차이
문서의 선택한 두 판 사이의 차이를 보여줍니다.
양쪽 이전 판이전 판다음 판 | 이전 판 | ||
sec_architecture [2015/05/04 09:47] – hsshim | sec_architecture [2024/04/04 05:12] (현재) – 바깥 편집 127.0.0.1 | ||
---|---|---|---|
줄 1: | 줄 1: | ||
+ | ==== Network Security Architecture ==== | ||
+ | * [[Network Security Architecture Design]] \\ | ||
+ | * [[안전한 정보통신 환경구현을 위한 네트워크 구축가이드]] \\ | ||
+ | |||
==== Security Architecture List ==== | ==== Security Architecture List ==== | ||
- | * [[VPN Security Architecture|VPN Security Architecture]] \\ | + | |
- | * [[Client | + | * [[Server Farm Security Architecture]] \\ |
- | * [[Server | + | * [[Data Center |
- | * [[Wireless-Private Network Security Architecture]] \\ | + | * [[Wireless-Private Network Security Architecture]] \\ |
- | * [[Wireless-Public Hotspot Security Architecture]] \\ | + | * [[Wireless-Public Hotspot Security Architecture]] \\ |
- | * [[Public Web Server | + | * [[Public Web Zone Security Architecture]] \\ |
- | * [[DMZ Security Architecture]] \\ | + | * [[DMZ Security Architecture]] \\ |
- | * [[Industrial Control System | + | * [[Monitoring and Detection Zone Security Architecture]] \\ |
- | * [[Monitoring and Detection | + | * [[Branch Network |
- | * [[Backbone Network Security Architecture]] \\ | + | * [[Distribution Network Security Architecture]] \\ |
- | * [[Intranet | + | |
- | * [[Internet Zone Security Architecture]] \\ | + | * [[Intranet Security Architecture]] \\ |
- | * [[Branch Zone Security Architecture]] \\ | + | * [[Internet Zone Security Architecture]] \\ |
+ | * [[CCTV System | ||
+ | * [[Call Center Security Architecture]] \\ | ||
+ | * [[VoIP System Security Architecture]] \\ | ||
+ | * [[Industrial Control System Security Architecture]] \\ | ||
+ | |||
+ | ==== Threat List ==== | ||
+ | * [[Service disruption - Dos and DDoS]] \\ | ||
+ | * [[Unauthorized access]] \\ | ||
+ | * [[Data disclosure and modification]] \\ | ||
+ | * [[Data loss]] \\ | ||
+ | * [[Network abuse]] \\ | ||
+ | * [[Date leak]] \\ | ||
+ | * [[Identity theft and fraud]] \\ | ||
+ | * [[Web-based phishing]] \\ | ||
+ | * [[Virus, Spyware, Malware and adware]] \\ | ||
+ | * [[Network intrusion and takeover]] \\ | ||
+ | * [[E-mail spam and virus]] \\ | ||
+ | * [[Application-layer attacks]] \\ | ||
+ | |||
+ | |||
+ | |||
+ | ==== Control Group List ==== | ||
+ | * [[AC- Access Control Group]] \\ | ||
+ | * [[AT- Awareness And Training Group]] \\ | ||
+ | * [[AU- Audit And Accountability Group]] \\ | ||
+ | * [[CA- Certification, | ||
+ | * [[CM- Configuration Management Group]] \\ | ||
+ | * [[CP- Contingency Planning Group]] \\ | ||
+ | * [[IA- Identification and Authentication Group]] \\ | ||
+ | * [[IR- Incident Response Group]] \\ | ||
+ | * [[MA- Maintenance Group]] \\ | ||
+ | * [[MP- Media Protection Group]] \\ | ||
+ | * [[PE- Physical and Environmental Protection Group]] \\ | ||
+ | * [[PL- Planning Group]] \\ | ||
+ | * [[PS- Personnel Security Group]] \\ | ||
+ | * [[RA- Risk Assessment Group]] \\ | ||
+ | * [[SA- System and Services Acquisition Group]] \\ | ||
+ | * [[SC- System and Communication Protection Group]] \\ | ||
+ | * [[SI- System and Information Integrity Group]] \\ | ||
+ | ==== Actor List ==== | ||
+ | ^ | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | |