목차
Network Security Architecture
Security Architecture List
Threat List
Control Group List
Actor List
Network Security Architecture
SAFE Design Blueprint
안전한 정보통신 환경 구현을 위한 네트워크 구축 가이드라인
Security Architecture List
VPN Security Architecture
Server Farm Security Architecture
Data Center Security Architecture
Wireless-Private Network Security Architecture
Wireless-Public Hotspot Security Architecture
Public Web Zone Security Architecture
DMZ Security Architecture
Monitoring and Detection Zone Security Architecture
Branch Network Security Architecture
Distribution Network Security Architecture
Backbone Network Security Architecture
Intranet Security Architecture
Internet Zone Security Architecture
CCTV System Security Architecture
Call Center Security Architecture
VoIP System Security Architecture
Industrial Control System Security Architecture
Threat List
Service disruption - Dos and DDoS
Unauthorized access
Data disclosure and modification
Data loss
Network abuse
Date leak
Identity theft and fraud
Web-based phishing
Virus, Spyware, Malware and adware
Network intrusion and takeover
E-mail spam and virus
Application-layer attacks
Control Group List
AC- Access Control Group
AT- Awareness And Training Group
AU- Audit And Accountability Group
CA- Certification, Accreditation And Security Assessments Group
CM- Configuration Management Group
CP- Contingency Planning Group
IA- Identification and Authentication Group
IR- Incident Response Group
MA- Maintenance Group
MP- Media Protection Group
PE- Physical and Environmental Protection Group
PL- Planning Group
PS- Personnel Security Group
RA- Risk Assessment Group
SA- System and Services Acquisition Group
SC- System and Communication Protection Group
SI- System and Information Integrity Group
Actor List
Actor
역할
보안관제
IDS와 IPS 등 보안모니터링 시스템 관제
장비관리자
Router, Switch, Server 관리 및 운영
계정관리자
시스템 계정권한 관리
사용자
사내 또는 사외 시스템 사용자