ħÇØ»ç°í´ëÀÀ¿£Áö´Ï¾î - »çÀ̹ö °ø°Ý (Cyber attack), ¾Ç¼º ÄÚµå (Malware), µ¥ÀÌÅÍ À¯Ãâ (Data breach), ³×Æ®¿öÅ© ħÀÔ (Network intrusion), »çȸ °øÇÐ (Social engineering), ¾ÏÈ£È (Encryption), ħÀÔ Å½Áö ½Ã
- »çÀ̹ö °ø°Ý (Cyber attack): ÄÄÇ»ÅÍ ½Ã½ºÅÛ, ³×Æ®¿öÅ© ¶Ç´Â ÀÎÅͳÝÀ» ÅëÇØ ´Ù¸¥ °³ÀÎÀ̳ª Á¶Á÷¿¡°Ô ÇÇÇظ¦ ÀÔÈ÷±â À§ÇØ ¼öÇàµÇ´Â °ø°ÝÀÔ´Ï´Ù. ¿¹¸¦ µé¾î, ½Ã½ºÅÛÀ» ¸¶ºñ½ÃÅ°°Å³ª µ¥ÀÌÅ͸¦ µµ¿ëÇÏ´Â µîÀÇ °ø°ÝÀÌ ÀÖ½À´Ï´Ù.
- ¾Ç¼º ÄÚµå (Malware): ÄÄÇ»ÅÍ ½Ã½ºÅÛ¿¡ ħÅõÇÏ¿© ¾ÇÀÇÀûÀÎ ¸ñÀûÀ» ´Þ¼ºÇϱâ À§ÇØ ¼³°èµÈ ¼ÒÇÁÆ®¿þ¾îÀÔ´Ï´Ù. ¹ÙÀÌ·¯½º, ¿ú, Æ®·ÎÀÌ ¸ñ¸¶ µîÀÌ ¾Ç¼º ÄÚµåÀÇ ¿¹ÀÔ´Ï´Ù.
- µ¥ÀÌÅÍ À¯Ãâ (Data breach): ±â¾÷À̳ª Á¶Á÷ÀÇ µ¥ÀÌÅÍ°¡ ºÒ¹ýÀûÀ¸·Î ³ëÃâµÇ´Â °ÍÀ» ¸»ÇÕ´Ï´Ù. ÇØÄ¿°¡ ½Ã½ºÅÛ¿¡ ħÅõÇÏ¿© °³ÀÎÁ¤º¸, ±ÝÀ¶Á¤º¸ µîÀ» Å»ÃëÇÏ´Â °æ¿ì°¡ ´ëÇ¥ÀûÀÔ´Ï´Ù.
- ³×Æ®¿öÅ© ħÀÔ (Network intrusion): ÇØÄ¿°¡ ³×Æ®¿öÅ© ½Ã½ºÅÛ¿¡ ºÒ¹ýÀûÀ¸·Î ħÅõÇÏ¿© Á¤º¸¸¦ Å»ÃëÇϰųª ½Ã½ºÅÛÀ» Á¶ÀÛÇÏ´Â ÇàÀ§ÀÔ´Ï´Ù. À̸¦ ÅëÇØ ½Ã½ºÅÛÀÇ ±â¹Ð¼º, ¹«°á¼º, °¡¿ë¼ºÀÌ À§ÇùµÉ ¼ö ÀÖ½À´Ï´Ù.
- »çȸ °øÇÐ (Social engineering): »ç¶÷µéÀÇ ½Å·Ú¸¦ ÀÌ¿ëÇÏ¿© °³ÀÎ Á¤º¸¸¦ ¾ò°Å³ª ½Ã½ºÅÛ¿¡ ħÅõÇÏ´Â ±â¼úÀÔ´Ï´Ù. ¿¹¸¦ µé¾î, »çĪ, ¼ÓÀÓ¼ö, À§Àå µîÀ» ÅëÇØ »ç¶÷µéÀ» ¼Ó¿© Á¤º¸¸¦ Å»ÃëÇÏ´Â ¹æ¹ýÀÔ´Ï´Ù.
- ¾ÏÈ£È (Encryption): µ¥ÀÌÅ͸¦ ¾ÏÈ£ÈÇÏ¿© ¿ÜºÎ¿¡¼ Á¢±ÙÇÒ ¼ö ¾øµµ·Ï º¸È£ÇÏ´Â ±â¼úÀÔ´Ï´Ù. ¾ÏÈ£ÈµÈ µ¥ÀÌÅʹ ƯÁ¤ÇÑ ¾Ïȣ۸¦ °¡Áö°í ÀÖÁö ¾Ê´Â ÀÌ»ó Çص¶ÇÒ ¼ö ¾ø½À´Ï´Ù.
- ħÀÔ Å½Áö ½Ã½ºÅÛ (Intrusion detection system): ³×Æ®¿öÅ©³ª ½Ã½ºÅÛ¿¡ ´ëÇÑ Ä§ÀÔÀ» °¨ÁöÇÏ°í °æ°í ¶Ç´Â Â÷´ÜÇÏ´Â ½Ã½ºÅÛÀÔ´Ï´Ù. À̸¦ ÅëÇØ Ä§ÀÔÀÚÀÇ ÇàÀ§¸¦ ½Äº°ÇÏ°í ´ëÀÀÇÒ ¼ö ÀÖ½À´Ï´Ù.
- Ãë¾àÁ¡ ºÐ¼® (Vulnerability analysis): ½Ã½ºÅÛÀ̳ª ³×Æ®¿öÅ©¿¡¼ ¹ß°ßµÈ º¸¾È Ãë¾àÁ¡À» ½Äº°ÇÏ°í ºÐ¼®ÇÏ´Â °úÁ¤ÀÔ´Ï´Ù. À̸¦ ÅëÇØ Ãë¾àÁ¡À» ÇØ°áÇÏ°í º¸¾È ¼öÁØÀ» Çâ»ó½Ãų ¼ö ÀÖ½À´Ï´Ù.
- »çÀ̹ö À§Çù ÀÎÅÚ¸®Àü½º (Cyber threat intelligence): »çÀ̹ö °ø°Ý¿¡ ´ëÇÑ Á¤º¸¸¦ ¼öÁý, ºÐ¼®ÇÏ¿© »çÀ̹ö À§Çù¿¡ ´ëÇÑ ÀÎÅÚ¸®Àü½º¸¦ Á¦°øÇÏ´Â È°µ¿ÀÔ´Ï´Ù. À̸¦ ÅëÇØ Á¶Á÷Àº »çÀ̹ö À§Çù¿¡ ´ëºñÇÏ°í ´ëÀÀÇÒ ¼ö ÀÖ½À´Ï´Ù.
- »çÀ̹ö º¸¾È ±³À° (Cybersecurity training): Á¶Á÷ ³» Á÷¿øµé¿¡°Ô »çÀ̹ö º¸¾È¿¡ ´ëÇÑ ±³À°À» Á¦°øÇÏ´Â È°µ¿ÀÔ´Ï´Ù. À̸¦ ÅëÇØ Á÷¿øµéÀº »çÀ̹ö À§Çù¿¡ ´ëÇÑ ÀνÄÀ» ³ôÀÌ°í º¸¾È Á¤Ã¥À» ÁؼöÇÒ ¼ö ÀÖ½À´Ï´Ù.