문서의 이전 판입니다!
Security Architecture List
* VPN Security Architecture
* Client Security Architecture
* Server Security Architecture
* Serverfarm Security Architecture
* Data Center Security Architecture
* Wireless-Private Network Security Architecture
* Wireless-Public Hotspot Security Architecture
* Public Web Server Security Architecture
* DMZ Security Architecture
* Industrial Control System Security Architecture
* Monitoring and Detection Security Architecture
* Backbone Network Security Architecture
* Intranet Zone Security Architecture
* Internet Zone Security Architecture
* Branch Zone Security Architecture
* CCTV System Security Architecture
* Call Center Security Architecture
* VoIP System Security Architecture
Threat List
* Service disruption - Dos and DDoS
* Unauthorized access
* Data disclosure and modification
* Data loss
* Network abuse
* Date leak
* Identity theft and fraud
* Web-based phishing
* Virus, Spyware, Malware and adware
* Network intrusion and takeover
* E-mail spam and virus
* Application-layer attacks
Control List
* AC-01 Access Control Policies and Procedures
* AC-02 Account Management
* AC-03 Access Enforcement
* AC-04 Information Flow Enforcement
* AC-05 Separation Of Duties
* AC-06 Least Privilege
* AC-07 Unsuccessful Login Attempts
* AC-08 System Use Notification
* AC-09 Previous Logon Notification
* AC-10 Concurrent Session Control
* AC-11 Session Lock
* AC-12 Session Termination