Post

[Security] Basic Concepts of Cybersecurity(9-1) - Network Security Essentials

[Security] Basic Concepts of Cybersecurity(9-1) - Network Security Essentials

๐Ÿ”’ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ธฐ์ดˆ ์ˆ˜์—… ์ •๋ฆฌ

๋„คํŠธ์›Œํฌ ๋ณด์•ˆ์ด๋ž€?

๐Ÿ“šNetwork Security: ์ปดํ“จํ„ฐ ๋„คํŠธ์›Œํฌ์™€ ๋ฐ์ดํ„ฐ๋ฅผ ๋ฌด๋‹จ ์ ‘๊ทผ(unauthorized access), ์˜ค์šฉ(misuse), ๋„๋‚œ(theft)์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•˜๋Š” ๊ฒƒ

์™œ ์ค‘์š”ํ•œ๊ฐ€?

์ผ์ƒ์ ์ธ ์šด์˜์—์„œ ๋ณด์•ˆ์€ ๋งค์šฐ ์ค‘์š”ํ•จ. ๊ฐœ์ธ ๊ธฐ๊ธฐ๋ถ€ํ„ฐ ๋Œ€๊ทœ๋ชจ ๊ธฐ์—… ์‹œ์Šคํ…œ๊นŒ์ง€, ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ์กฐ์น˜๋Š” ๋ฐ์ดํ„ฐ์˜ ๊ธฐ๋ฐ€์„ฑ(Confidentiality), ๋ฌด๊ฒฐ์„ฑ(Integrity), ๊ฐ€์šฉ์„ฑ(Availability)์„ ๋ณด์žฅํ•˜๋Š” ๋ฐ ํ•„์ˆ˜์ 

alt text

  1. Protection: ๋ฌด๋‹จ ์ ‘๊ทผ์œผ๋กœ๋ถ€ํ„ฐ ๋„คํŠธ์›Œํฌ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์ง€ํ‚ค๋Š” ๊ฒƒ
  2. Confidentiality: ๋ฐ์ดํ„ฐ๊ฐ€ ๋น„๊ณต๊ฐœ ์ƒํƒœ๋กœ ์œ ์ง€๋˜๋„๋ก ๋ณด์žฅ
  3. Integrity: ๋ฐ์ดํ„ฐ์˜ ์ •ํ™•์„ฑ์„ ์œ ์ง€ํ•˜๋Š” ๊ฒƒ

Defining Network Security

1. Protection Policies (๋ณดํ˜ธ ์ •์ฑ…)

: ๋„คํŠธ์›Œํฌ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ๋ณธ ๊ทœ์น™๋“ค

โœ…์ฃผ์š” ๋‚ด์šฉ:

  • ๋ˆ„๊ฐ€ ๋„คํŠธ์›Œํฌ๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ๊ฒฐ์ •
  • ์ •๋ณด๋ฅผ ์–ด๋–ป๊ฒŒ ๋ณดํ˜ธํ• ์ง€ ๋ช…์‹œ
  • ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ–ˆ์„ ๋•Œ ์–ด๋–ค ์กฐ์น˜๋ฅผ ์ทจํ• ์ง€ ๊ทœ์ •

2. Monitoring Tools (๋ชจ๋‹ˆํ„ฐ๋ง ๋„๊ตฌ)

: ๋„คํŠธ์›Œํฌ์—์„œ ๋ฌธ์ œ๋ฅผ ๊ฐ์‹œํ•˜๋Š” ํŠน์ˆ˜ ๋„๊ตฌ๋“ค

โœ…์ฃผ์š” ๊ธฐ๋Šฅ:

  • ๋น„์ •์ƒ์ ์ธ ํ™œ๋™ ํƒ์ง€
  • ์นจ์ž… ์‹œ๋„๋ฅผ ๋ฐœ๊ฒฌ

3. Data Secure Guarding (๋ฐ์ดํ„ฐ ๋ณด์•ˆ ๋ณดํ˜ธ)

: ์ค‘์š”ํ•œ ์ •๋ณด๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์œ ์ง€ํ•˜๋Š” ๊ฒƒ์ด ์ฃผ์š” ์ž„๋ฌด

โœ…๋ฐฉ๋ฒ•:

  • ์•”ํ˜ธํ™”(Encryption): ๋ฐ์ดํ„ฐ๋ฅผ ์ฝ”๋“œ๋กœ ๋ณ€ํ™˜ํ•˜์—ฌ ๋‹ค๋ฅธ ์‚ฌ๋žŒ์ด ์ฝ์„ ์ˆ˜ ์—†๊ฒŒ ๋งŒ๋“ฆ
  • ์ ‘๊ทผ ์ œ์–ด(Access Control): ๋ˆ„๊ฐ€ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณผ ์ˆ˜ ์žˆ๋Š”์ง€ ํ†ต์ œ

Why Network Security Matters

1. Keeping Data Secure (๋ฐ์ดํ„ฐ ๋ณด์•ˆ ์œ ์ง€)

  • ๊ฐœ์ธ ์ •๋ณด๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ๋ณดํ˜ธ
  • ๋ฐ์ดํ„ฐ๊ฐ€ ๋„๋‚œ๋‹นํ•˜๋ฉด ๊ธฐ์—…์€ ๊ธˆ์ „์  ์†์‹ค๊ณผ ํ‰ํŒ ์†์ƒ์„ ์ž…์Œ
  • ๋ฒ•์  ๋ฌธ์ œ ๋ฐœ์ƒ ๊ฐ€๋Šฅ

2. Stopping Online Attacks (์˜จ๋ผ์ธ ๊ณต๊ฒฉ ์ฐจ๋‹จ)

  • ํ•ด๋กœ์šด ํ”„๋กœ๊ทธ๋žจ๊ณผ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋„คํŠธ์›Œํฌ๋ฅผ ๋ณดํ˜ธ
    • ๊ณต๊ฒฉ์ข…๋ฅ˜: Malware, DDoS, Phishing
  • ๋น„์ฆˆ๋‹ˆ์Šค๊ฐ€ ์›ํ™œํ•˜๊ฒŒ ์šด์˜๋˜๋„๋ก ์œ ์ง€

3. Building Trust (์‹ ๋ขฐ ๊ตฌ์ถ•)

  • ๋„คํŠธ์›Œํฌ๋ฅผ ์ž˜ ๋ณดํ˜ธํ•˜๋ฉด ๊ณ ๊ฐ์ด ๋” ์‹ ๋ขฐํ•จ
  • ๋ณด์•ˆ์— ์‹คํŒจํ•˜๋ฉด ์‹ ๋ขฐ๋ฅผ ์˜๊ตฌ์ ์œผ๋กœ ์žƒ์„ ์ˆ˜ ์žˆ์Œ

4. Following Rules (๊ทœ์ • ์ค€์ˆ˜)

  • ๋ฒ•๋ฅ ์€ ๊ธฐ์—…์ด ์ค‘์š”ํ•œ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•˜๋„๋ก ์š”๊ตฌ
  • ์ข‹์€ ๋ณด์•ˆ์€ ๊ธฐ์—…์ด ์ด๋Ÿฌํ•œ ๊ทœ์น™์„ ๋”ฐ๋ฅด๋„๋ก ๋„์›€

How Network Security Has Changed - ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ์˜ ์ง„ํ™”

alt text

  • Early Days (์ดˆ๊ธฐ ๋‹จ๊ณ„) - 1970-1990๋…„๋Œ€
    • ๊ธฐ๋ณธ์ ์ธ ์•ˆ์ „ ๋„๊ตฌ๋กœ ์‹œ์ž‘
    • ๋‹จ์ˆœํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ ์‚ฌ์šฉ
    • ์ฃผ๋กœ ๋ฌผ๋ฆฌ์  ๋ณด์•ˆ์— ์˜์กด
  • Getting Stronger (๊ฐ•ํ™” ๋‹จ๊ณ„) - 1990-2000๋…„๋Œ€
    • ๊ณต๊ฒฉ์ž๋“ค์˜ ๊ธฐ์ˆ ์ด ํ–ฅ์ƒ๋จ์— ๋”ฐ๋ผ ๋” ๊ฐ•๋ ฅํ•œ ๋„๊ตฌ ๊ฐœ๋ฐœ
    • Firewall ์ถ”๊ฐ€: ๋„คํŠธ์›Œํฌ ๊ฒฝ๊ณ„๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๋ฐฉํ™”๋ฒฝ
    • ๊ณต๊ฒฉ์„ ํƒ์ง€ํ•  ์ˆ˜ ์žˆ๋Š” ์‹œ์Šคํ…œ ๋„์ž…
  • Modern Protection (ํ˜„๋Œ€ ๋ณดํ˜ธ) - 2000๋…„๋Œ€ ์ดํ›„~ํ˜„์žฌ
    • ์Šค๋งˆํŠธ ์ปดํ“จํ„ฐ์™€ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๊ฐ™์€ ์ƒˆ๋กœ์šด ๋„๊ตฌ ์‚ฌ์šฉ
    • ์˜ค๋Š˜๋‚ ์˜ ์œ„ํ—˜์— ๋Œ€๋น„ํ•œ ๋ณดํ˜ธ

Threats, Vulnerabilities, and Risks

  • Threats: ๋„คํŠธ์›Œํฌ์— ํ•ด๋ฅผ ๋ผ์น  ์ˆ˜ ์žˆ๋Š” ๊ฒƒ๋“ค
  • Vulnerabilities: ๋„คํŠธ์›Œํฌ์˜ ์•ฝ์ 
  • Risks: Threat๊ฐ€ Vulnerabilities๋ฅผ ๊ณต๊ฒฉํ•  ๊ฐ€๋Šฅ์„ฑ๊ณผ ์˜ํ–ฅ

Risk = Asset x Threat ร— Vulnerability

Understanding Threats (์œ„ํ˜‘ ์ดํ•ดํ•˜๊ธฐ)

  • Threats: ๋„คํŠธ์›Œํฌ์— ํ•ด๋ฅผ ๋ผ์น  ์ˆ˜ ์žˆ๋Š” ๊ฒƒ
  • ์œ„ํ˜‘์„ ์กฐ๊ธฐ์— ๋ฐœ๊ฒฌํ•˜๋ฉด ๋ง‰์„ ์ˆ˜ ์žˆ์Œ

Identifying Vulnerabilities (์ทจ์•ฝ์  ์‹๋ณ„ํ•˜๊ธฐ)

  • Vulnerabilities: ๋„คํŠธ์›Œํฌ์˜ ์•ฝ์ 
  • ์ปดํ“จํ„ฐ, ํ”„๋กœ๊ทธ๋žจ, ์„ค์ • ๋ฐฉ์‹ ๋“ฑ์˜ ์ด์œ ๋กœ ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•œ๋‹ค.

Assessing Risks (์œ„ํ—˜ ํ‰๊ฐ€ํ•˜๊ธฐ)

  • Risks: ์œ„ํ˜‘์ด ์ทจ์•ฝ์ ์„ ๊ณต๊ฒฉํ–ˆ์„ ๋•Œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๊ฒฐ๊ณผ
  • ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ๋ฌธ์ œ ๋ฐœ์ƒ ํ™•๋ฅ , ๋ฐœ์ƒ ์‹œ ํ”ผํ•ด ์ •๋„๋ฅผ ๋ฏธ๋ฆฌ ํŒŒ์•…ํ•ด์•ผ ํ•œ๋‹ค.

Common Security Terms (์ฃผ์š” ๋ณด์•ˆ ์šฉ์–ด)

alt text


Types of Network Attacks - ๋„คํŠธ์›Œํฌ ๊ณต๊ฒฉ์˜ ์ข…๋ฅ˜

๋„คํŠธ์›Œํฌ ๊ณต๊ฒฉ์€ ํฌ๊ฒŒ 3๊ฐ€์ง€๋กœ ๋‚˜๋ˆŒ ์ˆ˜ ์žˆ๋‹ค.

  1. Fake Message Attacks (๊ฐ€์งœ ๋ฉ”์‹œ์ง€ ๊ณต๊ฒฉ) - ์‚ฌํšŒ๊ณตํ•™์  ๊ณต๊ฒฉ
  2. Website Overload Attacks (์›น์‚ฌ์ดํŠธ ๊ณผ๋ถ€ํ•˜ ๊ณต๊ฒฉ) - ๊ฐ€์šฉ์„ฑ ๊ณต๊ฒฉ
  3. Secret Spying Attacks (๋น„๋ฐ€ ์ŠคํŒŒ์ด ๊ณต๊ฒฉ) - ๊ธฐ๋ฐ€์„ฑ ๊ณต๊ฒฉ

Phishing Attacks - ํ”ผ์‹ฑ ๊ณต๊ฒฉ

: ์‚ฌ๊ธฐ๊พผ์ด ๋‹น์‹ ์„ ์†์—ฌ์„œ ๊ฐœ์ธ ์ •๋ณด๋ฅผ ๊ณต์œ ํ•˜๋„๋ก ๋งŒ๋“œ๋Š” ๊ณต๊ฒฉ

  • ๊ฐ€์งœ ์ด๋ฉ”์ผ์ด๋‚˜ ๊ฐ€์งœ ์›น์‚ฌ์ดํŠธ๋ฅผ ๋งŒ๋“ค์–ด ์‹ค์ œ ํšŒ์‚ฌ์ธ ๊ฒƒ์ฒ˜๋Ÿผ ์œ„์žฅ
  • ์‚ฌ์šฉ์ž์˜ ์‹ฌ๋ฆฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ์ •๋ณด๋ฅผ ์ž๋ฐœ์ ์œผ๋กœ ์ œ๊ณตํ•˜๊ฒŒ ๋งŒ๋“ฆ

Common Phishing Tricks (ํ”ํ•œ ํ”ผ์‹ฑ ์ˆ˜๋ฒ•)

  • Scammer๋“ค์ด ๊ฐ€์งœ ์ด๋ฉ”์ผ ๋˜๋Š” ์›น์‚ฌ์ดํŠธ๋ฅผ ๋งŒ๋“ค์–ด์„œ ๋ณด๋ƒ„
  • ๊ณตํฌ์‹ฌ์ด๋‚˜ ๊ธด๊ธ‰์„ฑ ๊ฐ•์กฐ ๋“ฑ์œผ๋กœ ๋น ๋ฅธ ์„ ํƒ์„ ํ•˜๊ฒŒ ๋งŒ๋“ค์–ด์„œ ํ”ผํ•ด๋ฅผ ์œ ๋„

Distributed Denial of Service (DDoS) Attacks - ๋ถ„์‚ฐ ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ

: ๊ณต๊ฒฉ์ž๊ฐ€ ์—„์ฒญ๋‚˜๊ฒŒ ๋งŽ์€ ํŠธ๋ž˜ํ”ฝ์„ ๋ณด๋‚ด ๋Œ€์ƒ ์‹œ์Šคํ…œ์„ ๋งˆ๋น„์‹œํ‚ค๋Š” ๊ณต๊ฒฉ

์–ด๋–ค ํ”ผํ•ด๋ฅผ ์ž…ํžˆ๋Š”๊ฐ€?

์ง์ ‘์  ํ”ผํ•ด:

  • ์›น์‚ฌ์ดํŠธ ๋ฐ ์„œ๋น„์Šค ์ค‘๋‹จ
  • ๊ณ ๊ฐ์ด ์„œ๋น„์Šค๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์—†์Œ
  • ๋งค์ถœ ์†์‹ค (ํŠนํžˆ ์ „์ž์ƒ๊ฑฐ๋ž˜)

๊ฐ„์ ‘์  ํ”ผํ•ด:

  • ๋ธŒ๋žœ๋“œ ํ‰ํŒ ์†์ƒ
  • ๊ณ ๊ฐ ์‹ ๋ขฐ ํ•˜๋ฝ
  • ๋ณต๊ตฌ ๋น„์šฉ ๋ฐœ์ƒ

โœ…์–ด๋–ป๊ฒŒ ๋ง‰์„ ๊ฒƒ์ธ๊ฐ€?:

  1. ํŠธ๋ž˜ํ”ฝ ๋ชจ๋‹ˆํ„ฐ๋ง: ํšŒ์‚ฌ๋“ค์€ ๋น„์ •์ƒ์ ์ธ ํŠธ๋ž˜ํ”ฝ์„ ๊ฐ์ง€ํ•˜๊ณ  ์ฐจ๋‹จํ•ด์„œ ์Šค์Šค๋กœ๋ฅผ ๋ณดํ˜ธ ๊ฐ€๋Šฅ
  2. ํŠธ๋ž˜ํ”ฝ ํ•„ํ„ฐ๋ง: traffic controllers ๊ฐ™์€ ๋„๊ตฌ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋‚˜์œ ํŠธ๋ž˜ํ”ฝ์„ ์ฐจ๋‹จ, ์ •์ƒ ํŠธ๋ž˜ํ”ฝ ํ—ˆ์šฉ
  3. ๋ฐฑ์—… ์‹œ์Šคํ…œ: ์—ฌ๋Ÿฌ ์„œ๋ฒ„์— ๋ถ„์‚ฐํ•˜์—ฌ ์„œ๋น„์Šค ์ œ๊ณต

Man-in-the-Middle (MITM) Attacks - ์ค‘๊ฐ„์ž ๊ณต๊ฒฉ

: ๊ณต๊ฒฉ์ž๊ฐ€ ๋‘ ๋‹น์‚ฌ์ž ๊ฐ„์˜ ํ†ต์‹ ์„ ๋ชฐ๋ž˜ ๊ฐ€๋กœ์ฑ„๊ณ  ์—ฟ๋“ฃ๊ฑฐ๋‚˜ ์กฐ์ž‘ํ•˜๋Š” ๊ณต๊ฒฉ

  • ๊ณต๊ฒฉ์ž๊ฐ€ ํ†ต์‹  ๊ฒฝ๋กœ์˜ โ€œ์ค‘๊ฐ„โ€์— ์œ„์น˜ํ•˜์—ฌ ๋ชจ๋“  ๋ฐ์ดํ„ฐ๋ฅผ ๊ฐ€๋กœ์ฑ”

MITM ๊ณต๊ฒฉ ์œ ํ˜•

  1. Intecreption(๊ฐ€๋กœ์ฑ„๊ธฐ)
    • ๋‘ ๋‹น์‚ฌ์ž ๊ฐ„์˜ ํ†ต์‹ ์„ ๊ฐ€๋กœ์ฑ”
  2. Data Theft(๋ฐ์ดํ„ฐ ๋„๋‚œ)
    • ์ „์†ก ์ค‘์ธ ๋ฏผ๊ฐํ•œ ์ •๋ณด ํ›”์นจ
  3. Prevention(์˜ˆ๋ฐฉ ๋ฐฉ๋ฒ•)
    • HTTPS, VPNs ์‚ฌ์šฉ

Malware Attacks - ์•…์„ฑ์ฝ”๋“œ ๊ณต๊ฒฉ

: ์ปดํ“จํ„ฐ์— ํ•ด๋ฅผ ๋ผ์น  ์ˆ˜ ์žˆ๋Š” ๋‚˜์œ ์†Œํ”„ํŠธ์›จ์–ด

Malware์˜ ์ข…๋ฅ˜

  • ํŒŒ์ผ ๋„๋‚œํ˜•
  • ๊ธˆ์ „ ์š”๊ตฌํ˜•
  • ์‹œ์Šคํ…œ ์ œ์–ดํ˜• ๋“ฑ ์กด์žฌ

โœ…์•ˆ์ „ํ•˜๊ฒŒ ์œ ์ง€ํ•˜๋Š” ๋ฐฉ๋ฒ•:

  • ์†Œํ”„ํŠธ์›จ์–ด ์—…๋ฐ์ดํŠธ
  • ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค ํ”„๋กœ๊ทธ๋žจ ์‚ฌ์šฉ
  • ์˜จ๋ผ์ธ ๋ณด์•ˆ ๊ต์œก

Network Security Protocols - ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ํ”„๋กœํ† ์ฝœ

: ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ํ”„๋กœํ† ์ฝœ๊ณผ ํ‘œ์ค€์€ ์•ˆ์ „ํ•œ ํ†ต์‹ ๊ณผ ๋ฐ์ดํ„ฐ ์ „์†ก์„ ๋ณด์žฅํ•˜๋Š” ๋ฐ ํ•„์ˆ˜์ 

  • SSL/TLS์™€ IPSec ๊ฐ™์€ ํ”„๋กœํ† ์ฝœ์€ ๋ฏผ๊ฐํ•œ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•œ ์•”ํ˜ธํ™”์™€ ์ธ์ฆ ๋ฉ”์ปค๋‹ˆ์ฆ˜์„ ์ œ๊ณต

alt text

  • SSL/TLS(Secure Sockets Layer / Transport Layer Security): ์ „์†ก ์ค‘ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ
  • IPSec (Internet Protocol Security): ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ์•”ํ˜ธํ™”
  • Standards: ๋ชจ๋ฒ” ์‚ฌ๋ก€ ์ค€์ˆ˜

Overview of Security Protocols

1. Data Encryption Mechanisms (๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™” ๋ฉ”์ปค๋‹ˆ์ฆ˜)

: SSL/TLS์™€ IPSec์€ ์ „์†ก ์ค‘ ๋ฐ์ดํ„ฐ๋ฅผ ์•”ํ˜ธํ™”ํ•˜์—ฌ โ€˜๊ธฐ๋ฐ€์„ฑโ€™๊ณผ โ€˜๋ฌด๊ฒฐ์„ฑโ€™์„ ๋ณด์žฅ

์ž‘๋™ ์›๋ฆฌ:

1
2
3
4
5
6
7
8
9
ํ‰๋ฌธ ๋ฐ์ดํ„ฐ
    โ†“
์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ ์šฉ (SSL/TLS ๋˜๋Š” IPSec)
    โ†“
์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ ์ „์†ก
    โ†“
์ˆ˜์‹ ์ž๊ฐ€ ๋ณตํ˜ธํ™”
    โ†“
์›๋ณธ ๋ฐ์ดํ„ฐ ๋ณต์›

2. Securing Communication Channels (ํ†ต์‹  ์ฑ„๋„ ๋ณด์•ˆ)

: ํ”„๋กœํ† ์ฝœ์€ ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•œ ํ†ต์‹  ์ฑ„๋„์„ ๋ณดํ˜ธํ•˜์—ฌ ๋ฌด๋‹จ ์ ‘๊ทผ์œผ๋กœ๋ถ€ํ„ฐ ๋ฏผ๊ฐํ•œ ์ •๋ณด๋ฅผ ๋ณดํ˜ธ

  • ํด๋ผ์ด์–ธํŠธ - ์„œ๋ฒ„ ๊ฐ„ ์•ˆ์ „ํ•œ ์—ฐ๊ฒฐ

3. Importance of Security Protocols (๋ณด์•ˆ ํ”„๋กœํ† ์ฝœ์˜ ์ค‘์š”์„ฑ)

  • Digital communications์—์„œ ํšจ์œจ์ ์ธ ๋ณด์•ˆ์„ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ์Œ
  • ์ด ํ”„๋กœํ† ์ฝœ๋“ค์€ ์˜จ๋ผ์ธ ๊ฑฐ๋ž˜ ๋ฐ ๋ฐ์ดํ„ฐ ๊ตํ™˜ ๋ณด์•ˆ์˜ ๊ธฐ๋ณธ์ด๋‹ค.

Authentication, Authorization, Accounting (AAA)

1. Authentication Process(์ธ์ฆ ํ”„๋กœ์„ธ์Šค)

: ๋„คํŠธ์›Œํฌ์— ์ ‘๊ทผํ•˜๋ ค๋Š” ์‚ฌ์šฉ์ž์˜ ์‹ ์›์„ ๊ฒ€์ฆ

โœ…ํŠน์ง•:

  • Passwords
  • Biometrics
  • MFA(Multi-factor Authentication)

2. Authorization Levels (๊ถŒํ•œ ๋ถ€์—ฌ ์ˆ˜์ค€)

: ์ธ์ฆ๋œ ์‚ฌ์šฉ์ž๊ฐ€ ์–ด๋–ค ๋ฆฌ์†Œ์Šค์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š”์ง€ ๊ฒฐ์ •

Authorization์˜ ํ•ต์‹ฌ ์›์น™:

  • ์ตœ์†Œ ๊ถŒํ•œ ์›์น™ (Principle of Least Privilege)
    • ์‚ฌ์šฉ์ž์—๊ฒŒ ์—…๋ฌด ์ˆ˜ํ–‰์— ํ•„์š”ํ•œ ์ตœ์†Œํ•œ์˜ ๊ถŒํ•œ๋งŒ ๋ถ€์—ฌ
  • ์—ญํ•  ๊ธฐ๋ฐ˜ ์ ‘๊ทผ ์ œ์–ด (RBAC - Role-Based Access Control)

3. Accounting and Logging (๊ณ„์ • ๊ด€๋ฆฌ ๋ฐ ๋กœ๊น…)

: ์‚ฌ์šฉ์ž์˜ ํ™œ๋™์„ ์ถ”์ ํ•˜๊ณ  ๋„คํŠธ์›Œํฌ์—์„œ์˜ ํ–‰๋™์„ ๊ธฐ๋ก

  • Auditing(๊ฐ์‚ฌ)์™€ ๋ณด์•ˆ์„ ์œ„ํ•ด ํ•„์ˆ˜์ ์ž„
  • ๋กœ๊ทธ๋Š” ๋„คํŠธ์›Œํฌ ์‚ฌ์šฉ๊ณผ ์ž ์žฌ์  ๋ณด์•ˆ ์‚ฌ๊ณ ๋ฅผ ์œ„ํ•ด ๊ฐ€์น˜์žˆ๋Š” ์ธ์‚ฌ์ดํŠธ๋ฅผ ์ œ๊ณต

Network Security Standards and Best Practices

1๏ธโƒฃ Regular Updates (์ •๊ธฐ ์—…๋ฐ์ดํŠธ)

: ๋ชจ๋“  ์‹œ์Šคํ…œ์„ ์ตœ์‹  ์ƒํƒœ๋กœ ์œ ์ง€ํ•˜์—ฌ ๋ณด์•ˆ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐ

  • ์ƒˆ๋กœ ๋ฐœ๊ฒฌ๋œ ์ทจ์•ฝ์  ํŒจ์น˜
  • ๋ฒ„๊ทธ ์ˆ˜์ •
  • ์ƒˆ๋กœ์šด ์œ„ํ˜‘์— ๋Œ€ํ•œ ๋ฐฉ์–ด

2๏ธโƒฃ Strong Passwords (๊ฐ•๋ ฅํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ)

: ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ•๋ ฅํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋ฅผ ์ƒ์„ฑํ•˜๊ณ  ์‚ฌ์šฉ

  • ์ตœ์†Œ 12์ž ์ด์ƒ ๋ณต์žก์„ฑ

3๏ธโƒฃ Incident Response Plans (์‚ฌ๊ณ  ๋Œ€์‘ ๊ณ„ํš)

: ๋ณด์•ˆ ๋ฌธ์ œ์— ๋Œ€๋น„ํ•œ ๋ช…ํ™•ํ•œ ๊ณ„ํš์„ ์ค€๋น„

This post is licensed under CC BY 4.0 by the author.