Ã¥¼Ò°³
ÃÖ±Ù °ø°ø Á¤º¸È »ç¾÷ ¹× »ê¾÷°èÀÇ Á¤º¸ÈÀÇ ±Þ°ÝÇÑ ¹ßÀüÀÌ ÀÌ·ç¾îÁö°í ÀÖ´Ù. ÇÏÁö¸¸ Á¤º¸È ¿ª±â´É Ãø¸é¿¡¼ ÇØÅ· ¹× ¹ÙÀÌ·¯½º¿Í °°Àº ¹®Á¦°¡ »çȸÀûÀ¸·Î Áß¿äÇÏ°Ô ´ëµÎµÇ°í ÀÖ°í, ÀÌ·¯ÇÑ ºÎºÐÀ» ÇØ°áÇϱâ À§Çؼ Á¤ºÎ´Â ¹é½Å ¼ÒÇÁÆ®¿þ¾î °³¹ß, »çÀ̹ö ħÇØ ´ëÀÀ ¼¾ÅÍ ±¸Ãà, Á¤º¸º¸¾È Àη¾缺À» ÁýÁßÀûÀ¸·Î ¼öÇàÇÏ°í ÀÖ´Ù.
Á¤º¸º¸È£ Àη¾缺À¸·Î °ú°Å Çѱ¹ ÀÎÅÍ³Ý ÁøÈï¿ø¿¡¼ ÁÖ°üÇÏ´ø SIS ÀÚ°ÝÁõÀ» ÆóÁöÇÏ°í Çѱ¹»ê¾÷Àη°ø´ÜÀ¸·Î ÀÌ°üÇß´Ù. »ê¾÷Àη °ø´ÜÀº 2013³âºÎÅÍ Á¤º¸º¸¾È ±â»ç ¹× Á¤º¸º¸¾È »ê¾÷ ±â»ç ÀÚ°ÝÁõÀ» ½Å¼³Çß´Ù. ¶ÇÇÑ ÇØ´ç ÀÚ°Ý ÃëµæÀÚ´Â »ê¾÷°èÀÇ º¸¾È Àü¹®°¡·Î½á ±× È°µ¿À» ´Ù ÇÒ ¼ö ÀÖµµ·Ï ÀÚ°ÝÁõ ½Å¼³°ú ´õºÒ¾î °ø°ø±â°ü Ãë¾÷ °¡»êÁ¡ µîÀÇ ÇýÅÃÀ» ºÎ¿©ÇÏ¿´´Ù.
ÀÌ·¯ÇÑ ½Ã´ëÀû ¹è°æ¿¡¼ º» Ã¥Àº Á¤º¸º¸¾È ±â»ç ¹× Á¤º¸º¸¾È »ê¾÷±â»ç¸¦ ÃëµæÇϱâ À§Çؼ ÁýÇʵǾúÀ¸¸ç, º» Ã¥Àº Á¤º¸º¸¾È Àü¹®°¡·Î °¥ ¼ö Àִ ù °ÉÀ½À» °È°Ô ÇØÁÖ¸ç, ÃÖÁ¾ÀûÀ¸·Î ÃÖ°íÀÇ Àü¹®°¡°¡ µÇ±â À§ÇÑ ±æÀ» Á¦½ÃÇÑ´Ù.
ÀúÀÚ¼Ò°³
ÀÓÈ£Áø
(úÞ) SPE ±â¼ú»ç ÄÁ¼³Æà CEO, ¼¿ï°úÇбâ¼ú´ëÇб³ ¹Ú»ç¼ö·áÇѱ¹ °øÀΰ¨¸®´Ü °¨¸®¿ø, ISMS ÀÎÁõ ½É»ç¿ø
(îñ) LIG ½Ã½ºÅÛ?Çѱ¹IBM SCC Â÷Àå, µ¿¾çÁ¾ÇÕ±ÝÀ¶Áõ±Ç °úÀå
74ȸ Á¤º¸°ü¸®±â¼ú»ç, ¼ö¼®°¨¸®¿ø, PMP, ITIL, MCSE, OCP, ÅõÀÚ»ó´ã»ç, ±³¿øÀÚ°Ý
°æ·Â
-IBM: °Ç°º¸Çè½É»çÆò°¡¿ø Â÷¼¼´ë DW ±¸Ãà ÄÁ¼³ÆÃ
-µ¿¾çÁ¾ÇÕ±ÝÀ¶Áõ±Ç: Â÷¼¼´ë ±ÝÀ¶½Ã½ºÅÛ(ISP/EA/SOA), Ȩ Æ®·¹À̵ù ½Ã½ºÅÛ, °í°´Á¢Á¡ CRM, ¿Â¶óÀÎ °æ¿µÁ¤º¸½Ã½ºÅÛ ¿Ü ´Ù¼ö
-ÀϺ» NTT Data, NTT DoCoMo CTI ÇÁ·ÎÁ§Æ®
-ÅäÁö°³¹ß°ø»ç, ¼Ò¹æ¹æÀçû ¿Ü ´Ù¼ö °¨¸®
°ÀÇ
-Á¤º¸Ã³¸®±â¼ú»ç ¼ö°ËÀü·«, °æ¿µ, ¼ÒÇÁÆ®¿þ¾î°øÇÐ, µ¥ÀÌÅͺ£À̽º, ³×Æ®¿öÅ©, ÄÄÇ»ÅÍ ±¸Á¶, º¸¾È µî Àü ºÎºÐ °ÀÇ(8³â)
-OWASP(The Open Web Application Security Project) ´ëÀÀ¹æ¹ý °ÀÇ
-»ï¼ºÀüÀÚ: ¼ÒÇÁÆ®¿þ¾î ºÐ¼®¼³°è °ÀÇ
-ºñÆ®ÄÄÇ»ÅÍ: ¼ÒÇÁÆ®¿þ¾î °øÇÐ °ÀÇ
-Áß¼Ò±â¾÷Çùȸ: Á¤º¸½Ã½ºÅÛ º¸¾È °ÀÇ
-ÇàÁ¤¾ÈÀüºÎ: IT ÇÁ·ÎÆä¼Å³Î, IT ÃֽŠ±â¼ú °ÀÇ
Àú¼
-ÀÓº£½ºÆ® CISSP
-ÀÓº£½ºÆ® CISA
-ÀÓº£½ºÆ® Á¤º¸Ã³¸®±â¼ú»ç ¼ÒÇÁÆ®¿þ¾î °øÇÐ 3.0
-ÀÓº£½ºÆ® PMP(ÇÁ·ÎÁ§Æ® °ü¸®)
-Á¤º¸Ã³¸®±â¼ú»ç º¸¾È 3.0
-Á¤º¸Ã³¸®±â¼ú»ç ¼ÒÇÁÆ®¿þ¾î°øÇÐ 3.0
-Á¤º¸Ã³¸®±â¼ú»ç DB 3.0
-Á¤º¸Ã³¸®±â¼ú»ç¸¦ À§ÇÑ IT »ê¾÷ Á¤º¸½Ã½ºÅÛ
-Á¤º¸Ã³¸®±â¼ú»ç ¼ö°ËÀü·«(¼¼¸® ±â¼ú»çȸ¿¡¼ ÃßõÇÏ´Â)
-Á¤º¸Ã³¸®±â¼ú»ç µðÁöÅÐ µ¥ÀÌÅÍ ¸Å´ÏÁö¸ÕÆ®
-Á¤º¸Ã³¸®±â¼ú»ç ±âÃâ¹®Á¦ Çؼ³Áý
-Á¤º¸Ã³¸®±â¼ú»ç ÇÕ°ÝÀü·«¼
-Á¤º¸Ã³¸®±â¼ú»ç Çٽɹ®Á¦ Çؼ³Áý 1Æí
-Á¤º¸Ã³¸®±â¼ú»ç Çٽɹ®Á¦ Çؼ³Áý 2Æí
-Á¤º¸Ã³¸®±â¼ú»ç Çٽɹ®Á¦ Çؼ³Áý 3Æí
-Á¤º¸½Ã½ºÅÛ°¨¸®»ç ÇÕ°ÝÀü·«¼
-Á¤º¸½Ã½ºÅÛ°¨¸®»ç ±âÃâ¹®Á¦ Çؼ³Áý 1Æí
-Á¤º¸½Ã½ºÅÛ°¨¸®»ç ±âÃâ¹®Á¦ Çؼ³Áý 2Æí
-Advanced Oracle Database È°¿ë°ú Æ©´×
-°í¼º´É µ¥ÀÌÅͺ£À̽º ±¸Ãà ¹æ¹ý·Ð
-CEOÀÇ °üÁ¡À¸·Î IT¸¦ ¹Ù¶óº¸ÀÚ
-FP¸¦ È°¿ëÇÑ ¼ÒÇÁÆ®¿þ¾î ºñ¿ë»êÁ¤ ±â¹ý
-IT ÅõÀÚÆò°¡ ÇÁ·Î¼¼½º
¼ö»ó
-Ãѱâ Àü»êÈ ½Ã½ºÅÛ ±¸ÃàÀ¸·Î »ç´ÜÀå ǥâ
-MMDB ±¸Ãà »ç·Ê °ø¸ðÀü ´ë»ó
³í¹®
-Ãß°è IT ¼ºñ½º ÇÐȸ: ±ÝÀ¶±Ç EA±â¹ÝÀÇ SA ±¸Ãà
-´ëÇÑ»ê¾÷°øÇÐȸ: ±ÝÀ¶±Ç MMDB ±¸Ãà »ç·Ê
¸ñÂ÷
1 STEP ½Ã½ºÅÛ º¸¾È
1. À¯´Ð½º ½Ã½ºÅÛ º¸¾È
2. À©µµ¿ì ½Ã½ºÅÛ º¸¾È
3. µ¥ÀÌÅͺ£À̽º º¸¾È
³×Æ®¿öÅ© º¸¾È
1. ³×Æ®¿öÅ©ÀÇ ÀÌÇØ
2. ħÀÔ Â÷´Ü ½Ã½ºÅÛ
3. ħÀÔ Å½Áö ½Ã½ºÅÛ(IDS: Intrusion Detection System)
4. °¡»ó»ç¼³¸Á(VPN: Virtual Private Network)
5. Wireless LAN
¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
1. ÀÎÅÍ³Ý º¸¾È
2. ÀÎÅÍ³Ý º¸¾ÈÇÁ·ÎÅäÄÝ
3. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È ÀÀ¿ë
»çÀ̹ö ħÇØ»ç°í ´ëÀÀ¹æ¹ý
1. ¾Ç¼º ÇÁ·Î±×·¥
2. »çÀ̹ö °ø°Ý(Attacks)
3. ħÇØ»ç°í ´ëÀÀ
Á¤º¸º¸È£ °³·Ð
1. Á¤º¸º¸È£ °³¿ä
2. ¾ÏÈ£ÇÐ
3. Á¢±ÙÅëÁ¦
4. ¾÷¹«¿¬¼Ó¼º °èȹ ¹× À糺¹±¸ °èȹ
5. Á¤º¸º¸È£ ¹ý·ü ¹× À±¸®
°ü·Ã¹ý·ü Á¤¸®
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü
2. Á¤º¸Åë½Å±â¹Ýº¸È£¹ý
3. Á¤º¸Åë½Å»ê¾÷ÁøÈï¹ý
4. ÀüÀÚ¼¸í¹ý
5. °³ÀÎÁ¤º¸º¸È£¹ý
Basic Check List
1. ½Ã½ºÅÛ º¸¾È
2. ³×Æ®¿öÅ© º¸¾È
3. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
4. Á¤º¸º¸È£·Ð
Á¤º¸º¸¾È(»ê¾÷)±â»ç ½Ç·ÂÈ®ÀÎ