차이
문서의 선택한 두 판 사이의 차이를 보여줍니다.
양쪽 이전 판이전 판다음 판 | 이전 판 | ||
sec_architecture [2015/05/04 10:11] – hsshim | sec_architecture [2024/04/04 05:12] (현재) – 바깥 편집 127.0.0.1 | ||
---|---|---|---|
줄 1: | 줄 1: | ||
+ | ==== Network Security Architecture ==== | ||
+ | * [[Network Security Architecture Design]] \\ | ||
+ | * [[안전한 정보통신 환경구현을 위한 네트워크 구축가이드]] \\ | ||
+ | |||
==== Security Architecture List ==== | ==== Security Architecture List ==== | ||
- | * [[VPN Security Architecture|VPN Security Architecture]] \\ | + | |
- | * [[Client Security Architecture]] \\ | + | * [[Server |
- | * [[Server Security Architecture]] \\ | + | * [[Data Center Security Architecture]] \\ |
- | * [[Serverfarm Security Architecture]] \\ | + | * [[Wireless-Private Network Security Architecture]] \\ |
- | * [[Data Center Security Architecture]] \\ | + | * [[Wireless-Public Hotspot Security Architecture]] \\ |
- | * [[Wireless-Private Network Security Architecture]] \\ | + | * [[Public Web Zone Security Architecture]] \\ |
- | * [[Wireless-Public Hotspot Security Architecture]] \\ | + | * [[DMZ Security Architecture]] \\ |
- | * [[Public Web Server | + | * [[Monitoring and Detection Zone Security Architecture]] \\ |
- | * [[DMZ Security Architecture]] \\ | + | * [[Branch Network |
- | * [[Industrial Control System | + | * [[Distribution |
- | * [[Monitoring and Detection | + | * [[Backbone Network |
- | * [[Backbone | + | * [[Intranet |
- | * [[Intranet Zone Security Architecture]] \\ | + | * [[Internet |
- | * [[Internet Zone Security Architecture]] \\ | + | * [[CCTV System Security Architecture]] \\ |
- | * [[Branch | + | * [[Call Center Security Architecture]] \\ |
- | * [[CCTV System Security Architecture]] \\ | + | * [[VoIP System Security Architecture]] \\ |
- | * [[Call Center Security Architecture]] \\ | + | * [[Industrial Control System Security Architecture]] \\ |
- | * [[VoIP System Security Architecture]] \\ | + | |
==== Threat List ==== | ==== Threat List ==== | ||
- | * [[Service disruption - Dos and DDoS]] \\ | + | |
- | * [[Unauthorized access]] \\ | + | * [[Unauthorized access]] \\ |
- | * [[Data disclosure and modification]] \\ | + | * [[Data disclosure and modification]] \\ |
- | * [[Data loss]] \\ | + | * [[Data loss]] \\ |
- | * [[Network abuse]] \\ | + | * [[Network abuse]] \\ |
- | * [[Date leak]] \\ | + | * [[Date leak]] \\ |
- | * [[Identity theft and fraud]] \\ | + | * [[Identity theft and fraud]] \\ |
+ | * [[Web-based phishing]] \\ | ||
+ | * [[Virus, Spyware, Malware and adware]] \\ | ||
+ | * [[Network intrusion and takeover]] \\ | ||
+ | * [[E-mail spam and virus]] \\ | ||
+ | * [[Application-layer attacks]] \\ | ||
+ | |||
+ | |||
+ | |||
+ | ==== Control Group List ==== | ||
+ | * [[AC- Access Control Group]] \\ | ||
+ | * [[AT- Awareness And Training Group]] \\ | ||
+ | * [[AU- Audit And Accountability Group]] \\ | ||
+ | * [[CA- Certification, | ||
+ | * [[CM- Configuration Management Group]] \\ | ||
+ | * [[CP- Contingency Planning Group]] \\ | ||
+ | * [[IA- Identification and Authentication Group]] \\ | ||
+ | * [[IR- Incident Response Group]] \\ | ||
+ | * [[MA- Maintenance Group]] \\ | ||
+ | * [[MP- Media Protection Group]] \\ | ||
+ | * [[PE- Physical and Environmental Protection Group]] \\ | ||
+ | * [[PL- Planning Group]] \\ | ||
+ | * [[PS- Personnel Security Group]] \\ | ||
+ | * [[RA- Risk Assessment Group]] \\ | ||
+ | * [[SA- System and Services Acquisition Group]] \\ | ||
+ | * [[SC- System and Communication Protection Group]] \\ | ||
+ | * [[SI- System and Information Integrity Group]] \\ | ||
+ | ==== Actor List ==== | ||
+ | ^ | ||
+ | | | ||
+ | | | ||
+ | | | ||
+ | | |