A guide for Small & Mid-sized Business |
º¸¾È ¿î¿µ °ü¸® >> º¸¾ÈÁ¤Ã¥ | |
ÀÛ¼ºÀÚ | Á¤Á¾¸í | ÀÛ¼ºÀÏÀÚ | 2009-12-11 | ||
Ãß Ãµ | Á¶È¸¼ö | 6159 | |||
´Ù¿î·Îµå¼ö | 74 | ||||
ÆÄ ÀÏ | c006.pdf | ||||
»ó¼¼¼³¸í |
º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted Their data is not high-value intellectual property & not sensitive proprietary data ±×·¯³ª, SMB°¡ °ø°Ý ¹Þ±â ½¬¿î ÀÌÀ¯ Homogeneous computing infrastructure; According to Gartner 90% of SMB¡¯s are running Windows 80% are using Outlook and Exchange 70% are using SQL DB Lack the specialized, dedicated, and highly trained security staff A part time responsibility More than 60% of mid-sized business do not have a dedicated security staff More than half don¡¯t know they have attacked ±â¾÷ º¸¾ÈÀ» ±ÔÁ¦ÇÏ´Â ¹ý±Ô Government regulations : HIPAA and GLBA A new law enacted by the state of California, SB1386(July 1, 2003) Protecting the confidential personal data of the customer |
ÃßõÇϱâ(µî·ÏµÈ ÀڷḦ Æò°¡ÇØ ÁÖ¼¼¿ä.) | ||
|
1
ºÏÇÑ, ºÒ¹ý »çÀ̹ö È°µ¿À¸·Î Å»ÃëÇÑ ÀÚ±Ý 2...2
[ÇÑ ÁÖ¸¦ °üÅëÇÏ´Â º¸¾È ¼Ò½Ä] 2024³â ...3
ÝÁ ±è¼öÅ° ÇØÄ¿±×·ì, ¡®ºí·ç»þÅ©¡¯ Àü¼ú·Î A...4
[¿µÈ&º¸¾È] ¼û°ÜÁø Ãູ¿¡ °üÇÑ ¼û°ÜÁø ÀÌ...5
KAIST »çÀ̹öº¸¾È¿¬±¸¼¾ÅÍ, ¡®Gamble...¡¸¿¸°º¸µµ¿øÄ¢¡¹ ´ç ¸Åü´Â µ¶ÀÚ¿Í ÃëÀç¿ø µî ´º½ºÀÌ¿ëÀÚÀÇ ±Ç¸® º¸ÀåÀ» À§ÇØ ¹Ý·ÐÀ̳ª Á¤Á¤º¸µµ, ÃßÈ帵µ¸¦ ¿äûÇÒ ¼ö Àִ â±¸¸¦ ¿¾îµÎ°í ÀÖÀ½À» ¾Ë·Áµå¸³´Ï´Ù.
°íÃæó¸®ÀÎ ±Ç ÁØ(editor@boannews.com)