• Mindscape ๐Ÿ”ฅ
    • Playlist ๐ŸŽง
  • ๐Ÿค– Artifical Intelligence

    • 1. Basics; Linear Algebra
    • 2. Basics; Linear Algebra (2), Search (1)
    • 3. Search (2)
    • 4. Knowledge and Logic (1)
    • 5. Knowledge and Logic (2)
    • 6. Probability
    • 7. Information Theory
    • 8. Probabilitc Reasoning (2)
    • 9. Probabilitc Reasoning (3)
    • 10. Machine Learning (1)
    • 11. Machine Learning (2)
    • 12. Machine Learning (3)
    • 13. Linear Models
    • 14. Other Classic ML Models (1)
    • 15. Other Classic ML Models (2)
  • ๐Ÿ”’ Computer Security

    • 01. Overview
    • 02. ์ •๋ณด๋ณด์•ˆ์ •์ฑ… ๋ฐ ๋ฒ•๊ทœ
    • 03. Cryptographic Tools
    • 04. User Authentication
    • 05. Access Control
    • 06. Database Security
    • 07. Malicious Software
    • 08. Firmware Analysis
  • ๐Ÿ—„๏ธ Database System

    • 1. Introduction
    • 2. Relational Model
    • 3. SQL
    • 6. E-R Model
    • 7. Relational Database Design (1)
    • 7. Relational Database Design (2)
    • 13. Data Storage Structures
    • 14. Indexing
    • 15. Query Processing
  • ๐Ÿ“ Software Engineering

    • 2. Introduction to Software Engineering
    • 3. Process
    • 4. Process Models
    • 5. Agile
    • 6. Requirements
    • 7. Requirements Elicitation and Documentation
    • 8. Architecture
    • 9. Unified Modelling Language
    • 10. Object-Oriented Analysis
    • Object-Oriented Design
  • ๐Ÿง  Algorithm

    • Python ์‹œ๊ฐ„ ์ดˆ๊ณผ ๋ฐฉ์ง€๋ฅผ ์œ„ํ•œ ํŒ
    • C++ std::vector ์‚ฌ์šฉ๋ฒ• ์ •๋ฆฌ
    • Vim ์‚ฌ์šฉ ๋งค๋‰ด์–ผ
    • 1018๋ฒˆ: ์ฒด์ŠคํŒ ๋‹ค์‹œ ์น ํ•˜๊ธฐ
    • 1966๋ฒˆ: ํ”„๋ฆฐํ„ฐ ํ

01. Overview

Computer Security Overview

  • NIST Computer Security Handbook์—์„œ ์ •์˜ํ•œ ์ปดํ“จํ„ฐ ๋ณด์•ˆ(Computer Security)
    • "์ •๋ณด ์‹œ์Šคํ…œ ์ž์›(ํ•˜๋“œ์›จ์–ด, ์†Œํ”„ํŠธ์›จ์–ด, ํŽŒ์›จ์–ด, ์ •๋ณด/๋ฐ์ดํ„ฐ, ํ†ต์‹  ํฌํ•จ)์˜ ๋ฌด๊ฒฐ์„ฑ, ๊ฐ€์šฉ์„ฑ, ๊ธฐ๋ฐ€์„ฑ์„ ๋ณด์กดํ•˜๋Š” ์ ์šฉ ๊ฐ€๋Šฅํ•œ ๋ชฉํ‘œ๋ฅผ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด ์ž๋™ํ™”๋œ ์ •๋ณด ์‹œ์Šคํ…œ์— ๋ถ€์—ฌ๋˜๋Š” ๋ณดํ˜ธ."

The CIA Triad

  • Confidentiality(๊ธฐ๋ฐ€์„ฑ)
    • ๋ฐ์ดํ„ฐ ๊ธฐ๋ฐ€์„ฑ
    • Privacy(๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ)
  • Integrity(๋ฌด๊ฒฐ์„ฑ)
    • ๋ฐ์ดํ„ฐ ๋ฌด๊ฒฐ์„ฑ
    • ์‹œ์Šคํ…œ ๋ฌด๊ฒฐ์„ฑ(OS๋‚˜ ํŽŒ์›จ์–ด)
  • Availability(๊ฐ€์šฉ์„ฑ)

Key Security Concepts

  • Confidentiality
    • ๊ฐœ์ธ privacy ๋ฐ ๋…์  ์ •๋ณด ๋ณดํ˜ธ ์ˆ˜๋‹จ์„ ํฌํ•จํ•œ ์ •๋ณด ์ ‘๊ทผ ๋ฐ ๊ณต๊ฐœ๋ฅผ ํ—ˆ์šฉ๋œ ๊ถŒํ•œ์— ํ•œํ•ด์„œ๋งŒ ๊ฐ€๋Šฅํ•˜๋„๋ก ์ œํ•œ
  • Integrity
    • ์ •๋ณด์˜ ๋ถ€์ธ ๋ฐฉ์ง€ ๋ฐ ์ธ์ฆ ๋ณด์žฅ์„ ํฌํ•จํ•˜์—ฌ ๋ถ€์ ์ ˆํ•œ ์ •๋ณด ์ˆ˜์ • ๋˜๋Š” ํŒŒ๊ดด๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ
  • Availability
    • ์ •๋ณด์— ๋Œ€ํ•ด timelyํ•˜๊ณ , ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ ‘๊ทผ ๋ฐ ์‚ฌ์šฉ์„ ๋ณด์žฅ

Additional Security Concepts (AAA)

  • Authentication(์ธ์ฆ)
    • ์‚ฌ์šฉ์ž ์‹๋ณ„: ID, PW๋ฅผ ์‚ฌ์šฉํ•œ ๋ฐฉ๋ฒ•, ์ƒ์ฒด ์ธ์ฆ ๋“ฑ
  • Authorization(์ธ๊ฐ€)
    • ์ธ์ฆ๋œ ์‚ฌ์šฉ์ž๊ฐ€ ํŠน์ • ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•˜๋„๋ก ํ—ˆ์šฉ
    • ์‚ฌ์šฉ์ž๊ฐ€ ๊ทธ๋Ÿฌํ•œ ๋ช…๋ น์„ ๋‚ด๋ฆด ๊ถŒํ•œ์ด ์žˆ๋Š”์ง€ ๊ฒฐ์ •, ํŒ๋‹จ
  • Accounting
    • ์‚ฌ์šฉ์ž๊ฐ€ ์ ‘๊ทผํ•˜๋Š” ๋™์•ˆ ์†Œ๋น„ํ•˜๋Š” ์ž์›์„ ์ธก์ •

Computer Security Challenges

  • ์ปดํ“จํ„ฐ ๋ณด์•ˆ์€ ์ดˆ์‹ฌ์ž์—๊ฒŒ ์ฒ˜์Œ ๋ณด์ด๋Š” ๊ฒƒ๋งŒํผ ๋‹จ์ˆœํ•˜์ง€ ์•Š์Œ.
  • (์ถ”๊ฐ€๋œ) ๋ณด์•ˆ ๊ธฐ๋Šฅ์— ๋Œ€ํ•œ ์ž ์žฌ์  ๊ณต๊ฒฉ์„ ๊ณ ๋ คํ•ด์•ผ ํ•จ.
  • ํŠน์ • ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ์ ˆ์ฐจ๋Š” ์ข…์ข… ์ง๊ด€์— ๋ฐ˜๋Œ€๋จ.
  • ๋ฌผ๋ฆฌ์  ๋ฐ ๋…ผ๋ฆฌ์  ๋ฐฐ์น˜ ์œ„์น˜๋ฅผ ๊ฒฐ์ •ํ•ด์•ผ ํ•จ.
  • ์ถ”๊ฐ€์ ์ธ ์—ฌ๋Ÿฌ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด๋‚˜ ํ”„๋กœํ† ์ฝœ์ด ๊ด€๋ จ๋  ์ˆ˜ ์žˆ์Œ.
  • ๊ณต๊ฒฉ์ž๋Š” ๋‹จ ํ•˜๋‚˜์˜ ์•ฝ์ ๋งŒ ์ฐพ์œผ๋ฉด ๋˜์ง€๋งŒ, ๊ฐœ๋ฐœ์ž(๋ฐฉ์–ด์ž)๋Š” ๋ชจ๋“  ์•ฝ์ ์„ ์ฐพ์•„์•ผ ํ•จ.
  • ์‚ฌ์šฉ์ž์™€ ์‹œ์Šคํ…œ ๊ด€๋ฆฌ์ž๋Š” ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ•˜๊ธฐ ์ „๊นŒ์ง€ ๋ณด์•ˆ์˜ ์ด๋“์„ ์•Œ์•„๋ณด์ง€ ๋ชปํ•˜๋Š” ๊ฒฝํ–ฅ์ด ์žˆ์Œ.
  • ๋ณด์•ˆ์€ ์ •๊ธฐ์ ์ด๊ณ  ์ง€์†์ ์ธ ๋ชจ๋‹ˆํ„ฐ๋ง์„ ์š”๊ตฌํ•จ.
  • ์ข…์ข… ์„ค๊ณ„๊ฐ€ ์™„๋ฃŒ๋œ ํ›„ ์‹œ์Šคํ…œ์— ํ†ตํ•ฉ๋˜๋Š” ์‚ฌํ›„ ๊ณ ๋ ค ์‚ฌํ•ญ์œผ๋กœ ์ทจ๊ธ‰(์˜คํ•ด)๋จ.
    • ์ดˆ๊ธฐ ๋‹จ๊ณ„๋ถ€ํ„ฐ ๋ณด์•ˆ์„ ๊ณ ๋ คํ•˜์—ฌ ๊ฐœ๋ฐœํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”
  • ํšจ์œจ์ ์ด๊ณ  ์‚ฌ์šฉ์ž ์นœํ™”์  ์šด์˜์˜ ์žฅ์• ๋ฌผ๋กœ ๊ฐ„์ฃผ๋จ.

Table 1.1 Computer Security Terminology

  • RFC 2828, Internet Security Glossary, May 2000
  • Adversary(threat agent) (์ ๋Œ€์ž (์œ„ํ˜‘ ํ–‰์œ„์ž))
    • ์‹œ์Šคํ…œ์„ ๊ณต๊ฒฉํ•˜๊ฑฐ๋‚˜ ์‹œ์Šคํ…œ์— ์œ„ํ˜‘์ด ๋˜๋Š” ๊ฐœ์ฒด
  • Attack(๊ณต๊ฒฉ)
    • ์ง€๋Šฅ์ ์ธ ์œ„ํ˜‘์—์„œ ๋น„๋กฏ๋œ ์‹œ์Šคํ…œ ๋ณด์•ˆ์— ๋Œ€ํ•œ ๊ณต๊ฒฉ; ์ฆ‰, ๋ณด์•ˆ ์„œ๋น„์Šค๋ฅผ ํšŒํ”ผํ•˜๊ณ  ์‹œ์Šคํ…œ์˜ ๋ณด์•ˆ ์ •์ฑ…์„ ์œ„๋ฐ˜ํ•˜๋ ค๋Š” ์˜๋„์ ์ธ ํ–‰์œ„(ํŠนํžˆ ๋ฐฉ๋ฒ•์ด๋‚˜ ๊ธฐ์ˆ ์˜ ์˜๋ฏธ์—์„œ)
  • Countermeasure(countermeasure)
    • ์œ„ํ˜‘, ์ทจ์•ฝ์  ๋˜๋Š” ๊ณต๊ฒฉ์„ ์ œ๊ฑฐํ•˜๊ฑฐ๋‚˜ ์˜ˆ๋ฐฉํ•˜๊ณ , ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ํ”ผํ•ด๋ฅผ ์ตœ์†Œํ™”ํ•˜๊ฑฐ๋‚˜, ์‹œ์ • ์กฐ์น˜๋ฅผ ์ทจํ•  ์ˆ˜ ์žˆ๋„๋ก ๋ฐœ๊ฒฌํ•˜๊ณ  ๋ณด๊ณ ํ•จ์œผ๋กœ์จ ์œ„ํ˜‘์„ ๊ฐ์†Œ์‹œํ‚ค๋Š” ์กฐ์น˜, ์žฅ์น˜, ์ ˆ์ฐจ ๋˜๋Š” ๊ธฐ์ˆ 
  • Risk(์œ„ํ—˜)
    • ํŠน์ • ์œ„ํ˜‘์ด ํŠน์ • ์ทจ์•ฝ์ ์„ ์•…์šฉํ•˜์—ฌ ํŠน์ • ์œ ํ•ดํ•œ ๊ฒฐ๊ณผ๋ฅผ ์ดˆ๋ž˜ํ•  ํ™•๋ฅ ๋กœ ํ‘œํ˜„๋˜๋Š” ์†์‹ค ๊ธฐ๋Œ€์น˜, ๊ธฐ๋Œ“๊ฐ’
  • Security Policy(๋ณด์•ˆ ์ •์ฑ…)
    • ๋ฏผ๊ฐํ•˜๊ณ  ์ค‘์š”ํ•œ ์‹œ์Šคํ…œ ์ž์›์„ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ์‹œ์Šคํ…œ์ด๋‚˜ ์กฐ์ง์ด ๋ณด์•ˆ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๋ช…์‹œํ•˜๊ฑฐ๋‚˜ ๊ทœ์ œํ•˜๋Š” ๊ทœ์น™ ๋ฐ ๊ด€ํ–‰์˜ ์ง‘ํ•ฉ
  • System Resource(Asset) (์‹œ์Šคํ…œ ์ž์›(์ž์‚ฐ))
    • ์ •๋ณด ์‹œ์Šคํ…œ์— ํฌํ•จ๋œ ๋ฐ์ดํ„ฐ
    • ์‹œ์Šคํ…œ์ด ์ œ๊ณตํ•˜๋Š” ์„œ๋น„์Šค
    • ์ฒ˜๋ฆฌ ๋Šฅ๋ ฅ์ด๋‚˜ ํ†ต์‹  ๋Œ€์—ญํญ๊ณผ ๊ฐ™์€ ์‹œ์Šคํ…œ ๊ธฐ๋Šฅ
    • ๋˜๋Š” ์‹œ์Šคํ…œ ์žฅ๋น„ ํ•ญ๋ชฉ(์˜ˆ: ์‹œ์Šคํ…œ ๊ตฌ์„ฑ ์š”์†Œ - ํ•˜๋“œ์›จ์–ด, ํŽŒ์›จ์–ด, ์†Œํ”„ํŠธ์›จ์–ด ๋˜๋Š” ๋ฌธ์„œ)
    • ์‹œ์Šคํ…œ ์šด์˜ ๋ฐ ์žฅ๋น„๋ฅผ ์ˆ˜์šฉํ•˜๋Š” ์‹œ์„ค
  • Threat(์œ„ํ˜‘)
    • ๋ณด์•ˆ์„ ์œ„๋ฐ˜ํ•˜๊ณ  ํ•ด๋ฅผ ๋ผ์น  ์ˆ˜ ์žˆ๋Š” ์ƒํ™ฉ, ๋Šฅ๋ ฅ, ์กฐ์น˜ ๋˜๋Š” ์‚ฌ๊ฑด์ด ์žˆ์„ ๋•Œ ์กด์žฌํ•˜๋Š” ๋ณด์•ˆ ์œ„๋ฐ˜ ๊ฐ€๋Šฅ์„ฑ.
    • ์ฆ‰, ์œ„ํ˜‘์ด๋ž€ ์ทจ์•ฝ์ ์„ ์•…์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ž ์žฌ์ ์ธ ์œ„ํ—˜
  • Vulnerability(์ทจ์•ฝ์ )
    • ์‹œ์Šคํ…œ์˜ ๋ณด์•ˆ ์ •์ฑ…์„ ์œ„๋ฐ˜ํ•˜๋Š” ๋ฐ ์•…์šฉ๋  ์ˆ˜ ์žˆ๋Š” ์‹œ์Šคํ…œ์˜ ์„ค๊ณ„, ๊ตฌํ˜„ ๋˜๋Š” ์šด์˜ ๋ฐ ๊ด€๋ฆฌ์ƒ์˜ ๊ฒฐํ•จ์ด๋‚˜ ์•ฝ์ 

Figure 1.2 Security Concepts and Relationships

  • ์†Œ์œ ์ž(Owners)๋Š” ์ž์‚ฐ(assets)์— ๊ฐ€์น˜(value)๋ฅผ ๋‘ 
  • ์†Œ์œ ์ž๋Š” ์œ„ํ—˜(risk)์„ ์ตœ์†Œํ™”ํ•˜๊ณ ์ž ํ•จ
  • ์†Œ์œ ์ž๋Š” ๋Œ€์ฑ…(countermeasures)์„ ๋ถ€๊ณผํ•จ
  • ์œ„ํ˜‘ ํ–‰์œ„์ž(Threat agents)๋Š” ์œ„ํ˜‘(threats)์„ ์•ผ๊ธฐํ•จ
  • ์œ„ํ˜‘์€ ์ž์‚ฐ์„ ๋‚จ์šฉ(abuse)ํ•˜๊ฑฐ๋‚˜ ์†์ƒ์‹œํ‚ค๊ณ ์ž ํ•จ
  • ์œ„ํ˜‘์€ ์ทจ์•ฝ์ (vulnerabilities)์„ ์•…์šฉํ•จ
  • ์œ„ํ˜‘์€ risk๋ฅผ ์ฆ๊ฐ€์‹œํ‚ด
  • ์ทจ์•ฝ์ ์€ risk๋กœ ์ด์–ด์ง
  • Risk๋Š” ์ž์‚ฐ์— ๋Œ€ํ•œ ๊ฒƒ์ž„
  • countermeasure๋Š” ์ทจ์•ฝ์ ์„ ์ค„์ž„
  • countermeasure๋Š” ์œ„ํ˜‘์„ ์ค„์ž„
  • countermeasures ์ž์ฒด๊ฐ€ ์ทจ์•ฝ์ ์„ ๊ฐ€์งˆ ์ˆ˜ ์žˆ์Œ

Vulnerabilities, Threats and Attacks

  • ์ทจ์•ฝ์ (Vulnerabilities)์˜ ๋ฒ”์ฃผ
    • ์†์ƒ๋จ (๋ฌด๊ฒฐ์„ฑ ์ƒ์‹ค)
    • ์œ ์ถœ๋จ (๊ธฐ๋ฐ€์„ฑ ์ƒ์‹ค)
    • ์‚ฌ์šฉํ•  ์ˆ˜ ์—†๊ฑฐ๋‚˜ ๋งค์šฐ ๋А๋ฆผ (๊ฐ€์šฉ์„ฑ ์ƒ์‹ค)
  • ์œ„ํ˜‘(Threats)
    • ์ทจ์•ฝ์ ์„ ์•…์šฉํ•  ์ˆ˜ ์žˆ์Œ
    • ์ž์‚ฐ์— ๋Œ€ํ•œ ์ž ์žฌ์ ์ธ ๋ณด์•ˆ ์œ„ํ˜‘์„ ๋‚˜ํƒ€๋ƒ„
  • ๊ณต๊ฒฉ(Attacks) (์‹คํ–‰๋œ ์œ„ํ˜‘)
    • Passive(์ˆ˜๋™์ )
      • ์‹œ์Šคํ…œ ์ž์›์„ ๋ฐ”๊พธ๊ฑฐ๋‚˜ ์˜ํ–ฅ์„ ๋ฏธ์น˜์ง€ ์•Š์Œ.
      • (์˜ˆ: traffic capture)
    • Active(๋Šฅ๋™์ )
      • ์‹œ์Šคํ…œ ์ž์›์„ ๋ณ€๊ฒฝํ•˜๊ฑฐ๋‚˜ ์šด์˜์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋ ค๋Š” ์‹œ๋„
    • Insider(๋‚ด๋ถ€์ž)
      • ๋ณด์•ˆ ๊ฒฝ๊ณ„ ๋‚ด๋ถ€์˜ ๊ฐœ์ฒด์— ์˜ํ•ด ์‹œ์ž‘๋จ
      • ๋‚ด๋ถ€์ž์— ์˜ํ•œ ๊ณต๊ฒฉ์ด ์ผ๋ฐ˜์ ์œผ๋กœ ๋” ๋งŽ์Œ.
    • Outsider(์™ธ๋ถ€์ž)
      • ๊ฒฝ๊ณ„ ์™ธ๋ถ€์—์„œ ์‹œ์ž‘๋จ

Passive and Active Attacks

  • Passive attacks
    • ์‹œ์Šคํ…œ์œผ๋กœ๋ถ€ํ„ฐ ์ •๋ณด๋ฅผ ๋ฐฐ์šฐ๊ฑฐ๋‚˜ ์‚ฌ์šฉํ•˜๋ ค๊ณ  ์‹œ๋„ํ•˜์ง€๋งŒ, ์‹œ์Šคํ…œ ์ž์›์—๋Š” ์˜ํ–ฅ์„ ๋ฏธ์น˜์ง€ ์•Š์Œ
    • ์ „์†ก ๋„์ฒญ/๋ชจ๋‹ˆํ„ฐ๋ง
    • ํƒ์ง€์˜ ์–ด๋ ค์›€
    • ํƒ์ง€๋ณด๋‹ค๋Š” ์˜ˆ๋ฐฉ์— ์ค‘์ , (์˜ˆ: ํŒจํ‚ท ์•”ํ˜ธํ™”)
    • ๋‘ ๊ฐ€์ง€ ์œ ํ˜•:
      • ๋ฉ”์‹œ์ง€ ๋‚ด์šฉ ๊ณต๊ฐœ
      • ํŠธ๋ž˜ํ”ฝ ๋ถ„์„(์•”ํ˜ธํ™” ๋•Œ๋ฌธ์— ๋‚ด์šฉ์„ ๋ณผ ์ˆ˜๋Š” ์—†์ง€๋งŒ ํŒจํ‚ท์˜ ์–‘์„ ๋ถ„์„ํ•ด์„œ ๊ณต๊ฒฉํ•˜๋Š” ๋ฐฉ๋ฒ•)
        • ๊ฑธํ”„์ „ ๋ฐœ๋ฐœ ์ง์ „ ํŽœํƒ€๊ณค์œผ๋กœ์˜ ํ”ผ์ž ์ฃผ๋ฌธ๋Ÿ‰ ์ฆ๊ฐ€
  • Active attacks
    • ๋ฐ์ดํ„ฐ ์ŠคํŠธ๋ฆผ์˜ modification์„ ํฌํ•จ
    • ๋ชฉํ‘œ๋Š” ์ด๋ฅผ ํƒ์ง€ํ•œ ํ›„ ๋ณต๊ตฌํ•˜๋Š” ๊ฒƒ
    • ๋„ค ๊ฐ€์ง€ ๋ฒ”์ฃผ:
      • Masquerade(์œ„์žฅ)
      • Replay(์žฌ์ „์†ก)
      • Modification of messages(๋ฉ”์‹œ์ง€ ์ˆ˜์ •)
      • Denial of service(์„œ๋น„์Šค ๊ฑฐ๋ถ€, DoS): ๊ฐ€์šฉ์„ฑ์— ๋Œ€ํ•œ ๊ณต๊ฒฉ

Countermeasure

  • ๋ชฉํ‘œ๋Š” ์ž์‚ฐ์— ๋Œ€ํ•œ ์ž”์—ฌ ์œ„ํ—˜ ์ˆ˜์ค€์„ ์ตœ์†Œํ™”ํ•˜๋Š” ๊ฒƒ
    • ์˜ˆ๋ฐฉ(prevent)
    • ํƒ์ง€(detect)
    • ๋ณต๊ตฌ(recover)
  • ๋ณด์•ˆ ๊ณต๊ฒฉ์— ๋Œ€์ฒ˜ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ์ˆ˜๋‹จ
  • ์ƒˆ๋กœ์šด ์ทจ์•ฝ์ ์„ ๋„์ž…ํ•  ์ˆ˜ ์žˆ์Œ
  • ์•Œ๊ณ  ์žˆ๋Š” ์ž”์—ฌ ์ทจ์•ฝ์ ์ด ๋‚จ์„ ์ˆ˜ ์žˆ์Œ
  • ๋ณด์•ˆ ๊ณต๊ฒฉ์— ๋Œ€์ฒ˜ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ์ˆ˜๋‹จ

Figure 1.3 Scope of Computer Security

  • Computer System(์ปดํ“จํ„ฐ ์‹œ์Šคํ…œ) ๊ตฌ์„ฑ ์š”์†Œ
    • Data(๋ฐ์ดํ„ฐ)
    • Processes representing users(์‚ฌ์šฉ์ž๋ฅผ ๋Œ€ํ‘œํ•˜๋Š” ํ”„๋กœ์„ธ์Šค)
    • Guard(๊ฐ€๋“œ)
    • Users making requests(์š”์ฒญํ•˜๋Š” ์‚ฌ์šฉ์ž)
  1. ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•œ ์ ‘๊ทผ ํ†ต์ œ (Protection)
  2. ์ปดํ“จํ„ฐ ์‹œ์„ค์— ๋Œ€ํ•œ ์ ‘๊ทผ ํ†ต์ œ (User authentication)
  3. ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•œ ๋ฐ์ดํ„ฐ์˜ ์•ˆ์ „ํ•œ ์ „์†ก (Network security)
  4. ๋ฏผ๊ฐํ•œ ํŒŒ์ผ์˜ ๋ณด์•ˆ ์œ ์ง€ (File security)

Table 1.4 (FIPS PUB 200)

Access control (์ ‘๊ทผ ํ†ต์ œ)

  • ์ •๋ณด ์‹œ์Šคํ…œ ์ ‘๊ทผ์„ ์ธ๊ฐ€๋œ ์‚ฌ์šฉ์ž, ์ธ๊ฐ€๋œ ์‚ฌ์šฉ์ž๋ฅผ ๋Œ€์‹ ํ•˜๋Š” ํ”„๋กœ์„ธ์Šค, ๋˜๋Š” ๋‹ค๋ฅธ ์ •๋ณด ์‹œ์Šคํ…œ์„ ํฌํ•จํ•œ ์žฅ์น˜๋กœ ์ œํ•œํ•˜๊ณ , ์ธ๊ฐ€๋œ ์‚ฌ์šฉ์ž๊ฐ€ ์ˆ˜ํ–‰ํ•˜๋„๋ก ํ—ˆ์šฉ๋œ ํŠธ๋žœ์žญ์…˜ ๋ฐ ๊ธฐ๋Šฅ ์œ ํ˜•์œผ๋กœ ์ œํ•œํ•จ.

Awareness and training (์ธ์‹ ๋ฐ ํ›ˆ๋ จ)

  1. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์˜ ๊ด€๋ฆฌ์ž ๋ฐ ์‚ฌ์šฉ์ž๊ฐ€ ์ž์‹ ์˜ ํ™œ๋™๊ณผ ๊ด€๋ จ๋œ ๋ณด์•ˆ ์œ„ํ—˜ ๋ฐ ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์˜ ๋ณด์•ˆ๊ณผ ๊ด€๋ จ๋œ ์ ์šฉ ๋ฒ•๋ฅ , ๊ทœ์ •, ์ •์ฑ…์„ ์ธ์ง€ํ•˜๋„๋ก ๋ณด์žฅํ•จ.
  2. ๋‹ด๋‹น์ž๊ฐ€ ํ• ๋‹น๋œ ์ •๋ณด ๋ณด์•ˆ ๊ด€๋ จ ์ž„๋ฌด์™€ ์ฑ…์ž„์„ ์ˆ˜ํ–‰ํ•˜๊ธฐ์— ์ ์ ˆํ•œ ํ›ˆ๋ จ์„ ๋ฐ›๋„๋ก ๋ณด์žฅํ•จ.

Audit and accountability (๊ฐ์‚ฌ ๋ฐ ์ฑ…์ž„)

  1. ๋ถˆ๋ฒ•์ ์ด๊ฑฐ๋‚˜, ์ธ๊ฐ€๋˜์ง€ ์•Š์•˜๊ฑฐ๋‚˜, ๋ถ€์ ์ ˆํ•œ ์ •๋ณด ์‹œ์Šคํ…œ ํ™œ๋™์˜ ๋ชจ๋‹ˆํ„ฐ๋ง, ๋ถ„์„, ์กฐ์‚ฌ, ๋ณด๊ณ ๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ๋ฒ”์œ„๊นŒ์ง€ ์ •๋ณด ์‹œ์Šคํ…œ ๊ฐ์‚ฌ ๊ธฐ๋ก์„ ์ƒ์„ฑ, ๋ณดํ˜ธ, ์œ ์ง€ํ•จ.
  2. ๊ฐœ๋ณ„ ์ •๋ณด ์‹œ์Šคํ…œ ์‚ฌ์šฉ์ž์˜ ํ–‰์œ„๋ฅผ ํ•ด๋‹น ์‚ฌ์šฉ์ž์—๊ฒŒ ๊ณ ์œ ํ•˜๊ฒŒ ์ถ”์ ํ•˜์—ฌ ์ฑ…์ž„์„ ๋ฌผ์„ ์ˆ˜ ์žˆ๋„๋ก ๋ณด์žฅํ•จ.

Certification, accreditation, and security assessments (์ธ์ฆ, ์ธ๊ฐ€ ๋ฐ ๋ณด์•ˆ ํ‰๊ฐ€)

  1. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์˜ ๋ณด์•ˆ ํ†ต์ œ๊ฐ€ ์ ์šฉ์— ํšจ๊ณผ์ ์ธ์ง€ ํŒ๋‹จํ•˜๊ธฐ ์œ„ํ•ด ์ฃผ๊ธฐ์ ์œผ๋กœ ํ‰๊ฐ€ํ•จ.
  2. ๊ฒฐํ•จ์„ ์ˆ˜์ •ํ•˜๊ณ  ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์˜ ์ทจ์•ฝ์ ์„ ์ค„์ด๊ฑฐ๋‚˜ ์ œ๊ฑฐํ•˜๊ธฐ ์œ„ํ•ด ๊ณ ์•ˆ๋œ ์กฐ์น˜ ๊ณ„ํš์„ ๊ฐœ๋ฐœํ•˜๊ณ  ๊ตฌํ˜„ํ•จ.
  3. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ ๋ฐ ๊ด€๋ จ๋œ ๋ชจ๋“  ์ •๋ณด ์‹œ์Šคํ…œ ์—ฐ๊ฒฐ์˜ ์šด์˜์„ ์ธ๊ฐ€ํ•จ.
  4. ํ†ต์ œ์˜ ์ง€์†์ ์ธ ํšจ๊ณผ์„ฑ์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•ด ์ •๋ณด ์‹œ์Šคํ…œ ๋ณด์•ˆ ํ†ต์ œ๋ฅผ ์ง€์†์ ์œผ๋กœ ๋ชจ๋‹ˆํ„ฐ๋งํ•จ.

Configuration management (๊ตฌ์„ฑ ๊ด€๋ฆฌ)

  1. ๊ฐ ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ ์ˆ˜๋ช… ์ฃผ๊ธฐ ์ „๋ฐ˜์— ๊ฑธ์ณ ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ(ํ•˜๋“œ์›จ์–ด, ์†Œํ”„ํŠธ์›จ์–ด, ํŽŒ์›จ์–ด, ๋ฌธ์„œ ํฌํ•จ)์˜ ๊ธฐ์ค€ ๊ตฌ์„ฑ ๋ฐ ์ธ๋ฒคํ† ๋ฆฌ๋ฅผ ์„ค์ •ํ•˜๊ณ  ์œ ์ง€ํ•จ.
  2. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์— ์‚ฌ์šฉ๋˜๋Š” ์ •๋ณด ๊ธฐ์ˆ  ์ œํ’ˆ์— ๋Œ€ํ•œ ๋ณด์•ˆ ๊ตฌ์„ฑ ์„ค์ •์„ ํ™•๋ฆฝํ•˜๊ณ  ์‹œํ–‰ํ•จ.

Contingency planning (๋น„์ƒ ๊ณ„ํš)

  • ๋น„์ƒ ์ƒํ™ฉ ์‹œ ํ•ต์‹ฌ ์ •๋ณด ์ž์›์˜ ๊ฐ€์šฉ์„ฑ ๋ฐ ์šด์˜์˜ ์—ฐ์†์„ฑ์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•ด ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์˜ ๋น„์ƒ ๋Œ€์‘, ๋ฐฑ์—… ์šด์˜, ์žฌํ•ด ๋ณต๊ตฌ ๊ณ„ํš์„ ์ˆ˜๋ฆฝ, ์œ ์ง€, ๊ตฌํ˜„ํ•จ.

Identification and authentication (์‹๋ณ„ ๋ฐ ์ธ์ฆ)

  • ์ •๋ณด ์‹œ์Šคํ…œ ์ ‘๊ทผ์„ ํ—ˆ์šฉํ•˜๊ธฐ ์œ„ํ•œ ์ „์ œ ์กฐ๊ฑด์œผ๋กœ, ์ •๋ณด ์‹œ์Šคํ…œ ์‚ฌ์šฉ์ž, ์‚ฌ์šฉ์ž๋ฅผ ๋Œ€์‹ ํ•˜๋Š” ํ”„๋กœ์„ธ์Šค, ๋˜๋Š” ์žฅ์น˜๋ฅผ ์‹๋ณ„ํ•˜๊ณ  ํ•ด๋‹น ์‚ฌ์šฉ์ž, ํ”„๋กœ์„ธ์Šค, ์žฅ์น˜์˜ ์‹ ์›์„ ์ธ์ฆ(๋˜๋Š” ๊ฒ€์ฆ)ํ•จ.

Incident response (์‚ฌ๊ณ  ๋Œ€์‘)

  1. ์ ์ ˆํ•œ ์ค€๋น„, ํƒ์ง€, ๋ถ„์„, ๋ด‰์‡„, ๋ณต๊ตฌ, ์‚ฌ์šฉ์ž ๋Œ€์‘ ํ™œ๋™์„ ํฌํ•จํ•˜๋Š” ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์˜ ์šด์˜ ์‚ฌ๊ณ  ์ฒ˜๋ฆฌ ์—ญ๋Ÿ‰์„ ํ™•๋ฆฝํ•จ.
  2. ์‚ฌ๊ณ ๋ฅผ ์ถ”์ , ๋ฌธ์„œํ™”ํ•˜๊ณ  ์ ์ ˆํ•œ ์กฐ์ง ๊ด€๊ณ„์ž ๋ฐ/๋˜๋Š” ๋‹น๊ตญ์— ๋ณด๊ณ ํ•จ.

Maintenance (์œ ์ง€๋ณด์ˆ˜)

  1. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ์ฃผ๊ธฐ์ ์ด๊ณ  ์‹œ๊ธฐ์ ์ ˆํ•œ ์œ ์ง€๋ณด์ˆ˜๋ฅผ ์ˆ˜ํ–‰ํ•จ.
  2. ์ •๋ณด ์‹œ์Šคํ…œ ์œ ์ง€๋ณด์ˆ˜๋ฅผ ์ˆ˜ํ–‰ํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ๋„๊ตฌ, ๊ธฐ์ˆ , ๋ฉ”์ปค๋‹ˆ์ฆ˜, ์ธ๋ ฅ์— ๋Œ€ํ•œ ํšจ๊ณผ์ ์ธ ํ†ต์ œ๋ฅผ ์ œ๊ณตํ•จ.

Media protection (๋งค์ฒด ๋ณดํ˜ธ)

  1. ์ข…์ด ๋ฐ ๋””์ง€ํ„ธ ํ˜•ํƒœ์˜ ์ •๋ณด ์‹œ์Šคํ…œ ๋งค์ฒด๋ฅผ ๋ณดํ˜ธํ•จ.
  2. ์ •๋ณด ์‹œ์Šคํ…œ ๋งค์ฒด์˜ ์ •๋ณด ์ ‘๊ทผ์„ ์ธ๊ฐ€๋œ ์‚ฌ์šฉ์ž๋กœ ์ œํ•œํ•จ.
  3. ์ •๋ณด ์‹œ์Šคํ…œ ๋งค์ฒด๋ฅผ ํ๊ธฐ ๋˜๋Š” ์žฌ์‚ฌ์šฉ์„ ์œ„ํ•ด ๋ฐฐํฌํ•˜๊ธฐ ์ „์— ์‚ญ์ œ(sanitize)ํ•˜๊ฑฐ๋‚˜ ํŒŒ๊ธฐํ•จ.

Physical and environmental protection (๋ฌผ๋ฆฌ์  ๋ฐ ํ™˜๊ฒฝ์  ๋ณดํ˜ธ)

  1. ์ •๋ณด ์‹œ์Šคํ…œ, ์žฅ๋น„, ๊ด€๋ จ ์šด์˜ ํ™˜๊ฒฝ์— ๋Œ€ํ•œ ๋ฌผ๋ฆฌ์  ์ ‘๊ทผ์„ ์ธ๊ฐ€๋œ ๊ฐœ์ธ์œผ๋กœ ์ œํ•œํ•จ.
  2. ์ •๋ณด ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ๋ฌผ๋ฆฌ์  ์„ค๋น„ ๋ฐ ์ง€์› ๊ธฐ๋ฐ˜ ์‹œ์„ค์„ ๋ณดํ˜ธํ•จ.
  3. ์ •๋ณด ์‹œ์Šคํ…œ์„ ์œ„ํ•œ ์ง€์› ์œ ํ‹ธ๋ฆฌํ‹ฐ๋ฅผ ์ œ๊ณตํ•จ.
  4. ํ™˜๊ฒฝ์  ์œ„ํ—˜์œผ๋กœ๋ถ€ํ„ฐ ์ •๋ณด ์‹œ์Šคํ…œ์„ ๋ณดํ˜ธํ•จ.
  5. ์ •๋ณด ์‹œ์Šคํ…œ์„ ํฌํ•จํ•˜๋Š” ์‹œ์„ค์— ์ ์ ˆํ•œ ํ™˜๊ฒฝ ํ†ต์ œ๋ฅผ ์ œ๊ณตํ•จ.

Planning (๊ณ„ํš)

  • ์ •๋ณด ์‹œ์Šคํ…œ์— ์ ์šฉ ์ค‘์ด๊ฑฐ๋‚˜ ๊ณ„ํš๋œ ๋ณด์•ˆ ํ†ต์ œ ๋ฐ ์ •๋ณด ์‹œ์Šคํ…œ์— ์ ‘๊ทผํ•˜๋Š” ๊ฐœ์ธ์˜ ํ–‰๋™ ๊ทœ์น™์„ ๊ธฐ์ˆ ํ•˜๋Š” ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ ๋ณด์•ˆ ๊ณ„ํš์„ ๊ฐœ๋ฐœ, ๋ฌธ์„œํ™”, ์ฃผ๊ธฐ์  ์—…๋ฐ์ดํŠธ, ๊ตฌํ˜„ํ•จ.

Personnel security (์ธ์  ๋ณด์•ˆ)

  1. ์กฐ์ง ๋‚ด ์ฑ…์ž„ ์žˆ๋Š” ์œ„์น˜(์ œ3์ž ์„œ๋น„์Šค ์ œ๊ณต์ž ํฌํ•จ)๋ฅผ ์ฐจ์ง€ํ•˜๋Š” ๊ฐœ์ธ์ด ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๊ณ  ํ•ด๋‹น ์œ„์น˜์— ๋Œ€ํ•œ ํ™•๋ฆฝ๋œ ๋ณด์•ˆ ๊ธฐ์ค€์„ ์ถฉ์กฑํ•˜๋„๋ก ๋ณด์žฅํ•จ.
  2. ์กฐ์ง ์ •๋ณด ๋ฐ ์ •๋ณด ์‹œ์Šคํ…œ์ด ํ•ด๊ณ  ๋ฐ ์ „๊ทผ๊ณผ ๊ฐ™์€ ์ธ์‚ฌ ์กฐ์น˜ ์ค‘ ๋ฐ ์ดํ›„์— ๋ณดํ˜ธ๋˜๋„๋ก ๋ณด์žฅํ•จ.
  3. ์กฐ์ง ๋ณด์•ˆ ์ •์ฑ… ๋ฐ ์ ˆ์ฐจ๋ฅผ ์ค€์ˆ˜ํ•˜์ง€ ์•Š๋Š” ์ธ๋ ฅ์— ๋Œ€ํ•ด ๊ณต์‹์ ์ธ ์ œ์žฌ๋ฅผ ์ ์šฉํ•จ.

Risk assessment (์œ„ํ—˜ ํ‰๊ฐ€)

  • ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์˜ ์šด์˜ ๋ฐ ๊ด€๋ จ ์ฒ˜๋ฆฌ, ์ €์žฅ, ์ „์†ก์œผ๋กœ ์ธํ•ด ๋ฐœ์ƒํ•˜๋Š” ์กฐ์ง ์šด์˜(์ž„๋ฌด, ๊ธฐ๋Šฅ, ์ด๋ฏธ์ง€, ํ‰ํŒ ํฌํ•จ), ์กฐ์ง ์ž์‚ฐ, ๊ฐœ์ธ์— ๋Œ€ํ•œ ์œ„ํ—˜์„ ์ฃผ๊ธฐ์ ์œผ๋กœ ํ‰๊ฐ€ํ•จ.

Systems and services acquisition (์‹œ์Šคํ…œ ๋ฐ ์„œ๋น„์Šค ํš๋“)

  1. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์„ ์ ์ ˆํžˆ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ์ถฉ๋ถ„ํ•œ ์ž์›์„ ํ• ๋‹นํ•จ.
  2. ์ •๋ณด ๋ณด์•ˆ ๊ณ ๋ ค ์‚ฌํ•ญ์„ ํ†ตํ•ฉํ•˜๋Š” ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ ์ˆ˜๋ช… ์ฃผ๊ธฐ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ฑ„์šฉํ•จ.
  3. ์†Œํ”„ํŠธ์›จ์–ด ์‚ฌ์šฉ ๋ฐ ์„ค์น˜ ์ œํ•œ์„ ์ฑ„์šฉํ•จ.
  4. ์ œ3์ž ์ œ๊ณต์ž๊ฐ€ ์กฐ์ง์—์„œ ์•„์›ƒ์†Œ์‹ฑ๋œ ์ •๋ณด, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜, ๋ฐ/๋˜๋Š” ์„œ๋น„์Šค๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•œ ์ ์ ˆํ•œ ๋ณด์•ˆ ์กฐ์น˜๋ฅผ ์ฑ„์šฉํ•˜๋„๋ก ๋ณด์žฅํ•จ.

System and communications protection (์‹œ์Šคํ…œ ๋ฐ ํ†ต์‹  ๋ณดํ˜ธ)

  1. ์ •๋ณด ์‹œ์Šคํ…œ์˜ ์™ธ๋ถ€ ๊ฒฝ๊ณ„ ๋ฐ ์ฃผ์š” ๋‚ด๋ถ€ ๊ฒฝ๊ณ„์—์„œ ์กฐ์ง ํ†ต์‹ (์ฆ‰, ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ์— ์˜ํ•ด ์ „์†ก๋˜๊ฑฐ๋‚˜ ์ˆ˜์‹ ๋˜๋Š” ์ •๋ณด)์„ ๋ชจ๋‹ˆํ„ฐ๋ง, ํ†ต์ œ, ๋ณดํ˜ธํ•จ.
  2. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ ๋‚ด ํšจ๊ณผ์ ์ธ ์ •๋ณด ๋ณด์•ˆ์„ ์ฆ์ง„ํ•˜๋Š” ์•„ํ‚คํ…์ฒ˜ ์„ค๊ณ„, ์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ ๊ธฐ์ˆ , ์‹œ์Šคํ…œ ์—”์ง€๋‹ˆ์–ด๋ง ์›์น™์„ ์ฑ„์šฉํ•จ.

System and information integrity (์‹œ์Šคํ…œ ๋ฐ ์ •๋ณด ๋ฌด๊ฒฐ์„ฑ)

  1. ์ •๋ณด ๋ฐ ์ •๋ณด ์‹œ์Šคํ…œ ๊ฒฐํ•จ์„ ์‹œ๊ธฐ์ ์ ˆํ•˜๊ฒŒ ์‹๋ณ„, ๋ณด๊ณ , ์ˆ˜์ •ํ•จ.
  2. ์กฐ์ง ์ •๋ณด ์‹œ์Šคํ…œ ๋‚ด ์ ์ ˆํ•œ ์œ„์น˜์—์„œ ์•…์„ฑ ์ฝ”๋“œ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•จ.
  3. ์ •๋ณด ์‹œ์Šคํ…œ ๋ณด์•ˆ ๊ฒฝ๊ณ  ๋ฐ ๊ถŒ๊ณ ๋ฅผ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๊ณ  ๋Œ€์‘ํ•˜์—ฌ ์ ์ ˆํ•œ ์กฐ์น˜๋ฅผ ์ทจํ•จ.

Security Functional Requirements

  • ์ฃผ๋กœ ์ปดํ“จํ„ฐ ๋ณด์•ˆ ๊ธฐ์ˆ ์  ์กฐ์น˜๊ฐ€ ํ•„์š”ํ•œ ๊ธฐ๋Šฅ ์˜์—ญ:
    • ์ ‘๊ทผ ํ†ต์ œ(access control); ์‹๋ณ„ ๋ฐ ์ธ์ฆ(identification & authentication); ์‹œ์Šคํ…œ ๋ฐ ํ†ต์‹  ๋ณดํ˜ธ(system & communication protection); ์‹œ์Šคํ…œ ๋ฐ ์ •๋ณด ๋ฌด๊ฒฐ์„ฑ(system & information integrity)
  • ์ฃผ๋กœ ๊ด€๋ฆฌ ํ†ต์ œ ๋ฐ ์ ˆ์ฐจ๊ฐ€ ํ•„์š”ํ•œ ๊ธฐ๋Šฅ ์˜์—ญ:
    • ์ธ์‹ ๋ฐ ํ›ˆ๋ จ; ๊ฐ์‚ฌ ๋ฐ ์ฑ…์ž„; ์ธ์ฆ, ์ธ๊ฐ€ ๋ฐ ๋ณด์•ˆ ํ‰๊ฐ€; ๋น„์ƒ ๊ณ„ํš; ์œ ์ง€๋ณด์ˆ˜; ๋ฌผ๋ฆฌ์  ๋ฐ ํ™˜๊ฒฝ์  ๋ณดํ˜ธ; ๊ณ„ํš; ์ธ์‚ฌ ๋ณด์•ˆ; ์œ„ํ—˜ ํ‰๊ฐ€; ์‹œ์Šคํ…œ ๋ฐ ์„œ๋น„์Šค ํš๋“
  • ์ปดํ“จํ„ฐ ๋ณด์•ˆ ๊ธฐ์ˆ ์  ์กฐ์น˜์™€ ๊ด€๋ฆฌ ํ†ต์ œ๊ฐ€ ๊ฒน์น˜๋Š” ๊ธฐ๋Šฅ ์˜์—ญ:
    • ํ˜•์ƒ ๊ด€๋ฆฌ; ์‚ฌ๊ณ  ๋Œ€์‘; ๋ฏธ๋””์–ด ๋ณดํ˜ธ

Security Architecture For Open Systems

  • ITU-T Recommendation X.800, Security Architecture for OSI(Open System Interconnection)
    • ๋ณด์•ˆ ์š”๊ตฌ์‚ฌํ•ญ์„ ์ •์˜ํ•˜๊ณ  ์ด๋ฅผ ๋งŒ์กฑ์‹œํ‚ค๋Š” ์ ‘๊ทผ ๋ฐฉ์‹์„ ํŠน์„ฑํ™”ํ•˜๋Š” ์ฒด๊ณ„์ ์ธ ๋ฐฉ๋ฒ•
    • ๊ตญ์ œ ํ‘œ์ค€์œผ๋กœ ๊ฐœ๋ฐœ๋จ
    • ์ดˆ์ 
      • Security attacks โ€“ ์กฐ์ง์ด ์†Œ์œ ํ•œ ์ •๋ณด์˜ ๋ณด์•ˆ์„ ์นจํ•ดํ•˜๋Š” ํ–‰์œ„
      • Security mechanism โ€“ ๋ณด์•ˆ ๊ณต๊ฒฉ์„ ํƒ์ง€, ์˜ˆ๋ฐฉ ๋˜๋Š” ๋ณต๊ตฌํ•˜๋„๋ก ์„ค๊ณ„๋œ ๋ฉ”์ปค๋‹ˆ์ฆ˜
      • Security service โ€“ ๋ณด์•ˆ ๊ณต๊ฒฉ์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ์„œ๋น„์Šค

Security Services

  • X.800
    • ํ†ต์‹ ํ•˜๋Š” ๊ฐœ๋ฐฉํ˜• ์‹œ์Šคํ…œ์˜ ํ”„๋กœํ† ์ฝœ ๊ณ„์ธต์— ์˜ํ•ด ์ œ๊ณต๋˜๋ฉฐ, ์‹œ์Šคํ…œ ๋˜๋Š” ๋ฐ์ดํ„ฐ ์ „์†ก์˜ ์ ์ ˆํ•œ ๋ณด์•ˆ์„ ๋ณด์žฅํ•˜๋Š” ์„œ๋น„์Šค๋กœ ์ •์˜
  • RFC 2828
    • ์‹œ์Šคํ…œ ์ž์›์— ํŠน์ • ์ข…๋ฅ˜์˜ ๋ณดํ˜ธ๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ์‹œ์Šคํ…œ์— ์˜ํ•ด ์ œ๊ณต๋˜๋Š” ์ฒ˜๋ฆฌ ๋˜๋Š” ํ†ต์‹  ์„œ๋น„์Šค๋กœ ์ •์˜
    • Security services๋Š” ๋ณด์•ˆ ์ •์ฑ…(security policies)์„ ๊ตฌํ˜„
    • Security mechanisms์— ์˜ํ•ด ๊ตฌํ˜„๋จ

Authentication Service

  • ํ†ต์‹ ์ด ์ฃผ์žฅํ•˜๋Š” ์ถœ์ฒ˜๋กœ๋ถ€ํ„ฐ ์˜จ ๊ฒƒ์ž„์„ ๋ณด์žฅํ•˜๋Š” ๊ฒƒ๊ณผ ๊ด€๋ จ
  • ์—ฐ๊ฒฐ์ด ๋‘ ํ•ฉ๋ฒ•์ ์ธ ๋‹น์‚ฌ์ž ์ค‘ ํ•˜๋‚˜๋กœ ๊ฐ€์žฅํ•˜๋Š” ์ œ3์ž์— ์˜ํ•ด ๋ฐฉํ•ด๋ฐ›์ง€ ์•Š์Œ์„ ๋ณด์žฅํ•ด์•ผ ํ•จ
  • Data Origin Authentication
    • ๋ฐ์ดํ„ฐ ๋‹จ์œ„์˜ ์ถœ์ฒ˜๋ฅผ ํ™•์ฆํ•˜๊ธฐ ์œ„ํ•ด ์ œ๊ณต๋จ
    • ๋ฐ์ดํ„ฐ ๋‹จ์œ„์˜ ๋ณต์ œ๋‚˜ ์ˆ˜์ •์— ๋Œ€ํ•œ ๋ณดํ˜ธ๋Š” ์ œ๊ณตํ•˜์ง€ ์•Š์Œ
    • ์ด ์œ ํ˜•์˜ ์„œ๋น„์Šค๋Š” ํ†ต์‹  ์—”ํ‹ฐํ‹ฐ ๊ฐ„์— ์‚ฌ์ „ ์ƒํ˜ธ์ž‘์šฉ์ด ์—†๋Š” ์ด๋ฉ”์ผ๊ณผ ๊ฐ™์€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์ง€์›
  • Peer Entity Authentication
    • ์—ฐ๊ด€ ๊ด€๊ณ„์— ์žˆ๋Š” ํ”ผ์–ด ์—”ํ‹ฐํ‹ฐ์˜ ์‹ ์›์„ ํ™•์ฆํ•˜๊ธฐ ์œ„ํ•ด ์ œ๊ณต๋จ
    • ์—ฐ๊ฒฐ ์„ค์ • ์‹œ ๋˜๋Š” ๋ฐ์ดํ„ฐ ์ „์†ก ๋‹จ๊ณ„ ๋™์•ˆ ์‚ฌ์šฉ๋จ
    • ์—”ํ‹ฐํ‹ฐ๊ฐ€ ๊ฐ€์žฅ์ด๋‚˜ ์ด์ „ ์—ฐ๊ฒฐ์˜ ๋ฌด๋‹จ ์žฌ์ „์†ก์„ ์ˆ˜ํ–‰ํ•˜์ง€ ์•Š๋Š”๋‹ค๋Š” ์‹ ๋ขฐ๋ฅผ ์ œ๊ณตํ•˜๋ ค๋Š” ์‹œ๋„

Access Control Service

  • ํ†ต์‹  ๋งํฌ๋ฅผ ํ†ตํ•ด ํ˜ธ์ŠคํŠธ ์‹œ์Šคํ…œ ๋ฐ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ๋Œ€ํ•œ ์ ‘๊ทผ์„ ์ œํ•œํ•˜๊ณ  ์ œ์–ดํ•˜๋Š” ๋Šฅ๋ ฅ
  • ์ ‘๊ทผํ•˜๋ ค๋Š” ๊ฐ ์—”ํ‹ฐํ‹ฐ๋Š” ๋จผ์ € ์‹๋ณ„๋˜๊ฑฐ๋‚˜ ์ธ์ฆ๋˜์–ด์•ผ ์ ‘๊ทผ ๊ถŒํ•œ์„ ๊ฐœ์ธ์— ๋งž๊ฒŒ ์กฐ์ •ํ•  ์ˆ˜ ์žˆ์Œ.

Nonrepudiation Service

  • ์†ก์‹ ์ž๋‚˜ ์ˆ˜์‹ ์ž ๋ชจ๋‘ ์ „์†ก๋œ ๋ฉ”์‹œ์ง€๋ฅผ ๋ถ€์ธํ•˜๋Š” ๊ฒƒ์„ ๋ฐฉ์ง€
  • ์ˆ˜์‹ ์ž๋Š” ์ฃผ์žฅ๋œ ์†ก์‹ ์ž๊ฐ€ ์‹ค์ œ๋กœ ๋ฉ”์‹œ์ง€๋ฅผ ๋ณด๋ƒˆ์Œ์„ ์ฆ๋ช…ํ•  ์ˆ˜ ์žˆ์Œ.
  • ์†ก์‹ ์ž๋Š” ์ฃผ์žฅ๋œ ์ˆ˜์‹ ์ž๊ฐ€ ์‹ค์ œ๋กœ ๋ฉ”์‹œ์ง€๋ฅผ ๋ฐ›์•˜์Œ์„ ์ฆ๋ช…ํ•  ์ˆ˜ ์žˆ์Œ.

Data Confidentiality Service

  • Passive attack์œผ๋กœ๋ถ€ํ„ฐ ์ „์†ก๋œ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธ
  • ๊ฐ€์žฅ ๊ด‘๋ฒ”์œ„ํ•œ ์„œ๋น„์Šค๋Š” ์ผ์ • ๊ธฐ๊ฐ„ ๋™์•ˆ ๋‘ ์‚ฌ์šฉ์ž ๊ฐ„์— ์ „์†ก๋œ ๋ชจ๋“  ์‚ฌ์šฉ์ž ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธ
  • Connection confidentiality
    • ์—ฐ๊ฒฐ์ƒ์˜ ๋ชจ๋“  ์‚ฌ์šฉ์ž ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ
    • ํŠธ๋ž˜ํ”ฝ ํ๋ฆ„์ด ๋ถ„์„๋˜๋Š” ๊ฒƒ์„ ๋ณดํ˜ธ
    • ๊ณต๊ฒฉ์ž๊ฐ€ ํ†ต์‹  ์‹œ์„ค์—์„œ ํŠธ๋ž˜ํ”ฝ์˜ ์ถœ์ฒ˜, ๋ชฉ์ ์ง€, ๋นˆ๋„, ๊ธธ์ด ๋˜๋Š” ๊ธฐํƒ€ ํŠน์„ฑ์„ ๊ด€์ฐฐํ•  ์ˆ˜ ์—†์–ด์•ผ ํ•จ
  • Connectionless confidentiality
    • ๋‹จ์ผ ๋ฐ์ดํ„ฐ ๋ธ”๋ก ๋‚ด ๋ชจ๋“  ์‚ฌ์šฉ์ž ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ
  • Selective-field confidentiality
    • ์—ฐ๊ฒฐ ๋˜๋Š” ๋‹จ์ผ ๋ฐ์ดํ„ฐ ๋ธ”๋ก์˜ ์‚ฌ์šฉ์ž ๋ฐ์ดํ„ฐ ๋‚ด ์„ ํƒ๋œ ํ•„๋“œ์˜ ๊ธฐ๋ฐ€์„ฑ
  • Traffic-flow confidentiality
    • ํŠธ๋ž˜ํ”ฝ ํ๋ฆ„ ๊ด€์ฐฐ๋กœ๋ถ€ํ„ฐ ํŒŒ์ƒ๋  ์ˆ˜ ์žˆ๋Š” ์ •๋ณด์˜ ๋ณดํ˜ธ

Data Integrity Service

  • ๋ฉ”์‹œ์ง€ ์ŠคํŠธ๋ฆผ, ๋‹จ์ผ ๋ฉ”์‹œ์ง€ ๋˜๋Š” ๋ฉ”์‹œ์ง€ ๋‚ด ์„ ํƒ๋œ ํ•„๋“œ์— ์ ์šฉ๋  ์ˆ˜ ์žˆ์Œ.
  • Connectionless integrity service๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ ๋ฉ”์‹œ์ง€ ์ˆ˜์ •์— ๋Œ€ํ•œ ๋ณดํ˜ธ๋งŒ ์ œ๊ณต
  • Connection-oriented integrity service๋Š” ๋ฉ”์‹œ์ง€๊ฐ€ ๋ณต์ œ, ์‚ฝ์ž…, ์ˆ˜์ •, ์žฌ์ •๋ ฌ ๋˜๋Š” ์žฌ์ „์†ก ์—†์ด ์ „์†ก๋œ ๋Œ€๋กœ ์ˆ˜์‹ ๋จ์„ ๋ณด์žฅ
    • ๋ฐ์ดํ„ฐ ํŒŒ๊ดด๋„ ์ด ์„œ๋น„์Šค์— ํฌํ•จ๋จ
    • ๋ฉ”์‹œ์ง€ ์ŠคํŠธ๋ฆผ ์ˆ˜์ •๊ณผ ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๋‘˜ ๋‹ค๋ฅผ ๋‹ค๋ฃธ
    • ๋ณต๊ตฌ ๊ธฐ๋Šฅ์ด ์žˆ๋Š” ์„œ๋น„์Šค์™€ ์—†๋Š” ์„œ๋น„์Šค๋ฅผ ๊ตฌ๋ณ„ํ•  ํ•„์š”๊ฐ€ ์žˆ์Œ.
    • ์˜ˆ๋ฐฉ๋ณด๋‹ค๋Š” ํƒ์ง€์™€ ๊ด€๋ จ๋จ
    • ์ž๋™ํ™”๋œ ๋ณต๊ตฌ ๋ฉ”์ปค๋‹ˆ์ฆ˜์˜ ํ†ตํ•ฉ์ด ๋” ๋งค๋ ฅ์ ์ธ ๋Œ€์•ˆ

Availability Service

  • ์‹œ์Šคํ…œ์„ ๋ณดํ˜ธํ•˜์—ฌ ๊ฐ€์šฉ์„ฑ์„ ๋ณด์žฅํ•˜๋Š”, ์ ์ ˆํ•œ ์‘๋‹ต ์‹œ๊ฐ„์„ ์ œ๊ณตํ•˜๋Š” ์„œ๋น„์Šค
    • ์‹œ์Šคํ…œ ๋˜๋Š” ์‹œ์Šคํ…œ ์ž์›์ด ์Šน์ธ๋œ ์‹œ์Šคํ…œ ์—”ํ‹ฐํ‹ฐ์— ์˜ํ•ด ์‹œ์Šคํ…œ์˜ ์„ฑ๋Šฅ ์‚ฌ์–‘์— ๋”ฐ๋ผ ์š”๊ตฌ ์‹œ ์ ‘๊ทผ ๊ฐ€๋Šฅํ•˜๊ณ  ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•œ ์†์„ฑ์œผ๋กœ ์ •์˜๋จ
  • ๋‹ค์–‘ํ•œ ๊ณต๊ฒฉ์ด ๊ฐ€์šฉ์„ฑ์˜ ์ƒ์‹ค ๋˜๋Š” ๊ฐ์†Œ๋ฅผ ์ดˆ๋ž˜ํ•  ์ˆ˜ ์žˆ์Œ.
  • ์ด๋Ÿฌํ•œ ๊ณต๊ฒฉ ์ค‘ ์ผ๋ถ€๋Š” ์ธ์ฆ ๋ฐ ์•”ํ˜ธํ™”๋กœ ๋Œ€์‘ ๊ฐ€๋Šฅ
  • ์ผ๋ถ€ ๊ณต๊ฒฉ์€ ๊ฐ€์šฉ์„ฑ ์ƒ์‹ค์„ ๋ฐฉ์ง€ํ•˜๊ฑฐ๋‚˜ ๋ณต๊ตฌํ•˜๊ธฐ ์œ„ํ•ด ๋ฌผ๋ฆฌ์  ์กฐ์น˜๊ฐ€ ํ•„์š”
  • X.800์€ ๊ฐ€์šฉ์„ฑ์„ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ์„œ๋น„์Šค์™€ ์—ฐ๊ด€๋  ์†์„ฑ์œผ๋กœ ์ทจ๊ธ‰
  • ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ์œผ๋กœ ์ธํ•ด ๋ฐœ์ƒํ•˜๋Š” ๋ณด์•ˆ ์šฐ๋ ค๋ฅผ ๋‹ค๋ฃธ
  • ์‹œ์Šคํ…œ ์ž์›์˜ ์ ์ ˆํ•œ ๊ด€๋ฆฌ ๋ฐ ํ†ต์ œ์— ์˜์กด

X.800 Security Mechanisms

SPECIFIC SECURITY MECHANISMS(ํŠน์ • ๋ณด์•ˆ ๋ฉ”์ปค๋‹ˆ์ฆ˜)

  • OSI(Open Systems Interconnection) ๋ณด์•ˆ ์„œ๋น„์Šค ์ค‘ ์ผ๋ถ€๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ์ ์ ˆํ•œ ํ”„๋กœํ† ์ฝœ ๊ณ„์ธต์— ํ†ตํ•ฉ๋  ์ˆ˜ ์žˆ๋Š” ๋ฉ”์ปค๋‹ˆ์ฆ˜
  • Encipherment(์•”ํ˜ธํ™”)
    • ์ˆ˜ํ•™์  ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์‚ฌ์šฉํ•˜์—ฌ ๋ฐ์ดํ„ฐ๋ฅผ ์‰ฝ๊ฒŒ ์ฝ์„ ์ˆ˜ ์—†๋Š” ํ˜•ํƒœ๋กœ ๋ณ€ํ™˜
    • ๋ฐ์ดํ„ฐ์˜ ํ›„์† ๋ณต๊ตฌ๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ ํ•˜๋‚˜ ์ด์ƒ์˜ ์•”ํ˜ธํ™” ํ‚ค์— ์˜์กด
  • Digital Signature(๋””์ง€ํ„ธ ์„œ๋ช…)
    • ๋ฐ์ดํ„ฐ ๋‹จ์œ„์— ์ถ”๊ฐ€๋˜๊ฑฐ๋‚˜, ๋ฐ์ดํ„ฐ ๋‹จ์œ„์˜ ์•”ํ˜ธํ™” ๋ณ€ํ™˜์œผ๋กœ, ์ˆ˜์‹ ์ž๊ฐ€ ๋ฐ์ดํ„ฐ ๋‹จ์œ„์˜ ์ถœ์ฒ˜์™€ ๋ฌด๊ฒฐ์„ฑ์„ ์ฆ๋ช…ํ•˜๊ณ  ์œ„์กฐ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ๋ฐ์ดํ„ฐ
  • Access Control(์ ‘๊ทผ ์ œ์–ด)
    • ๋ฆฌ์†Œ์Šค์— ๋Œ€ํ•œ ์ ‘๊ทผ ๊ถŒํ•œ์„ ๊ฐ•์ œํ•˜๋Š” ๋‹ค์–‘ํ•œ ๋ฉ”์ปค๋‹ˆ์ฆ˜
  • Data Integrity(๋ฐ์ดํ„ฐ ๋ฌด๊ฒฐ์„ฑ)
    • ๋ฐ์ดํ„ฐ ๋‹จ์œ„ ๋˜๋Š” ๋ฐ์ดํ„ฐ ๋‹จ์œ„ ์ŠคํŠธ๋ฆผ์˜ ๋ฌด๊ฒฐ์„ฑ์„ ๋ณด์žฅํ•˜๋Š” ๋ฐ ์‚ฌ์šฉ๋˜๋Š” ๋‹ค์–‘ํ•œ ๋ฉ”์ปค๋‹ˆ์ฆ˜
  • Authentication Exchange(์ธ์ฆ ๊ตํ™˜)
    • ์ •๋ณด ๊ตํ™˜์„ ํ†ตํ•ด ๊ฐœ์ฒด์˜ ์‹ ์›์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•œ ๋ฉ”์ปค๋‹ˆ์ฆ˜
  • Traffic Padding(ํŠธ๋ž˜ํ”ฝ ํŒจ๋”ฉ)
    • ํŠธ๋ž˜ํ”ฝ ๋ถ„์„ ์‹œ๋„๋ฅผ ์ขŒ์ ˆ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ๋ฐ์ดํ„ฐ ์ŠคํŠธ๋ฆผ์˜ ๊ฐ„๊ฒฉ์— ๋น„ํŠธ๋ฅผ ์‚ฝ์ž…
  • Routing Control(๋ผ์šฐํŒ… ์ œ์–ด)
    • ํŠน์ • ๋ฐ์ดํ„ฐ์— ๋Œ€ํ•ด ๋ฌผ๋ฆฌ์ ์œผ๋กœ ์•ˆ์ „ํ•œ ํŠน์ • ๊ฒฝ๋กœ ์„ ํƒ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๊ณ , ํŠนํžˆ ๋ณด์•ˆ ์นจํ•ด๊ฐ€ ์˜์‹ฌ๋  ๋•Œ ๋ผ์šฐํŒ… ๋ณ€๊ฒฝ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•จ
  • Notarization(๊ณต์ฆ)
    • ๋ฐ์ดํ„ฐ ๊ตํ™˜์˜ ํŠน์ • ์†์„ฑ์„ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•ด ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ œ3์ž๋ฅผ ์‚ฌ์šฉ(๋‚ด์šฉ์ฆ๋ช…)

PERVASIVE SECURITY MECHANISMS(๋งŒ์—ฐํ•œ ๋ณด์•ˆ ๋ฉ”์ปค๋‹ˆ์ฆ˜)

  • ํŠน์ • OSI ๋ณด์•ˆ ์„œ๋น„์Šค ๋˜๋Š” ํ”„๋กœํ† ์ฝœ ๊ณ„์ธต์— ํŠน์ •๋˜์ง€ ์•Š์€ ๋ฉ”์ปค๋‹ˆ์ฆ˜
  • Trusted Functionality(์‹ ๋ขฐ๋œ ๊ธฐ๋Šฅ)
    • ๋ณด์•ˆ ์ •์ฑ…์— ์˜ํ•ด ์„ค์ •๋œ ๊ฒƒ๊ณผ ๊ฐ™์ด ํŠน์ • ๊ธฐ์ค€์— ๋”ฐ๋ผ ์˜ฌ๋ฐ”๋ฅธ ๊ฒƒ์œผ๋กœ ์ธ์‹๋˜๋Š” ๊ธฐ๋Šฅ
  • Security Label(๋ณด์•ˆ ๋ ˆ์ด๋ธ”)
    • ๋ฆฌ์†Œ์Šค์— ๋Œ€ํ•œ ๋งˆํ‚น์œผ๋กœ, ํ•ด๋‹น ๋ฆฌ์†Œ์Šค์˜ ๋ณด์•ˆ ์†์„ฑ์„ ๋ช…๋ช…ํ•˜๊ฑฐ๋‚˜ ์ง€์ •
  • Event Detection(์ด๋ฒคํŠธ ํƒ์ง€)
    • ๋ณด์•ˆ ๊ด€๋ จ ์ด๋ฒคํŠธ ํƒ์ง€
  • Security Audit Trail(๋ณด์•ˆ ๊ฐ์‚ฌ ์ถ”์ )
    • ๋ณด์•ˆ ๊ฐ์‚ฌ๋ฅผ ์šฉ์ดํ•˜๊ฒŒ ํ•˜๊ธฐ ์œ„ํ•ด ์ˆ˜์ง‘๋˜๊ณ  ์ž ์žฌ์ ์œผ๋กœ ์‚ฌ์šฉ๋˜๋Š” ๋ฐ์ดํ„ฐ๋กœ, ์‹œ์Šคํ…œ ๊ธฐ๋ก ๋ฐ ํ™œ๋™์˜ ๋…๋ฆฝ์ ์ธ ๊ฒ€ํ†  ๋ฐ ์กฐ์‚ฌ
  • Security Recovery(๋ณด์•ˆ ๋ณต๊ตฌ)
    • ์ด๋ฒคํŠธ ์ฒ˜๋ฆฌ ๋ฐ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ๊ณผ ๊ฐ™์€ ์š”์ฒญ์„ ์ฒ˜๋ฆฌํ•˜๊ณ  ๋ณต๊ตฌ ์กฐ์น˜๋ฅผ ์ˆ˜ํ–‰

Computer Security Strategy

  • Specification/policy
    • ๋ณด์•ˆ ์ฒด๊ณ„๊ฐ€ ๋ฌด์—‡์„ ํ•ด์•ผ ํ•˜๋Š”๊ฐ€?
  • Implementation/mechanisms
    • ์–ด๋–ป๊ฒŒ ๊ทธ๊ฒƒ์„ ํ•˜๋Š”๊ฐ€?
  • Correctness/assurance
    • ์ •๋ง๋กœ ์ž‘๋™ํ•˜๋Š”๊ฐ€?

Security Policy

  • ์‹œ์Šคํ…œ์ด๋‚˜ ์กฐ์ง์ด ๋ฏผ๊ฐํ•˜๊ณ  ์ค‘์š”ํ•œ ์‹œ์Šคํ…œ ์ž์›์„ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ๋ณด์•ˆ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๋ช…์‹œํ•˜๊ฑฐ๋‚˜ ๊ทœ์ œํ•˜๋Š” rule(๊ทœ์น™)๊ณผ practice(๊ด€ํ–‰)์˜ ๊ณต์‹์  ์„œ์ˆ 
  • ๊ณ ๋ คํ•ด์•ผ ํ•  ์š”์†Œ
    • ๋ณดํ˜ธ๋ฐ›๋Š” ์ž์‚ฐ์˜ ๊ฐ€์น˜
    • ์‹œ์Šคํ…œ์˜ ์ทจ์•ฝ์ 
    • ์ž ์žฌ์  ์œ„ํ˜‘ ๋ฐ ๊ณต๊ฒฉ ๊ฐ€๋Šฅ์„ฑ
  • ๊ณ ๋ คํ•ด์•ผ ํ•  trade-off
    • ์‚ฌ์šฉ ํŽธ์˜์„ฑ vs ๋ณด์•ˆ
    • ๋ณด์•ˆ ๋น„์šฉ vs ์‹คํŒจ, ๋ณต๊ตฌ ๋น„์šฉ

Security Implementation

  • ๋„ค ๊ฐ€์ง€ ์ƒํ˜ธ ๋ณด์™„์ ์ธ ์กฐ์น˜
    • ์•”ํ˜ธํ™” ํ‚ค์— ๋Œ€ํ•œ ๋ฌด๋‹จ ์ ‘๊ทผ ๋ฐฉ์ง€
  • Detection(ํƒ์ง€)
    • ์นจ์ž… ํƒ์ง€ ์‹œ์Šคํ…œ
    • ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ ํƒ์ง€
  • Response(๋Œ€์‘)
    • ํƒ์ง€ ์‹œ, ๊ณต๊ฒฉ์„ ์ค‘๋‹จ์‹œํ‚ค๊ณ  ์ถ”๊ฐ€ ํ”ผํ•ด๋ฅผ ๋ฐฉ์ง€ํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ
  • Recovery(๋ณต๊ตฌ)
    • ๋ฐฑ์—… ์‹œ์Šคํ…œ ์‚ฌ์šฉ
  • Prevention(์˜ˆ๋ฐฉ)
    • ์•ˆ์ „ํ•œ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜

Assurance and Evaluation

  • Assurance (= degree of confidence)
    • ๋ณด์•ˆ ์กฐ์น˜๊ฐ€ ์‹œ์Šคํ…œ๊ณผ ์ฒ˜๋ฆฌํ•˜๋Š” ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•ด ์˜๋„ํ•œ ๋Œ€๋กœ ์ž‘๋™ํ•œ๋‹ค๋Š” ์‹ ๋ขฐ์˜ ์ •๋„
    • ์‹œ์Šคํ…œ ์„ค๊ณ„์™€ ์‹œ์Šคํ…œ ๊ตฌํ˜„ ๋ชจ๋‘๋ฅผ ํฌํ•จ
    • Common Criteria (CC) ์ธ์ฆ ๋„์ž…, (์˜ˆ: S์‚ฌ์˜ ์Šค๋งˆํŠธ TV)
  • Evaluation (ํ‰๊ฐ€)
    • ํŠน์ • ๊ธฐ์ค€์— ๋”ฐ๋ผ ์ปดํ“จํ„ฐ ์ œํ’ˆ ๋˜๋Š” ์‹œ์Šคํ…œ์„ ๊ฒ€์‚ฌํ•˜๋Š” ๊ณผ์ •
    • ํ…Œ์ŠคํŠธ ๋ฐ ๊ณต์‹์ ์ธ ๋ถ„์„ ๋˜๋Š” ์ˆ˜ํ•™์  ๊ธฐ๋ฒ•์„ ํฌํ•จ
    • EAL 1~7 ์ •์˜๋˜์–ด ์žˆ์Œ.
      • 1~2(๊ฐ„๋‹จํ•œ ๋‹จ๊ณ„)๋Š” ๊ตญ์ œ์ ์œผ๋กœ ์ƒํ˜ธ ์ธ์ฆ
      • 3~4(source code)
      • 5~7(ํ™”๋ ฅ, ์›์ž๋ ฅ ๋ฐœ์ „์†Œ์˜ formal verification, ๊ณ ๋“ฑ๊ธ‰์˜ ์ˆ˜ํ•™์  ์ธ์ฆ, ์ฆ๋ช…)

Summary

  • Security concepts
    • CIA triad
    • Confidentiality โ€“ ์ •๋ณด ๊ณต๊ฐœ ๋ณด์กด
    • Integrity โ€“ ์ •๋ณด์˜ ์ˆ˜์ • ๋˜๋Š” ํŒŒ๊ดด๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธ
    • Availability โ€“ ์ •๋ณด์— ๋Œ€ํ•œ ์‹œ๊ธฐ์ ์ ˆํ•˜๊ณ  ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” ์ ‘๊ทผ ๋ณด์žฅ
  • Terminology โ€“ Table 1.1
    • Threats โ€“ ์ทจ์•ฝ์ ์„ ์•…์šฉ
    • Attack โ€“ ์‹คํ–‰๋œ ์œ„ํ˜‘
    • Countermeasure โ€“ ๋ณด์•ˆ ๊ณต๊ฒฉ์— ๋Œ€์ฒ˜ํ•˜๋Š” ์ˆ˜๋‹จ
    • Assets โ€“ ํ•˜๋“œ์›จ์–ด, ์†Œํ”„ํŠธ์›จ์–ด, ๋ฐ์ดํ„ฐ, ํ†ต์‹  ํšŒ์„ , ๋„คํŠธ์›Œํฌ
  • Security architecture
    • Security services โ€“ ์‹œ์Šคํ…œ ๋ฐ ์ •๋ณด ์ „์†ก์˜ ๋ณด์•ˆ์„ ๊ฐ•ํ™”, Table 1.5
    • Security mechanisms โ€“ ๋ณด์•ˆ ๊ณต๊ฒฉ์„ ํƒ์ง€, ์˜ˆ๋ฐฉ ๋˜๋Š” ๋ณต๊ตฌํ•˜๋„๋ก ์„ค๊ณ„๋œ ๋ฉ”์ปค๋‹ˆ์ฆ˜, Table 1.6
    • Security attack โ€“ ์กฐ์ง์ด ์†Œ์œ ํ•œ ์ •๋ณด์˜ ๋ณด์•ˆ์„ ์นจํ•ดํ•˜๋Š” ๋ชจ๋“  ํ–‰์œ„
  • Security strategy
    • ์ •์ฑ…, ๊ตฌํ˜„, ๋ณด์ฆ ๋ฐ ํ‰๊ฐ€
์ตœ๊ทผ ์ˆ˜์ •: 25. 11. 6. ์˜คํ›„ 12:07
Contributors: kmbzn
Next
02. ์ •๋ณด๋ณด์•ˆ์ •์ฑ… ๋ฐ ๋ฒ•๊ทœ

BUILT WITH

CloudflareNode.jsGitHubGitVue.jsJavaScriptVSCodenpm

All trademarks and logos are property of their respective owners.
ยฉ 2025 kmbzn ยท MIT License