๋ณดํ˜ธโ€™๋Š” ๋‹ค๋ฆ„! โ€˜๋ณด์•ˆโ€™์€ โ€˜๋ณดํ˜ธโ€™ํ•˜๊ธฐ ์œ„ํ•œ ๋ฐฉ๋ฒ•

alt text

Authorization๊ณผ Authentication


๐Ÿ“šAuthorization (์ธ๊ฐ€/๊ถŒํ•œ๋ถ€์—ฌ): ์‹œ์Šคํ…œ ๊ฐœ์ฒด๊ฐ€ ์‹œ์Šคํ…œ ๋ฆฌ์†Œ์Šค์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š” ๊ถŒํ•œ์ด๋‚˜ ํ—ˆ๊ฐ€

alt text

๐Ÿ“šAuthentication (์ธ์ฆ): ์‚ฌ์šฉ์ž, ํ”„๋กœ์„ธ์Šค, ๋˜๋Š” ๋””๋ฐ”์ด์Šค์˜ ์‹ ์›์„ ๊ฒ€์ฆํ•˜๋Š” ๊ณผ์ •

alt text

  • ํ๋ฆ„๋„
    1
    
    ์‚ฌ์šฉ์ž ์ ‘๊ทผ ์š”์ฒญ โ†’ Authentication(์‹ ์› ํ™•์ธ) โ†’ Authorization(๊ถŒํ•œ ๊ฒ€์‚ฌ)
    

CIA triad


  1. ๐Ÿ”’ ๊ธฐ๋ฐ€์„ฑ (Confidentiality)
    • ์ •์˜: ์กฐ์ง์ด ๋ฐ์ดํ„ฐ๋ฅผ ๋น„๋ฐ€๋กœ ๋˜๋Š” ์‚ฌ์ ์œผ๋กœ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•œ ๋…ธ๋ ฅ
    • ๋ชฉ์ : ๋ฏผ๊ฐํ•œ ์ •๋ณด์˜ ๋ฌด๋‹จ ๊ณต๊ฐœ ๋ฐฉ์ง€
    • ์ •๋ณด ๊ณต๊ฐœ์˜ ํ†ต์ œ
  2. โœ… ๋ฌด๊ฒฐ์„ฑ (Integrity)
    • ์ •์˜: ๋ฐ์ดํ„ฐ๊ฐ€ ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๊ณ  ๋ณ€์กฐ๋กœ๋ถ€ํ„ฐ ์ž์œ ๋กœ์›€์„ ๋ณด์žฅ
    • ํ•ต์‹ฌ ํŠน์ง•:
      • Trustworthy (์‹ ๋ขฐ์„ฑ): ๋ฐ์ดํ„ฐ๋ฅผ ๋ฏฟ์„ ์ˆ˜ ์žˆ์Œ
      • Free from tampering (๋ณ€์กฐ ๋ฐฉ์ง€): ๋ฌด๋‹จ ์ˆ˜์ • ์—†์Œ
      • Authentic, Accurate, Reliable: ์ง„์ •์„ฑ, ์ •ํ™•์„ฑ, ์‹ ๋ขฐ์„ฑ
  3. ๐Ÿ”„ ๊ฐ€์šฉ์„ฑ (Availability)
    • ์ •์˜: ํ•„์š”ํ•  ๋•Œ ์ •๋ณด์™€ ์„œ๋น„์Šค์— ์ ‘๊ทผ ๊ฐ€๋Šฅํ•จ์„ ๋ณด์žฅ
    • ์ค‘์š” ์›์น™:
      • ์‹œ์Šคํ…œ์ด ์–ธ์ œ ์–ด๋–ป๊ฒŒ ์ž‘๋™ํ•ด์•ผ ํ•˜๋Š”์ง€ ์ •์˜
      • ๊ถŒํ•œ ์žˆ๋Š” ์‚ฌ์šฉ์ž์˜ ์ ์‹œ ์ ‘๊ทผ ๋ณด์žฅ
      • ๋ฐ์ดํ„ฐ ์ ‘๊ทผ์— ๊ณผ๋„ํ•œ ์‹œ๊ฐ„์ด ์†Œ์š”๋˜์ง€ ์•Š์Œ

๐Ÿ“šCIA triad: ์ •๋ณด๋ณด์•ˆ ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ์˜ ๊ธฐ๋ฐ˜์ด ๋˜๋Š” ๊ณตํ†ต ๋ชจ๋ธ๋กœ, ์ทจ์•ฝ์ ์„ ์ฐพ๊ณ  ํ•ด๊ฒฐ์ฑ…์„ ๋งŒ๋“œ๋Š” ๋ฐ ์‚ฌ์šฉ๋จ. ์„ธ ๊ฐ€์ง€ ๊ธฐ์ค€์„ ๋ชจ๋‘ ์ถฉ์กฑํ–ˆ์„ ๋•Œ ์กฐ์ง์˜ ๋ณด์•ˆ ํ”„๋กœํ•„์ด ๋”์šฑ ๊ฐ•ํ™”๋˜๊ณ  ์œ„ํ˜‘ ์‚ฌ๊ณ ์— ๋Œ€์ฒ˜ํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์ด ํ–ฅ์ƒ๋œ๋‹ค.

CIA Triad ์‚ฌ์šฉ ์‚ฌ๋ก€


1. Healthcare

  • ํ™˜์ž์˜ ์ „์ž์˜๋ฌด๊ธฐ๋ก(EMR, Electronic Medical Record)์€ ์•”ํ˜ธํ™”๋ฅผ ์ ์šฉํ•˜์—ฌ ์ €์žฅ
  • ์˜๋ฃŒ์ง„์ด ์‹œ์Šคํ…œ์— ๋กœ๊ทธ์ธํ•  ๋•Œ๋Š” ๋‹ค์ค‘ ์ธ์ฆ(MFA, OTP+์ง€๋ฌธ ์ธ์‹)์„ ์‚ฌ์šฉํ•ด ๋ฌด๋‹จ ์ ‘๊ทผ ์ฐจ๋‹จ
  • ์ง„๋ฃŒ๊ธฐ๋ก ๋ณ€๊ฒฝ์€ ๋ณ€๊ฒฝ์ž์™€ ์‹œ๊ฐ„ยท๋ณ€๊ฒฝ ๋‚ด์—ญ์ด ์ž๋™์œผ๋กœ ๊ฐ€๋ก๋˜๊ณ  ๋ณ€๊ฒฝ ๋‚ด์—ญ์„ ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋„๋ก ๊ด€๋ฆฌ
  • ์ฒ˜๋ฐฉ์ „ ๋ฐœํ–‰์ด๋‚˜ ์˜๋ฌด๊ธฐ๋ก ์ˆ˜์ • ์‹œ ๋””์ง€ํ„ธ ์„œ๋ช…์„ ๋ถ™์—ฌ์„œ ์›๋ณธ ์—ฌ๋ถ€ ํ™•์ธ
  • ์˜๋ฃŒ ์ •๋ณด๋Š” ์ฆ‰์‹œ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋„๋ก 24/7 ๊ฐ€์šฉ์„ฑ์„ ์œ„ํ•œ ์ด์ค‘ํ™”
  • ๋žœ์„ฌ์›จ์–ด ๊ณต๊ฒฉ์— ๋Œ€๋น„ํ•ด ์ •๊ธฐ์  ๋ฐฑ์—…๊ณผ ๋ถ€ํ•˜๋ถ„์‚ฐ ์‹œ์Šคํ…œ ์ ์šฉ

Finance

  • ์˜จ๋ผ์ธ ๋ฑ…ํ‚น ๋กœ๊ทธ์ธ ์‹œ MFA(OTP + PIN)๋ฅผ ์š”๊ตฌํ•ด ๊ณ„์ขŒ ์ •๋ณด ํƒˆ์ทจ ๋ฐฉ์ง€
  • ๊ณ ๊ฐ์˜ ์นด๋“œ๋ฒˆํ˜ธยท๊ณ„์ขŒ๋ฒˆํ˜ธ ๋“ฑ ์ค‘์š” ๋ฐ์ดํ„ฐ๋Š” ์•”ํ˜ธํ™” ์ €์žฅ
  • ๊ธˆ์œต ๊ฑฐ๋ž˜ ๋‚ด์—ญ์€ ๋””์ง€ํ„ธ ์„œ๋ช…, ์ด์ค‘ ์„œ๋ช…์„ ํ†ตํ•ด ์œ„๋ณ€์กฐ ๋ฐฉ์ง€
  • ์†ก๊ธˆ ์‹œ ์ข…๋‹จ ๊ฐ„ ์•”ํ˜ธํ™”๋ฅผ ํ†ตํ•ด ๋„คํŠธ์›Œํฌ ์ค‘๊ฐ„ ํƒˆ์ทจ ์ฐจ๋‹จ
  • 24/7 ๊ฑฐ๋ž˜๋ฅผ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ๋ถ€ํ•˜ ๋ถ„์‚ฐ๊ณผ ์ž๋™ ์žฅ์•  ์กฐ์น˜(Failover) ํ™˜๊ฒฝ ์šด์˜

Goverment

  • ๊ณต๋ฌด์›์€ ์Šค๋งˆํŠธ์นด๋“œ + OTP + ์ง€๋ฌธ ์ธ์‹์„ ์ด์šฉํ•ด ํ–‰์ •๋ง ๋กœ๊ทธ์ธ
  • ๊ฐœ์ธ์ •๋ณด๋‚˜ ๊ตญ๊ฐ€ ๊ธฐ๋ฐ€ ๋ฌธ์„œ ์—ด๋žŒ์€ ๋ณด์•ˆ ๋“ฑ๊ธ‰๋ณ„ ๊ถŒํ•œ ๋ถ„๋ฆฌ(Top Secret, Secret ๋“ฑ)
  • ์ฃผ๋ฏผ๋“ฑ๋กยท์„ธ๊ธˆยท๊ธด๊ธ‰ ์žฌ๋‚œ ๋ฌธ์ž ์‹œ์Šคํ…œ์€ 24/7 ์šด์˜์„ ๋ณด์žฅํ•ด์•ผ ํ•˜๋ฏ€๋กœ ์ด์ค‘ํ™” ์šด์˜
  • ์žฌ๋‚œยท์ „์‹œ ์ƒํ™ฉ์—๋„ ์‹œ์Šคํ…œ์ด ์ž‘๋™ํ•˜๋„๋ก ๋น„์ƒ ์‹œ์Šคํ…œ์„ ๊ฐ™์ด ์šด์˜
  • ์ „์ž์ •๋ถ€ ๋ฏผ์› ์‹œ์Šคํ…œ์€ ๋ถ€ํ•˜ ๋ถ„์‚ฐ ๋ฐ ๋Œ€๊ตญ๋ฏผ ์„œ๋น„์Šค ์•ˆ์ •ํ™” ์žฅ์น˜ ์ ์šฉ

Cybersecurity


๐Ÿ“šCybersecurity: ์ •๋ณดํ†ต์‹ ์‹œ์Šคํ…œ๊ณผ ๊ทธ ์•ˆ์— ํฌํ•จ๋œ ์ •๋ณด๋ฅผ ์†์ƒ, ๋ฌด๋‹จ ์‚ฌ์šฉ์ด๋‚˜ ์ˆ˜์ •, ๋˜๋Š” ์•…์šฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๊ณ  ๋ฐฉ์–ดํ•˜๋Š” ํ™œ๋™, ํ”„๋กœ์„ธ์Šค, ๋Šฅ๋ ฅ, ๋˜๋Š” ์ƒํƒœ

  • ์—ฌ๊ธฐ์„œ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ์ด ๋ณดํ˜ธํ•˜๋Š” ๋ฒ”์œ„๋ฅผ Cyberspace๋ผ๊ณ  ํ•œ๋‹ค. Cyberspace์˜ ๊ตฌ์„ฑ์š”์†Œ:
    1. Computers
    2. Electronic Communication Systems (๋„คํŠธ์›Œํฌ)
    3. Electronic Communication Services (์ด๋ฉ”์ผ ๋“ฑ)
    4. Wire Communication (๊ด‘์„ฌ์œ )
    5. Electronic Communication (๋ฌด์„  ํ†ต์‹ )
    6. Information

Cybersecurity์˜ ํ•ต์‹ฌ ๋ชฉํ‘œ

Prevention, Protection, and Restoration (์˜ˆ๋ฐฉ, ๋ณดํ˜ธ, ๋ณต๊ตฌ)๋ฅผ ํ†ตํ•ด:

  • ์†์ƒ(Damage) ๋ฐฉ์ง€
  • ๋ฌด๋‹จ ์‚ฌ์šฉ(Unauthorized Use) ์ฐจ๋‹จ
  • ์ˆ˜์ •(Modification) ๋ฐฉ์ง€
  • ์•…์šฉ(Exploitation) ์ฐจ๋‹จ โ†’ ์ตœ์ข…์ ์œผ๋กœ Confidentiality, Integrity, Availability, Authentication(์ธ์ฆ), Nonrepudiation(๋ถ€์ธ ๋ฐฉ์ง€)์„ ๋ณด์žฅ

์ด 5๊ฐ€์ง€๋ฅผ Cybersecurity์˜ 5๋Œ€ ์›์น™(CIA+AN)์ด๋ผ ํ•œ๋‹ค.

alt text

  1. ๐Ÿ”‘ ์ธ์ฆ (Authentication)
    • ์ •์˜: ์‚ฌ์šฉ์ž, ๋””๋ฐ”์ด์Šค, ์‹œ์Šคํ…œ์˜ ์‹ ์›์„ ํ™•์ธํ•˜๋Š” ์›์น™
  2. ๐Ÿ“‹ ๋ถ€์ธ๋ฐฉ์ง€(Non-repudiation)
    • ์ •์˜: ์ •๋ณด ์ฒ˜๋ฆฌ ํ–‰์œ„์— ๋Œ€ํ•œ ๋ถ€์ธ์„ ๋ฐฉ์ง€ํ•˜๋Š” ์›์น™
    • ์ •๋ณด ์†ก์‹ ์ž์—๊ฒŒ๋Š” ์ „๋‹ฌ ์ฆ๋ช…์„, ์ˆ˜์‹ ์ž์—๊ฒŒ๋Š” ์†ก์‹ ์ž ์‹ ์› ์ฆ๋ช…์„ ์ œ๊ณตํ•˜์—ฌ ์–‘์ธก ๋ชจ๋‘ ์ •๋ณด ์ฒ˜๋ฆฌ ์‚ฌ์‹ค์„ ๋‚˜์ค‘์— ๋ถ€์ธํ•  ์ˆ˜ ์—†๋„๋ก ๋ณด์žฅํ•˜๋Š” ๋ณด์•ˆ ์›์น™์ด๋‹ค.
    • ์‹ค์ƒํ™œ ์˜ˆ์‹œ
      • ์ด๋ฉ”์ผ ์ „์†ก ์‹œ โ†’ ๋””์ง€ํ„ธ ์„œ๋ช… + ์ˆ˜์‹  ํ™•์ธ์„ ํ†ตํ•ด โ€œ๋‚ด๊ฐ€ ๋ณด๋‚ธ ์  ์—†๋‹คโ€ ๋˜๋Š” โ€œ๋ฐ›์€ ์  ์—†๋‹คโ€๋Š” ์ฃผ์žฅ์„ ๋ฐฉ์ง€

Verification vs Validation


alt text

  1. ํ•ต์‹ฌ
    • Verification: โ€œAre we building the product right?โ€ (๊ณผ์ • ์ค‘์‹ฌ)
    • Validation: โ€œAre we building the right product?โ€ (๊ฒฐ๊ณผ ์ค‘์‹ฌ)
  2. ์ˆ˜ํ–‰ ์‹œ๊ธฐ
    • Verification: ๊ฐœ๋ฐœ ๊ณผ์ • ์ „๋ฐ˜ (Throughout development process)
    • Validation: ๊ฐœ๋ฐœ ์™„๋ฃŒ ํ›„ (After completion)
  3. ๋ถ„์„ ๋ฐฉ๋ฒ•
    • Verification: ์ •์  ๋ถ„์„ (Static analysis)
    • Validation: ๋™์  ํ…Œ์ŠคํŒ… (Dynamic testing)
  4. ๋น„์šฉ๊ณผ ํšจ๊ณผ
    • Verification: ์ €๋น„์šฉ, ์กฐ๊ธฐ ๋ฐœ๊ฒฌ, ๋น ๋ฅธ ์ˆ˜์ •
    • Validation: ๊ณ ๋น„์šฉ, ๋Šฆ์€ ๋ฐœ๊ฒฌ, ์ˆ˜์ • ์–ด๋ ค์›€
  5. ๋ณด์•ˆ ๊ด€์ ์—์„œ์˜ ์ฐจ์ด
    • Verification: ๋ณด์•ˆ ์ฝ”๋”ฉ ํ‘œ์ค€, ์„ค๊ณ„ ๊ฒ€ํ† 
    • Validation: ์นจํˆฌ ํ…Œ์ŠคํŠธ, ์‹ค์ œ ์œ„ํ˜‘ ์‹œ๋ฎฌ๋ ˆ์ด์…˜

์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์šฉ์–ด์˜ ๋ณ€ํ™”

alt text

Cyberspace์˜ 4๋Œ€ ๊ตฌ์„ฑ์š”์†Œ


alt text

  • ์ด๋Ÿฌํ•œ ๊ตฌ์„ฑ ์š”์†Œ๋“ค์„ ์ดํ•ดํ•˜๋Š” ๊ฒƒ์€ CIA ๋ณด์•ˆ ์›์น™์„ ๊ตฌํ˜„ํ•˜๋Š” ๋ฐ ํ•„์ˆ˜์ ์ด๋‹ค.
  • ๊ฐ ๊ตฌ์„ฑ ์š”์†Œ์—์„œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ์œ„ํ˜‘์„ ํŒŒ์•…ํ•˜๊ณ  ์ ์ ˆํ•œ ๋ณด์•ˆ ํ†ต์ œ๋ฅผ ์ ์šฉํ•จ์œผ๋กœ์จ ๊ธฐ๋ฐ€์„ฑ(Confidentiality), ๋ฌด๊ฒฐ์„ฑ(Integrity), ๊ฐ€์šฉ์„ฑ(Availability)์„ ๋ณด์žฅํ•  ์ˆ˜ ์žˆ๋‹ค.
This post is licensed under CC BY 4.0 by the author.