Home > Àüü±â»ç

[±Û·Î¹ú ´º½º Ŭ¸®ÇÎ] ¡°¿À¹Ù¸¶ ´ëÅë·É º¸¾È¹®Á¦ Á÷Á¢ °³ÀÔ¡± èâ

ÀÔ·Â : 2014-10-21 09:49
ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

¸ÅÀÏ ¾Æħ ¾÷µ¥ÀÌÆ® µÇ´Â ÇØ¿Ü ¼Ò½Ä ¸ðÀ½

Å°¿öµå : ¿À¹Ù¸¶ ´ëÅë·É, ÇɾØĨ, ÇÁ¶óÀ̹ö½Ã, FIRST¿Í ±¹Á¦ Ç¥ÁØ


[º¸¾È´º½º ¹®°¡¿ë] ¹Ì±¹¿¡¼­ PoS°¡ ÀÚ²Ù¸¸ ¹®Á¦¸¦ ÀÏÀ¸Å²´Ù Çß´õ´Ï ¿À¹Ù¸¶ ´ëÅë·ÉÀÌ ³ª¼¹½À´Ï´Ù. °áÁ¦ ½Ã½ºÅÛ ÀÚü¸¦ ¹Ù²Ù¶ó´Â °ÍÀε¥ ¾ÖÇà ÆäÀÌ¿Í ¸Â¹°¸®´Â ½ÃÁ¡À̶ó Èï¹Ì·Ó½À´Ï´Ù. ±×·¯³ª ¿À´ÃÀÇ °¡Àå Å« È­µÎ´Â ÇÁ¶óÀ̹ö½Ã ¹®Á¦³×¿ä. ¾ÖÇÿ¡¼­ºÎÅÍ À§½ºÆÛ, ÀØÇôÁú ±Ç¸®±îÁö ´Ù¾çÇÑ »ç°í°¡ ÅÍÁö°í ¿©·¯ °¡Áö À̾߱Ⱑ ¿À°¡°í ÀÖ½À´Ï´Ù. ¸¶Ä¡ Çѱ¹ÀÌ ¿äÁò Ä«ÅåÀ¸·Î ½Ã²ô·¯¿î °É ÇØ¿Ü ±âÀÚµéÀÌ ¾Æ´Â °Í °°Àº Àý¹¦ÇÑ Å¸À̹ÖÀÔ´Ï´Ù.


1. »ê¾÷ Á¦¾î ½Ã½ºÅÛÀ» °ü¸®ÇÏ´Â FDT / DTM¿¡¼­ Ä¡¸íÀûÀÎ Ãë¾àÁ¡ ¹ß°ß(Security Week)

http://www.securityweek.com/dtm-component-vulnerabilities-expose-critical-control-systems-cyberattacks

»ê¾÷ ÇöÀå¿¡¼­ »ç¿ëµÇ´Â ¼ö¸¹Àº ±â±âµéÀ» ÅëÁ¦Çϱâ À§ÇØ °í¾ÈµÈ FDT¿Í DTM¿¡¼­ DoS, XML ÀÎÁ§¼Ç, ¿ø°Ý ÄÚµå ½ÇÇà µîÀÇ Ä¡¸íÀûÀÎ Ãë¾àÁ¡ÀÌ ¹ß°ßµÇ¾ú´Ù°í ÇÕ´Ï´Ù.


2. EFF¿Í ½º³ë¿ìµç, FBIÀÇ ¡®°­·ÂÇÑ ¾Ïȣȭ ¹Ý´ë¡¯ ÀÔÀå °ø°Ý(Threat Post)

http://threatpost.com/eff-snowden-dispute-fbi-claims-on-device-encryption/108931

FBI´Â °³ÀÎÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ Á¸ÁßÇÏ°í ÁöÄÑ¾ß ÇÑ´Ù´Â µ¥¿¡ µ¿ÀÇÇÏÁö¸¸ °­·ÂÇÑ ¾Ïȣȭ ¼ÒÇÁÆ®¿þ¾î´Â ¹üÁËÀÚµéÀÇ °Ë°Å¸¦ ¹æÇØÇÑ´Ù´Â ÁÖÀåÀ» °è¼ÓÇؼ­ ÇØ¿Ô½À´Ï´Ù. ÀÌ¿¡ ´ëÇØ ÀüÀÚÇÁ·±Æ¼¾îÀç´Ü°ú ½º³ë¿ìµçÀÌ ¹Ý¹Ú¿¡ ³ª¼¹´Âµ¥¿ä, ¿äÁò Çѱ¹ÀÇ Ä«Åå »çÅÂ¿Í ¸Â¹°·Á¼­ÀÎÁö Èï¹Ì·Ó½À´Ï´Ù. ÇÁ¶óÀ̹ö½Ã ³íÀïÀº ¾ðÁ¦³ª ´äÀ» ãÀ» ¼ö ÀÖÀ»±î¿ä?


3. ¿À¹Ù¸¶ ´ëÅë·É Ĩ¾ØÇÉ °áÁ¦ ¹æ½Ä µµÀÔ ¸í·É(Threat Post)

http://threatpost.com/obama-executive-order-forces-chip-pin-payment-on-government/108936

¹Ì±¹¿¡¼­´Â ÃÖ±Ù POS ½Ã½ºÅÛÀÌ ÀÚ²Ù¸¸ °ø°ÝÀ» ¹Þ¾Ò½À´Ï´Ù. Ÿ±ê, Ȩµ¥Æ÷ µî Àß ¾Ë·ÁÁø ´ë±Ô¸ð À¯Ãâ »ç°í¸¦ ºñ·ÔÇؼ­ Çѱ¹ÀεéÀº Á¢Çϱâ Èûµç ¾÷ü¿¡¼­µµ »ó´ç ¼ö °ø°ÝÀÌ ÀÖ¾úÁö¿ä. ÀÌ¿¡ ´ëÇÑ ´ëÃ¥À¸·Î ¿À¹Ù¸¶ ´ëÅë·ÉÀÌ µåµð¾î ¸í·ÉÀ» ¶ç¿ü³×¿ä. Ĩ ¾Ø ÇÉ, ȤÀº EMV¶ó°í Çؼ­ ÄÄÇ»ÅÍ Ä¨À» Ä«µå¿¡ »ðÀÔÇÏ¿© »ç¿ëÀÚ°¡ °áÁ¦ ½Ã ½Äº° Äڵ带 Á÷Á¢ ÀÔ·ÂÇÏ´Â ½Ã½ºÅÛÀ» µµÀÔÇ϶ó´Â ³»¿ëÀÔ´Ï´Ù. ¾ÖÇà °áÁ¦ÀÇ ½ÃÀÛÀÌ ÄÚ¾ÕÀε¥, ¾î¶² °á°ú°¡ ³ª¿ÃÁö ±Ã±ÝÇÕ´Ï´Ù.


4. »õ·Î¿î OS X ¿î¿µÃ¼Á¦ÀÎ ¿ä¼¼¹ÌƼ, ÇÁ¶óÀ̹ö½Ã ¹®Á¦ ½É°¢(Threat Post)

http://threatpost.com/privacy-criticism-hits-osx-yosemite-over-location-data/108928

¾ÖÇÃÀÇ ÃÖ±Ù ¿î¿µÃ¼Á¦ÀÎ ¿ä¼¼¹ÌƼ°¡ À§Ä¡ Á¤º¸¸¦ ¾ÖÇÿ¡ Àü¼ÛÇÑ´Ù´Â °Ô ¹àÇôÁö¸é¼­ »ç¿ëÀÚµéÀÇ Ç×ÀÇ°¡ °Å¼¼°Ô ÀÏ°í ÀÖ½À´Ï´Ù. ±âÀÚµµ ¸¶Ä§ ¾îÁ¦ Áý¿¡¼­ ¾²´Â ³°Àº ¸ÆºÏ¿¡ ¿ä¼¼¹ÌƼ¸¦ ±ò·Á´Ù°¡ ¾ÖÇà ¾ÏÈ£°¡ ±â¾ï³ªÁö ¾Ê¾Æ¼­ ½ÇÆÐÇߴµ¥, Á» ´õ ÁöÄѺÁ¾ß°Ú½À´Ï´Ù.


5. FIRST, CERTÀÇ °¢Á¾ Ç¥ÁØ Á¤¸®¿¡ ³ª¼­(The Register)

http://www.theregister.co.uk/2014/10/20/first_standards_to_clean_up_messy_certs/

»ç°Ç ´ëÀÀ ¹× º¸¾È ÆÀ Æ÷·³(Forum of Incident Response and Security Teams, FIRST)ÀÌ ¼¼°è Ç¥ÁØÀ» ¸ð¾Æ¼­ Á¤¸®ÇÏ°í Çõ½ÅÇÏ°Ú´Ù°í ³ª¼¹°í, ¿©·¯ ±¹°¡ÀÇ CERT¿¡¼­ À̸¦ Áö¿øÇÏ°Ú´Ù°í Çß½À´Ï´Ù. ¶ÇÇÑ 5½Ê¸¸ ´Þ·¯³ª ¿©±â¿¡ ÅõÀڵȴٰí Çϳ׿ä. ±Û½ê¿ä, Á¤º¸ º¸¾ÈÀ̶õ °Ô °¢ ±¹°¡ÀÇ »çÁ¤¿¡ µû¶ó ¹Î°¨ÇÏ°Ô ´Þ¶óÁö´Â °Çµ¥ ÀÌ°É Çϳª·Î Ç¥ÁØÈ­½ÃÅ°´Â °Ô ¾ó¸¶³ª À¯¿ëÇÒ Áö ¸ð¸£°Ú½À´Ï´Ù.


6. ´ëÅë·ÉÀÌ EMV¸¦ ÁöÁöÇÏ°í ³ª¼­(CU Info Security)

http://www.cuinfosecurity.com/whats-presidents-influence-on-emv-a-7454

3¹ø ±â»ç¿Í ºñ½ÁÇÑ ³»¿ëÀÔ´Ï´Ù. ´Ù¸¸ ¿©±â¿¡¼­´Â ¿À¹Ù¸¶ ´ëÅë·ÉÀÇ ¸í·É ÀÌÈÄ EMV ÀÌÁÖ Æ÷·³(EMV Migration Forum)À̶ó´Â °Ô »ý°å°í, ¿©±â¼­ ¶Ç ¹®Á¦µéÀÌ È°¹ßÈ÷ ³íÀǵǰí ÀÖ´Ù´Â ¼Ò½Äµµ ÀÖ½À´Ï´Ù. Àü¹®°¡µéÀº ´ëÅë·ÉÀÇ ¸í·É¿¡µµ ºÒ±¸ÇÏ°í ½ÃÀå Àüü¿¡ Ĩ¾ØÇÉ ½Ã½ºÅÛÀ» µµÀÔÇÏ´Â °Í¿¡´Â »ó´çÇÑ ½Ã°£ÀÌ °É¸± °ÍÀ¸·Î º¸°í ÀÖ½À´Ï´Ù.


7. ¼Ò¼È ¹Ìµð¾î ¡®À§½ºÆÛ¡¯, »ç¿ëÀÚ °¨½Ã ¹× ÃßÀû ±â´É ÀÖ´Â °ÍÀ¸·Î ¹àÇôÁ® ³í¶õ(Infosecurity Magazine)

http://www.infosecurity-magazine.com/news/anonymous-app-whisper-hits-back-at/

³ª¸§ ¡®¹«¸í¼º¡¯ÀÌ °­Á¶µÇ´Â ¼Ò¼È ¹Ìµð¾îÀε¥ °¡µð¾ðÁö¿¡¼­ º¸µµÇÑ ¹Ù¿¡ µû¸£¸é IP ÁÖ¼Ò¸¦ ÅëÇÑ GPS ÃßÀû ±â´ÉÀÌ ÀÖ°í »ç¿ëÀÚ°¡ Áö¿î µ¥ÀÌÅÍ°¡ ¿©ÀüÈ÷ À§½ÃÆÛÀÇ µ¥ÀÌÅͺ£À̽º¿¡´Â ³²¾ÆÀÖ´Ù°í ÇÕ´Ï´Ù. À§½ºÆÛ´Â À̸¦ ºÎÁ¤ÇÏ°í ÀÖ´Â »óÅÂÀÔ´Ï´Ù. ÇÁ¶óÀ̹ö½Ã ¹®Á¦´Â ³¡ÀÌ ¾ø½À´Ï´Ù.


8. ÀØÇôÁú ±Ç¸®¿Í ÀÎÅÍ³Ý °Ë¿­(Infosecurity Magazine)

http://www.infosecurity-magazine.com/news/will-the-right-to-be-forgotten/

ÀØÇôÁú ±Ç¸®°¡ À¯·´¿¡¼­ Åë°úµÈ ¹Ù ÀÖ½À´Ï´Ù. ´ç»çÀÚ°¡ ³ëÃâÇϱ⠽ÈÀº °Ë»ö °á°ú¶ó¸é, ±×°ÍÀÌ ¿À·¡µÇ¾ú°Å³ª »ç½Ç¿¡ ±Ù°ÅÇÏÁö ¾ÊÀº °æ¿ì, °Ë»ö ¿£ÁøÀÌ À̸¦ Áö¿ö¾ß ÇÑ´Ù´Â ³»¿ëÀÔ´Ï´Ù. À̸¦ µÎ°í ÇÑÂÊ¿¡¼± ÇÁ¶óÀ̹ö½ÃÀÇ À§´ëÇÑ ½Â¸®¶ó°í ÆòÇÏ°í Àִµ¥, ¶Ç ´Ù¸¥ Æí¿¡¼± À§´ëÇÑ °Ë¿­ÀÇ ½Ã´ë°¡ ¿­¸° °ÍÀ̶ó°íµµ ÇÕ´Ï´Ù.


9. Áß±¹, Áß°£ÀÚ °ø°Ý ÅëÇØ ¾ÆÀÌŬ¶ó¿ìµå ³ë·Á(Infosecurity Magazine)

http://www.infosecurity-magazine.com/news/china-accused-mitm-attacks-against/

¾ÖÇÃÀÇ ¾ÆÀÌŬ¶ó¿ìµå »ç¿ëÀÚ¸¦ ´ë»óÀ¸·Î ÇÑ Áß°£ÀÚ °ø°ÝÀ» Áß±¹ Á¤ºÎ¿¡¼­ °¨ÇàÇÑ °ÍÀ¸·Î ¹àÇôÁ³½À´Ï´Ù. ƯÈ÷ ·Î±×ÀÎ Á¤º¸¿Í ¹Î°¨ÇÑ µ¥ÀÌÅÍ·ÎÀÇ Á¢±Ù ±ÇÇÑÀ» ³ë¸° °ÍÀ¸·Î µå·¯³µ½À´Ï´Ù.


10. »÷µå¿ú, SCADA ½Ã½ºÅÛ ÁÖ·Î ³ë¸° °ÍÀ¸·Î µå·¯³ª(Infosecurity Magazine)

http://www.infosecurity-magazine.com/news/sandworm-team-went-after-firms/

Áö³­ ÁÖ À©µµ¿ìÀÇ Á¦·Îµ¥ÀÌ Ãë¾àÁ¡À» ³ë¸° ·¯½Ã¾ÆÀÇ »÷µå¿ú ÆÀÀÌ »ê¾÷¿ë SCADA ½Ã½ºÅÛÀ» »ç¿ëÇÏ´Â ±â¾÷µéÀ» ÁÖ·Î ³ë¸° °ÍÀ¸·Î µå·¯³µ½À´Ï´Ù.

[±¹Á¦ºÎ ¹®°¡¿ë ±âÀÚ(globoan@boannews.com)]


<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(http://www.boannews.com/) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>

  •  
  • 2
  • ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
¾Æ½ºÆ®·Ð½ÃÅ¥¸®Æ¼ ÆÄ¿öºñÁî 2023³â2¿ù23ÀÏ ½ÃÀÛ ³Ý¾Øµå ÆÄ¿öºñÁî ÁøÇà 2020³â1¿ù8ÀÏ ½ÃÀÛ~2021³â 1¿ù8ÀϱîÁö À§Áîµð¿£¿¡½º 2018
¼³¹®Á¶»ç
³»³â ȸ»ç¿¡ ²À µµÀÔÇÏ°í ½ÍÀº º¸¾È ¼Ö·ç¼Ç ¶Ç´Â Ç÷§ÆûÀº ¹«¾ùÀΰ¡¿ä?
XDR
EDR
AI º¸¾È
Á¦·ÎÆ®·¯½ºÆ®
°ø±Þ¸Á º¸¾È ü°è(SBOM)
Ŭ¶ó¿ìµå º¸¾È ¼Ö·ç¼Ç
±âŸ(´ñ±Û·Î)