IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > ¼­Æò & ¹ø¿ª¹°
  CMMI, TOGAF 8.1, IT BPM, NIST 800-14 ¼Ò°³
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 08-06-25 13:15     Á¶È¸ : 4253     Ãßõ : 10     Æ®·¢¹é ÁÖ¼Ò
¾Æ·¡ÀÇ ³»¿ëÀº COBIT Mapping - Overviewof International IT Guidance, 2nd Edition °¡¿îµ¥ ÀϺΠ¹ßÃéÇÏ¿© ¹ø¿ªÇÑ °ÍÀÔ´Ï´Ù.

 

 

CMMI

 

¹®¼­ ºÐ·ù 

 

ÅëÇÕ ¼º¼÷ ¸ðµ¨(CMMI: Capability Maturity Model Integration) ÃâÆǹ°Àº ÇÁ·Î¼¼½º °³¼±À» À§ÇÑ ¾È³»¼­·Î½á ÀÌ¿ëµÇ´Â ¸ð¹ü ½Ç¹« ¹®¼­ÀÌ´Ù. ±×°ÍÀº ½Ã½ºÅÛ ¿£Áö´Ï¾î¸µ, ÅëÇÕ Á¦Ç° ¹× ÇÁ·Î¼¼½º °³¹ß, ±×¸®°í °ø±ÞÀÚ ¼Ò½Ì(sourcing)À» À§ÇÑ ¸ðµ¨À» Á¦°øÇÑ´Ù.

 

¹ßÇàÀÚ

 

CMMI´Â ¹Ì±¹ Ææ½Çº£´Ï¾Æ ÇÇÃ÷¹ö±×¿¡ À§Ä¡ÇÑ Ä«³×±â ¸á·Ð ´ëÇÐÀÇ ¼ÒÇÁÆ®¿þ¾î °øÇÐ ¿¬±¸¼Ò¿¡ ÀÇÇØ Ãâ°£µÇ¾ú´Ù. CMMI´Â º¸´Ù ÀϹÝÀûÀÎ ¿ª·® ¼º¼÷ ¸ðµ¨(CMM)¿¡ ±âÃÊÇÑ °ÍÀÌ´Ù.

 

¹ß°£ ¸ñÇ¥

 

ÃâÆǹ° Ç¥Áö À§¿¡ ¾ð±ÞµÇ¾î ÀÖ´Â ¸ñÇ¥´Â ¡®´õ ³ªÀº Á¦Ç°À» À§ÇØ ÇÁ·Î¼¼½º¸¦ °³¼±ÇÏ´Â °Í¡¯Àε¥, ÀÌ ¸»Àº ÇÁ·Î¼¼½º¸¦ °³¹ßÇÒ ¶§ ÀÌ¿ëÇϱâ À§ÇÑ ¾È³»¼­¸¦ Á¦°øÇÏ·Á´Â ±Ùº» ÃëÁö¸¦ È®Àå½ÃŲ Ç¥ÇöÀÌ´Ù.

 

 

 

 

TOGAF 8.1

 

¹®¼­ ºÐ·ù

 

Ç¥ÁØ ±×·ì ¾ÆÅ°ÅØó ÇÁ·¹ÀÓ¿öÅ©(Open Group Architecture Framework: TOGAF)Àº Àü»ç ¾ÆÅ°ÅØó¸¦ °³¹ßÇϱâ À§ÇÑ »ó¼¼ÇÑ ¸Þ¼Òµå¿Í Áö¿ø µµ±¸µéÀÇ ¸ðÀ½ÀÌ´Ù.

 

¹ßÇàÀÚ

 

¾ÆÅ°ÅØó Æ÷·³¿¡¼­ ÀÛ¾÷Çϴ ǥÁØ ±×·ìÀÇ ±¸¼º¿øµéÀÌ TOGAF¸¦ °³¹ßÇÏ¿´´Ù. TOGAF´Â »õ·ÎÀÎ ¸¸µé¾îÁø ¾ÆÅ°ÅØó Æ÷·³ÀÌ ¹Ì±¹ ±¹¹æ¼ºÀÇ ¡®Á¤º¸ °ü¸®¸¦ À§ÇÑ ±â¼ú ¾ÆÅ°ÅØó ÇÁ·¹ÀÓ¿öÅ©¡¯ (Technical Architecture Framework for Information Management: TAFIM)¿¡ ±â¹ÝÇÏ¿© ÃÖÃÊ ¹öÀüÀ» °³¹ßÇÑ 1995³â ÀÌ·¡·Î Á¸ÀçÇÏ°í ÀÖ´Ù. Ç¥ÁØ ±×·ì ¾ÆÅ°ÅØó Æ÷·³ÀÇ ±¸¼º¿øµéÀº Ç¥ÁØ ±×·ìÀÇ °ø°³ À¥ »çÀÌÆ®¿¡ ¹ßÇ¥µÈ TOGAFÀÇ ÈÄ¼Ó ¹öÀüµéµµ °³¹ßÇÏ¿´´Ù.

 

¹ßÇà ¸ñÇ¥

 

Ç¥ÁØ ±×·ìÀº Á¤º¸ ½Ã½ºÅÛÀÇ ±¸¸ÅÀÚ ¹× °ø±ÞÀÚ ¸ðµÎ°¡ »õ·Î¿î ±â¼úÀ» ÅëÇÕÇϴµ¥ À־ ±â¾÷°£ À庮À» ³·Ãßµµ·Ï ÇÔÀ¸·Î½á º¸´Ù Å« ºñÁî´Ï½º È¿À²¼º Àü´ÞÀ» ¶°¸ÃÀº ºñ¿µ¸® ¿¬ÇÕü·Î½á ¿î¿µµÈ´Ù. ±× ¸ñÇ¥´Â ¡®°æ°è¾ø´Â Á¤º¸ È帧¢â¡¯À̶ó´Â ºñÀüÀ» ½ÇÇöÇÏ´Â °ÍÀÌ´Ù.

 

TOGAF´Â ÀÌ·¯ÇÑ ¸ñÇ¥¸¦ ´Þ¼ºÇϱâ À§ÇÑ Àü·«ÀÇ ÁÖ¿ä ¿ä¼ÒÀ̸ç, ±×¸®°í Ç¥ÁØ ±×·ìÀº TOGAF°¡ ½Ç¹«ÀûÀÎ ¾ÆÅ°ÅØó ÇÁ·ÎÁ§Æ®¿¡ °ü½ÉÀ» ¾ò¾î ÀÌ¿ëµÇ±â¸¦ ¿øÇÏ°í ±×¸®°í »ç¿ë °æÇèÀÌ TOGAFÀÇ °³¼±À» µ½µµ·Ï Àڽŵ鿡°Ô Á¦°øµÇ±â¸¦ ¹Ù¶õ´Ù.

 

 

 

 

IT BPM(Baseline Protection Manual)

 

¹®¼­ ºÐ·ù

 

IT ±âÁؼ± º¸È£ ¸Å´º¾ó(Baseline Protection Manual : BPM)Àº ÀüÇüÀûÀÎ IT ½Ã½ºÅÛÀ» À§ÇÑ Ç¥ÁØ º¸¾È ¼ö´ÜÀ» ±Ç°íÇÏ´Â ¾È³»¼­ÀÌ´Ù.

 

¹ßÇàÀÚ

 

ÀÌ ¸Å´º¾óÀº µ¶ÀÏ BSI (Bundesamt fur Sicherheit in der Informations technik—Federal Office for Information Security)¿¡ ÀÇÇØ ¹ßÇàµÇ¾ú´Ù.

 

¹ß°£ ¸ñÇ¥

 

ÀÌ ¸Å´º¾ó »ó¿¡ ÀÖ´Â ±Ç°í»çÇ×ÀÇ ¸ñÀûÀº Á¤º¸ ¹× ÀÚ»êÀ» º¸È£Çϱâ À§ÇÑ ¿ä°ÇÀ» ÃæÁ·½ÃÅ°±â À§ÇÏ¿© IT ½Ã½ºÅÛ¿¡ ´ëÇÑ ÀûÀýÇÏ°í ÃæºÐÇÑ º¸¾È ¼öÁØÀ» Á¤ÀÇÇÏ°í ´Þ¼ºÇϱâ À§ÇÑ °ÍÀÌ´Ù. IT BPMÀº ¸Å¿ì Áß¿äÇÑ IT ½Ã½ºÅÛ°ú ¾ÖÇø®ÄÉÀ̼ǿ¡ ´ëÇÑ ±âÁØ(basis)À¸·Î »ç¿ëµÉ ¼ö ÀÖ´Ù. Á¤º¸ º¸¾È ±âÁؼ±Àº ÀûÇÕÇÑ Á¶Á÷Àû, °³ÀÎÀû, ÀÎÇÁ¶óÀû ±×¸®°í ±â¼úÀû Ç¥ÁØ º¸¾È ¼ö´ÜµéÀ» ±¸ÇöÇÔÀ¸·Î½á ¿Ï¼ºµÈ´Ù.

 

 

 

 

NIST 800-14

 

¹®¼­ ºÐ·ù

 

ÀÌ ¹ßÇ๰(¡®¾ÈÀüÇÑ Á¤º¸ ±â¼ú ½Ã½ºÅÛÀ» À§ÇØ ³Î¸® ¹Þ¾Æµé¿©Áö´Â ¿øÄ¢ ¹× ½Ç¹«¡¯)Àº ½Ã½ºÅÛ º¸¾ÈÀ» ¼ö¸³ÇÏ°í À¯Áö°ü¸®Çϱâ À§ÇÑ ¿øÄ¢ ¹× ½Ç¹«µéÀÇ ¸ðÀ½ÀÌ´Ù. ±×°ÍÀº Ưº° ¹ßÇ๰(Special Publication: SP)·Î ºÒ·ÁÁø´Ù. (NIST SP 800-14)

 

Generally Accepted Principles and Practices for Securing Information Technology Systems

 

¹ßÇàÀÚ

 

¹Ì±¹ »ó¹«¼ºÀÇ ÇÑ ºÎ¼­ÀΠǥÁØ ¹× ±â¼ú Çùȸ(NIST) ¼Ò¼ÓÀÇ ÄÄÇ»ÅÍ º¸¾È ÀÚ¿ø ¼¾ÅÍ,°¡ ¹ßÇàÇÏ¿´´Ù. ±×°ÍÀº NIST 800 ½Ã¸®Áî(ÄÄÇ»ÅÍ º¸¾È)ÀÇ ÀϺÎÀÌ´Ù.

 

¹ß°£ ¸ñÇ¥

 

¹ßÇàÀÚ´Â IT º¸¾È ÇÁ·Î±×·¥À» ¼ö¸³Çϰųª °ËÅäÇϱâ À§ÇÑ ±âÁؼ±À» Á¦°øÇÒ Àǵµ¸¦ °¡Áö°í ÀÖ´Ù. ±×°ÍÀº IT ½Ã½ºÅÛÀÇ ±âº»ÀûÀÎ º¸¾È ¿ä°Ç¿¡ ´ëÇÑ ÀÌÇظ¦ ¾ò´Âµ¥ µµ¿òÀÌ µÇ¾î¾ß ÇÑ´Ù. ±×°ÍÀº º¸¾È ½Ç¹«´Â ¹°·Ð º¸¾È °ø±ÞÀÇ º»ÁúÀû ±â´ë¿¡µµ ÃÊÁ¡À» ¸ÂÃß°í ÀÖ´Ù.


ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
¹ø¿ª¿¡ ´ëÇÑ º¯ (1) ½ÅÀÎö 07-03-24 7831 17
23 IT À§Çè Ž±¸: IT À§Çè °ü¸® ºÐ·ù ¹× ÁøÈ­ By Steve Schlarman, CISM, CISSP ½ÅÀÎö 09-07-09 3714 15
22 IT °Å¹ö³Í½º¿¡¼­ Àü»ç IT °Å¹ö³Í½º·Î À̵¿ By Steven De Haes, Ph.D. and Wim Van Grembergen, Ph.D. ½ÅÀÎö 09-06-03 3059 18
21 Àü»ç IT °Å¹ö³Í½º¿Í IT ¼­ºñ½º °Å¹ö³Ê½ºÀÇ ºñ±³Ç¥ ½ÅÀÎö 09-05-14 3211 12
20 Val IT¸¦ µµÀÔÇϱâ À§ÇÑ 5°¡Áö Çٽɼº°ø¿äÀÎ By Sarah Harries and Peter Harrison ½ÅÀÎö 09-05-06 3832 12
19 ÀÌÀÍ ½ÇÇö°ú ÇÁ·Î±×·¥ °ü¸®: ºñÁî´Ï½º ÄÉÀ̽º¸¦ ³Ê¸Ó¼­ By Sarah Harries and Peter Harrison ½ÅÀÎö 09-04-10 4892 13
18 Æ÷Æ®Æú¸®¿À °ü¸® ±¸ÇöÀÇ µµÀü °úÁ¦ by Sarah Harries and Peter Harrison ½ÅÀÎö 09-03-31 3790 10
17 4 °³ÀÇ »ç¼ÒÇÑ ´Ü¾î: À§Çù, Ãë¾à¼º, °¡´É¼º, À§Çè (Four Little Words) By Steven J. Ross ½ÅÀÎö 09-02-13 7691 18
16 IT °Å¹ö³Í½º ´ë´ã: IT °Å¹ö³Í½º Ãß¼¼ ½ÅÀÎö 08-11-16 3217 7
15 ºñ±ØÀ¸·ÎºÎÅÍ ±³ÈÆ (Lessons from Tragedy) By Steven J. Ross ½ÅÀÎö 08-10-11 3161 7
14 ºñ±ØÀ¸·ÎºÎÅÍ ±³ÈÆ, Àç°í (Lessons from Tragedy, Revisited) By Steven J. Ross ½ÅÀÎö 08-10-08 3301 8
13 CMMI, TOGAF 8.1, IT BPM, NIST 800-14 ¼Ò°³ ½ÅÀÎö 08-06-25 4254 10
12 FIPS PUB 200, ISO/IEC TR 13335, ISO/IEC 15408:2005/COMMON CRITERIA/ITSEC, TickIT ¼Ò°³ ½ÅÀÎö 08-06-24 4002 12
11 PRINCE2, ISO/IEC 17799, PMBOK, ITIL, COBIT ¼Ò°³ ½ÅÀÎö 08-06-24 8033 21
10 °¡Ä¡ °ü¸® ¿ø¸®(Value Management Principles) by Erik Guldentops ½ÅÀÎö 08-06-05 3861 21
9 IT ÇÁ·ÎÁ§Æ® Ãë¼Ò: ´ë°¡ ÁöºÒ, Áö±ÝÀÌ³Ä ³ªÁßÀÌ³Ä by John Thorp ½ÅÀÎö 08-05-05 3603 6
 1  2  3