³¯Â¥ |
±³À°³»¿ë(½Ã°£) |
1ÀÏÂ÷
(6/18) |
o ÀüÀÚ¼¸í¹ýÁ¦
-ÀüÀÚ¼¸í¹ý, ½ÃÇà·É, ½ÃÇà±ÔÄ¢ |
o°øÀÎÀÎÁõ¼ ÀÎÁõ¼Á¤Ã¥
- °øÀÎÀÎÁõ¼ ÀÎÁõ¼Á¤Ã¥ ÇöȲ
- °øÀÎÀÎÁõ¾÷¹«ÁØÄ¢ ÀÛ¼ºÇ¥ÁØ |
o ±¹°¡º° ÀüÀÚÀÎÁõü°è µ¿Çâ
- ±¹¿Ü ÀüÀÚÀÎÁõ Á¤Ã¥ ¹× ÀüÀÚÀÎÁõü°è ±¸ÃàÇöȲ
- ÀüÀÚÀÎÁõ°¡À̵å¶óÀÎ °³¹ßÇöȲ |
oPKI º¸¾È°¨»ç
- Á¤±âÁ¡°Ë ¹× PAG(PKI Assessment Guideline)
- ISO27001 º¸¾È°¨»ç |
2ÀÏÂ÷
(6/19) |
oÀüÀÚ¼¸í ¾Ë°í¸®Áò
- ¾Ë°í¸®Áò, ¾ÈÀüµµ ¹× ÆĶó¹ÌÅÍ ¼±Åà µî |
oPKI 񃬣 I
- ASN.1 ¹× Encoding Rule |
- PKCS ½Ã¸®Áî(1, 3, 5, 6, 7, 8, 9. 10, 11, 12, 15) |
3ÀÏÂ÷
(6/20) |
o PKI 񃬣 II
- ÀÎÁõ¼ ¹× CRL ÇÁ·ÎÆÄÀÏ
- ÀÎÁõ¼ °ËÁõ(°ËÁõ¾Ë°í¸®Áò, OCSP µî)
- ÀÎÁõ¼ ¿äûÇü½Ä µî °ü¸®ÇÁ·ÎÅäÄÝ |
o PKI ±â¼ú¥²
- ÀÎÁõ¼ ¹× CRL °ø°í(X.500, LDAP µî)
- Root CA ½Å·Ú, º»ÀÎÈ®ÀÎ,
°øÀÎÀÎÁõ¼ Ç¥½Ã, CTL µî |
oPKI ÀÀ¿ë ±â¼ú I
-ÀÎÁõ¼¸¦ ÀÌ¿ëÇÑ º¸¾È¼¹ö, Äڵ弸í
(ActiveX, Applet µî) ±¸Ãà¹æ¹ý ¹× ÀýÂ÷ |
4ÀÏÂ÷
(6/21) |
oPKI ÀÀ¿ë ±â¼ú II
- À¯ºñÄõÅͽº ȯ°æ¿¡¼ÀÇ È¨³×Æ®¿öÅ©,
µð¹ÙÀ̽º ÀÎÁõÀ» À§ÇÑ Àû¿ë±â¼ú |
o ÀüÀÚ¼¸íÅ° °ü¸®±â¼ú
- º¸¾ÈÅäÅ« ±â¹Ý °øÀÎÀÎÁõ¼ ÀÌ¿ë,ÀúÀå ±â¼ú
- ¹«¼±´Ü¸»±â¿¡¼ÀÇ °øÀÎÀÎÁõ¼ ÀÌ¿ë,ÀúÀå,Àü¼Û ±â¼ú |
o ¾ÏȣŰºÐ¹èÀÎÁõ¼ °ü¸®
- ¾ÏȣŰºÐ¹èÀÎÁõ¼ °ü¸®Áöħ
- ¾ÏȣŰ ¹é¾÷ ¹× º¹±¸ |
o½Ã½ºÅÛ․³×Æ®¿öÅ© °ü¸®±â¼ú
- ½Ã½ºÅÛ․³×Æ®¿öÅ© °ü¸®ÀϹÝ
- ½Ã½ºÅÛ ±¸¼º ¹× °ü¸® ±â¼ú |
5ÀÏÂ÷
(6/22) |
oÇØÅ· ¹× ħÇØ»ç°í ´ëÀÀ
- DDoS, ÇǽÌ, ÆÄ¹Ö µî ÃֽŠº¸¾È»ç°í µ¿Çâ
- ¶ó¿ìÅÍ, ħÀÔÂ÷´Ü ¹× ŽÁö µî ´ëÀÀ¹æ¾È
- ħÇØ»ç°í ´ëÀÀÇÁ·Î¼¼½º ¼Ò°³ |
o ¹°¸®Àû º¸¾È ¹× ÀçÇغ¹±¸
- ´Ù´Ü°è ¹°¸®Àû Á¢±ÙÅëÁ¦
- ºñ»ó°èȹ ¹× ¹é¾÷¹æ¾È
- ÀçÇØ ½Ã º¹±¸¹æ¾È |