Post

[Security] Basic Concepts of Cybersecurity(9-2) - Network Security Essentials

[Security] Basic Concepts of Cybersecurity(9-2) - Network Security Essentials

๐Ÿ”’ ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ธฐ์ดˆ ์ˆ˜์—… ์ •๋ฆฌ

Firewall & IDS

๐Ÿ“šFirewall: ์ •ํ•ด์ง„ ๊ทœ์น™์— ๋”ฐ๋ผ ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์„ ๊ฐ์‹œํ•˜๊ณ  ํ†ต์ œํ•˜๋Š” ๋ฐฉ์–ด๋ฒฝ

๐Ÿ“šIDS: ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์„ ๊ฐ์‹œ, ์ด์ƒ ํ–‰๋™์„ ๋ฐœ๊ฒฌํ•˜๋ฉด ๊ฒฝ๋ณด๋ฅผ ์šธ๋ฆผ

alt text

Firewall์˜ ์ข…๋ฅ˜

1๏ธโƒฃ Packet Filtering Firewall (ํŒจํ‚ท ํ•„ํ„ฐ๋ง ๋ฐฉํ™”๋ฒฝ)

์ž‘๋™์›๋ฆฌ:

1
๋“ค์–ด์˜ค๋Š” ํŒจํ‚ท โ†’ IP ์ฃผ์†Œ ํ™•์ธ โ†’ ํฌํŠธ ๋ฒˆํ˜ธ ํ™•์ธ โ†’ ๊ทœ์น™ ๋งค์นญ โ†’ ํ—ˆ์šฉ/์ฐจ๋‹จ
  • Network Layer(L3)์—์„œ ์ž‘๋™
  • IP ์ฃผ์†Œ, ํฌํŠธ ๋ฒˆํ˜ธ, ํ”„๋กœํ† ์ฝœ๋งŒ ํ™•์ธ

2๏ธโƒฃ Stateful Inspection Firewall (์ƒํƒœ ๊ฒ€์‚ฌ ๋ฐฉํ™”๋ฒฝ)

โœ…์„ธ์…˜ ์ถ”์ : A์™€ B์˜ ์—ฐ๊ฒฐ ์ƒํƒœ๋ฅผ ๊ธฐ์–ต

  • ์ด ํŒจํ‚ท์ด ์ •์ƒ์ ์ธ ์—ฐ๊ฒฐ์˜ ์ผ๋ถ€์ธ๊ฐ€?
  • TCP 3-way handshake๊ฐ€ ์™„๋ฃŒ๋๋Š”๊ฐ€?
  • ์‘๋‹ต ํŒจํ‚ท์ด ๋จผ์ € ์š”์ฒญํ•œ ์—ฐ๊ฒฐ์— ๋Œ€ํ•œ ๊ฒƒ์ธ๊ฐ€?

Instrusion Detection & Prevention Sys (IDS/IPS)

1. Network Traffic Monitoring (๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ๋ชจ๋‹ˆํ„ฐ๋ง)

  • IDS and IPS๋Š” ์ž ์žฌ์  ์œ„ํ˜‘์„ ๊ฐ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ์ง€์†์ ์œผ๋กœ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๊ณ  ์ฐจ๋‹จํ•œ๋‹ค.
  • ์˜์‹ฌ์Šค๋Ÿฌ์šด ํŠธ๋ž˜ํ”ฝ ํŒจํ„ด๋“ค์„ ๋ถ„์„

2. Real-Time Alerts (์‹ค์‹œ๊ฐ„ ๊ฒฝ๋ณด)

์ด ์‹œ์Šคํ…œ์€ ์˜์‹ฌ์Šค๋Ÿฌ์šด ํŒจํ„ด ๋ฐœ์ƒ ์‹œ ์ฆ‰๊ฐ์ ์œผ๋กœ ๊ฒฝ๋ณด๋ฅผ ์šธ๋ฆผ

  • ๊ฒฝ๋ณด ์ „๋‹ฌ ๋ฐฉ์‹: Email, SMS, ๋ณด์•ˆ ๋Œ€์‹œ๋ณด๋“œ ๋“ฑ

3. Blocking Attacks (๊ณต๊ฒฉ ์ฐจ๋‹จ)

โœ…IPS์˜ ์ž๋™ ๋Œ€์‘ ๋ฉ”์ปค๋‹ˆ์ฆ˜:

1
2
3
4
5
6
7
8
9
10
1. ๊ณต๊ฒฉ ํƒ์ง€
   โ†“
2. ์ฆ‰์‹œ ๋ถ„์„ (False Positive ํ™•์ธ)
   โ†“
3. ์ž๋™ ์ฐจ๋‹จ ์กฐ์น˜:
   - ๊ณต๊ฒฉ์ž IP ์ฃผ์†Œ ๋ธ”๋ž™๋ฆฌ์ŠคํŠธ ์ถ”๊ฐ€
   - ํ•ด๋‹น ์„ธ์…˜ ์ฆ‰์‹œ ์ข…๋ฃŒ
   - ๋ฐฉํ™”๋ฒฝ ๊ทœ์น™ ๋™์  ์—…๋ฐ์ดํŠธ
   โ†“
4. ๋กœ๊ทธ ๊ธฐ๋ก & ์•Œ๋ฆผ

Deploying and Managing Firewalls/IDS

๐Ÿ“šFirewall๊ณผ IDS์˜ ๋ฐฐํฌ์™€ ๊ด€๋ฆฌ: ๋ฐฉํ™”๋ฒฝ(Firewall)๊ณผ ์นจ์ž… ํƒ์ง€ ์‹œ์Šคํ…œ(IDS)์„ ๋‹จ์ˆœํžˆ ์„ค์น˜ํ•˜๋Š” ๊ฒƒ๋งŒ์œผ๋กœ๋Š” ์ถฉ๋ถ„ํ•˜์ง€ ์•Š๋‹ค. ์ง€์†์ ์ธ ๊ด€๋ฆฌ์™€ ์œ ์ง€๋ณด์ˆ˜๊ฐ€ ํ•„์š”ํ•จ!

  • ์ƒˆ๋กœ์šด ์นจ์ž… ๋ฐฉ๋ฒ•์— ๋Œ€์‘ํ•˜์ง€ ๋ชปํ•จ (์—…๋ฐ์ดํŠธ ๋ถ€์žฌ)
  • ์‹ค์ œ ์œ„ํ˜‘์ด ๋ฐœ์ƒํ•ด๋„ ๋ชจ๋ฆ„ (๋ชจ๋‹ˆํ„ฐ๋ง ๋ถ€์žฌ)
  • ์ž˜๋ชป๋œ ์„ค์ •์œผ๋กœ ์ •์ƒ์ ์ธ ํ™œ๋™๊นŒ์ง€ ์ฐจ๋‹จ (๊ณ„ํš ๋ถ€์žฌ)

alt text


Network Security Devices & Tools

Routers and Switches with Security Features

๐Ÿ“šRouter: ์„œ๋กœ ๋‹ค๋ฅธ ๋„คํŠธ์›Œํฌ๋ฅผ ์—ฐ๊ฒฐ(L3)

๐Ÿ“šSwitch: ๊ฐ™์€ ๋„คํŠธ์›Œํฌ ๋‚ด์—์„œ ์žฅ์น˜๋“ค์„ ์—ฐ๊ฒฐ(L2)

  1. Basic Security Functions
    • Router์™€ Switch๋Š” ๋„คํŠธ์›Œํฌ์˜ Gateway์—์„œ ์ž‘๋™
    • ๋‚ด๋ถ€ ๋„คํŠธ์›Œํฌ๋กœ ๋“ค์–ด์˜ค๋Š” ๋ชจ๋“  ํŠธ๋ž˜ํ”ฝ์„ ๊ฒ€์‚ฌ
  2. Access Control
    • ๋ˆ„๊ฐ€ ๋„คํŠธ์›Œํฌ์— ์ ‘์†ํ•  ์ˆ˜ ์žˆ๊ณ  ๋ฌด์—‡์— ์ ‘๊ทผ ๊ฐ€๋Šฅํ•œ์ง€ ์ปจํŠธ๋กค ๊ฐ€๋Šฅ
    • ๋„คํŠธ์›Œํฌ ์„ธ๊ทธ๋จผํ…Œ์ด์…˜
      • ์ตœ์†Œ ๊ถŒํ•œ ์›์น™: ํ•„์š”ํ•œ ๋ฆฌ์†Œ์Šค๋งŒ ์ ‘๊ทผ ํ—ˆ์šฉ
      • ํ•œ ๋„คํŠธ์›Œํฌ์˜ ๊ฐ์—ผ์ด ๋‹ค๋ฅธ ๊ณณ์œผ๋กœ ํ™•์‚ฐ๋˜์ง€ ์•Š์Œ
  3. Traffic Security
    • ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์„ ๊ฒ€์‚ฌํ•˜๊ณ  ์ฐจ๋‹จํ•จ
    • ํ•œ ๋ฒˆ ์นจํˆฌํ•œ ๊ณต๊ฒฉ์ž๊ฐ€ ๋„คํŠธ์›Œํฌ ๋‚ด๋ถ€์—์„œ ์ž์œ ๋กญ๊ฒŒ ์ด๋™ํ•˜๋Š” ๊ฒƒ์„ ๋ฐฉ์ง€

Virtual Private Networks (VPNs)

๐Ÿ“šVPN: Virtual (๊ฐ€์ƒ์˜) + Private (๋น„๊ณต๊ฐœ) + Network (๋„คํŠธ์›Œํฌ) = ๊ณต๊ฐœ๋œ ์ธํ„ฐ๋„ท์„ ํ†ตํ•ด ๋งŒ๋“œ๋Š” ์‚ฌ์„ค ๋„คํŠธ์›Œํฌ

  • VPN์€ ๋‚ด๊ฐ€ ์‚ฌ์šฉํ•˜๋Š” ์ธํ„ฐ๋„ท์— ์•ˆ์ „ํ•œ pathway๋ฅผ ๋งŒ๋“ฆ

VPN ์‚ฌ์šฉ:

1
2
3
๋‹น์‹ ์˜ PC โ†’ [์•”ํ˜ธํ™” ํ„ฐ๋„] โ†’ VPN ์„œ๋ฒ„ โ†’ ๋ชฉ์ ์ง€
          โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
           (์•„๋ฌด๋„ ์ฝ์„ ์ˆ˜ ์—†์Œ)
  • Remote Access to Private Networks (์›๊ฒฉ ํ”„๋ผ์ด๋น— ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ)

์ž‘๋™ ์›๋ฆฌ:

1
2
3
4
5
์ง‘ ์ปดํ“จํ„ฐ โ†’ VPN ์—ฐ๊ฒฐ โ†’ ํšŒ์‚ฌ VPN ๊ฒŒ์ดํŠธ์›จ์ด โ†’ ํšŒ์‚ฌ ๋‚ด๋ถ€ ๋„คํŠธ์›Œํฌ
                        โ†“
                   ์ธ์ฆ ๋ฐ ๊ถŒํ•œ ํ™•์ธ
                        โ†“
                   ์Šน์ธ๋œ ์‚ฌ์šฉ์ž๋งŒ ์ ‘์†
  • Data Transmission Security (๋ฐ์ดํ„ฐ ์ „์†ก ๋ณด์•ˆ)
    • ์ „์†ก ์ค‘ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ (Data in Transit)

Network Security Monitoring (NSM) Tools

๐Ÿ“šNSM: ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ๊ณผ ํ™œ๋™์„ ์ง€์†์ ์œผ๋กœ ๊ฐ์‹œํ•˜์—ฌ ๋ณด์•ˆ ์œ„ํ˜‘์„ ํƒ์ง€ํ•˜๊ณ  ๋Œ€์‘ํ•˜๋Š” ํ”„๋กœ์„ธ์Šค

1. Monitoring Network Activity (๋„คํŠธ์›Œํฌ ํ™œ๋™ ๋ชจ๋‹ˆํ„ฐ๋ง)

24/7 ๊ฐ์‹œ ์ฒด๊ณ„

๋ฌด์—‡์„ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๋Š”๊ฐ€?

  1. ํŠธ๋ž˜ํ”ฝ ํŒจํ„ด
    • ์ •์ƒ ํŠธ๋ž˜ํ”ฝ ๋ฒ ์ด์Šค๋ผ์ธ ์„ค์ •
    • ํ‰์†Œ์™€ ๋‹ค๋ฅธ ํŒจํ„ด ๊ฐ์ง€
  2. ์—ฐ๊ฒฐ ์ •๋ณด
    • ๋ˆ„๊ฐ€ ๋ˆ„๊ตฌ์—๊ฒŒ ์—ฐ๊ฒฐํ•˜๋Š”๊ฐ€?
    • ์–ด๋–ค ํฌํŠธ์™€ ํ”„๋กœํ† ์ฝœ์„ ์‚ฌ์šฉํ•˜๋Š”๊ฐ€?
  3. ๋ณด์•ˆ ์œ„ํ˜‘

2. Proactive Security Management (์‚ฌ์ „ ๋ณด์•ˆ ๊ด€๋ฆฌ)

: ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•˜๊ธฐ ์ „์— ํ•ด๊ฒฐ

  • Reactive: ์‚ฌํ›„ ๋Œ€์‘
  • Proactive: ์‚ฌ์ „ ๋Œ€์‘

NSM์ด ์ฐพ๋Š” ๊ฒƒ๋“ค:

  1. Weak Points
  2. Possible Threats (์ž ์žฌ์  ์œ„ํ˜‘)
  3. Network Safety (๋„คํŠธ์›Œํฌ ์•ˆ์ „์„ฑ ์œ ์ง€)

3. Incident Response (์ฆ‰๊ฐ ๋Œ€์‘)

: ๋ฌธ์ œ ๋ฐœ์ƒ ์‹œ ์‹ ์†ํ•œ ๋Œ€์‘


Security Policies & Best Practices

๐Ÿ“š๋ณด์•ˆ ์ •์ฑ…: ์กฐ์ง์ด ์ •๋ณด ์ž์‚ฐ์„ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ์ˆ˜๋ฆฝํ•œ ๊ณต์‹์ ์ธ ๊ทœ์น™, ์ ˆ์ฐจ, ๊ฐ€์ด๋“œ๋ผ์ธ์˜ ์ง‘ํ•ฉ

โœ…Security Policies๊ฐ€ ์ค‘์š”ํ•œ ์ด์œ :

  • ๋ช…ํ™•ํ•œ ์ดํ•ด ์ œ๊ณต - ๋™์ผํ•œ ๋ณด์•ˆ ๊ธฐ์ค€
  • ์—ญํ• ๋ณ„ ์ฑ…์ž„์„ ๋ช…ํ™•ํžˆ ํ•จ

Following Rules and Standards (๊ทœ์น™๊ณผ ํ‘œ์ค€ ์ค€์ˆ˜)

  • ์ข‹์€ ๋ณด์•ˆ ์ •์ฑ…์€ ์—…๊ณ„ ๋ชจ๋ฒ” ์‚ฌ๋ก€๋ฅผ ๋”ฐ๋ฅธ๋‹ค.
  • ๋ณด์•ˆ ์ •์ฑ…์„ ํ†ตํ•œ ์˜ˆ๋ฐฉ์€ ์‚ฌ๊ณ  ๋Œ€์‘๋ณด๋‹ค ์ €๋ ดํ•จ!

User Education and Training

  1. Importance of User Education (์‚ฌ์šฉ์ž ๊ต์œก์˜ ์ค‘์š”์„ฑ)
    • โ€œPeople are the first defenseโ€ (์‚ฌ๋žŒ์ด ์ฒซ ๋ฒˆ์งธ ๋ฐฉ์–ด์„ )
    • Good training helps everyone spot and stop potential attacks
  2. Reducing Human Error (์ธ์  ์˜ค๋ฅ˜ ๊ฐ์†Œ)
    • Traning์€ ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ์„ ํ•ด์น  ์ˆ˜ ์žˆ๋Š” ํ”ํ•œ ์‹ค์ˆ˜๋“ค์„ ์˜ˆ๋ฐฉํ•œ๋‹ค.
    • ์˜ˆ๋ฅผ ๋“ค๋ฉด ์•ฝํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ, fake email, ์•ˆ์ „ํ•˜์ง€ ์•Š์€ ์˜จ๋ผ์ธ ํ–‰๋™ ๋“ฑ
  3. Enhancing Overall Security (์ „๋ฐ˜์  ๋ณด์•ˆ ๊ฐ•ํ™”)
    • ๋ณด์•ˆ์˜ ๊ธฐ์ดˆ๋งŒ ์ดํ•ดํ•ด๋„ ์กฐ์ง ์ „์ฒด๊ฐ€ ์•ˆ์ „ํ•ด์ง
    • Well-trained users help protect the network better than technology alone
This post is licensed under CC BY 4.0 by the author.