ÀÌ Ã¥ÀÇ ºÐ¾ß
°ø¹«¿ø > ±â¼úÁ÷ > Àü»êÁ÷
Ã¥ ¼Ò°³
-1. ³»¿ëÀº Å©°Ô Á¤º¸º¸È£ÀÇ °³¿ä, Á¤º¸º¸È£ °ü¸®Ã¼°è, ¾ÏÈ£È, ³×Æ®¿öÅ© º¸¾È, ½Ã½ºÅÛ º¸¾È, °ü·Ã ¹ý±Ô·Î ³ª´©¾î ±¸¼ºÇÏ¿´´Ù.
2. °¢ ´Ü¿øÀº ÃâÁ¦±âÁØ¿¡ ¸Â°Ô ÇÊ¿äÇÑ ³»¿ë¸¸À» ¾ö¼±ÇÏ¿© ¿¹»ó¹®Á¦¿Í ÇÔ²² ¼ö·ÏÇÏ¿´´Ù. 3. ³»¿ë¿¡ ´ëÇÑ ÀÌÇصµ¸¦ ³ôÀ̱â À§ÇØ µµÇ¥¿Í ±×¸²À» Ãß°¡ÇÏ¿´´Ù. 4. IT»ê¾÷ÀÇ ±Þ¼ÓÇÑ ¹ßÀü°ú ¸ð¹ÙÀÏ ÄÄÇ»Æà ȯ°æÀÇ º¯È·Î µîÀåÇÑ »õ·Î¿î ¡¸IT ¿ë¾î¡¹¸¦ Á¤¸®ÇÏ¿© Ãß°¡ÇÏ¿´´Ù. µµ¼ ¸ñÂ÷
-Chapter 01 Á¤º¸º¸È£ÀÇ °³¿ä
01 Á¤º¸º¸È£(Information Security)ÀÇ °³³ä 02 Á¤º¸º¸È£ÀÇ ¼Ó¼º 03 Á¤º¸º¸È£ÀÇ ¸ñÇ¥ 04 º¸È£¿ä¼Ò 05 º¸È£¿øÄ¢°ú Ç¥ÁØ ±âÃâ¹®Á¦ ÀûÁß¿¹»ó¹®Á¦ Chapter 02 Á¤º¸º¸È£ °ü¸®Ã¼°è 01 Á¤º¸º¸È£ °ü¸®Ã¼°è(Information Security Management System) 02 À§Çè°ü¸®(Risk Management) 03 Á¤º¸º¸È£Á¤Ã¥ 04 Á¤º¸º¸È£ ´ëÃ¥±¸Çö ¹× ¿î¿µ 05 ¾÷¹« ¿¬¼Ó¼º °ü¸® 06 °ü·Ã Ç¥ÁØ ¹× Áöħ ±âÃâ¹®Á¦ ÀûÁß¿¹»ó¹®Á¦ Chapter 03 ¾ÏÈ£È(Encryption) 01 ¾ÏÈ£ÀÇ °³³ä 02 ¾ÏÈ£ ÀÌ¿ëÀÇ ¸ñÀû 03 ¾ÏÈ£ °ø°Ý ¹æ½Ä 04 ¾ÏÈ£ÀÇ ¿î¿ë ¹æ¹ý 05 °øÅëÅ° ¾ÏÈ£ ¹æ½Ä 06 °ø°³Å° ¾ÏÈ£ ¹æ½Ä 07 Å° °ü¸®¿Í ÀÎÁõ 08 Çؽ¬ÇÔ¼ö(hash function) 09 ÀüÀÚ¼¸í(Digital Signature) ±âÃâ¹®Á¦ ÀûÁß¿¹»ó¹®Á¦ Chapter 04 ³×Æ®¿öÅ© º¸¾È 01 ³×Æ®¿öÅ© ÀÏ¹Ý ±âÃâ¹®Á¦ 02 ³×Æ®¿öÅ© È°¿ë ±âÃâ¹®Á¦ 03 ³×Æ®¿öÅ© ±â¹Ý °ø°Ý ±âÃâ¹®Á¦ 04 ³×Æ®¿öÅ© Àåºñ¸¦ ÀÌ¿ëÇÑ º¸¾È±â¼ú ±âÃâ¹®Á¦ ÀûÁß¿¹»ó¹®Á¦ Chapter 05 ½Ã½ºÅÛ º¸¾È 01 ¿î¿µÃ¼Á¦ ±âÃâ¹®Á¦ 02 Ŭ¶óÀ̾ðÆ® º¸¾È ±âÃâ¹®Á¦ 03 ¼¹ö º¸¾È ±âÃâ¹®Á¦ 04 ÀÎÅÍ³Ý ÀÀ¿ë º¸¾È ±âÃâ¹®Á¦ 05 ÀüÀÚ»ó°Å·¡ º¸¾È ±âÃâ¹®Á¦ 06 ±âŸ ¾îÇø®ÄÉÀÌ¼Ç º¸¾È ±âÃâ¹®Á¦ ÀûÁß¿¹»ó¹®Á¦ Chapter 06 °ü·Ã¹ý±Ô 01 Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü 02 °³ÀÎÁ¤º¸ º¸È£¹ý 03 Á¤º¸Åë½Å±â¹Ý º¸È£¹ý 04 ÀüÀÚ¼¸í¹ý 05 ÀüÀÚ¹®¼ ¹× ÀüÀÚ°Å·¡ ±âº»¹ý 06 ±¹°¡Á¤º¸È ±âº»¹ý ±âÃâ¹®Á¦ ÀûÁß¿¹»ó¹®Á¦ ºÎ ·Ï IT¿ë¾î ¹× ±âÃâ¹®Á¦ ¹è¼Û/±³È¯/¹ÝÇ°
|
|