IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > ¼­Æò & ¹ø¿ª¹°
  4 °³ÀÇ »ç¼ÒÇÑ ´Ü¾î: À§Çù, Ãë¾à¼º, °¡´É¼º, À§Çè (Four Little Words) By Steven J. Ross
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 09-02-13 12:07     Á¶È¸ : 7690     Ãßõ : 18     Æ®·¢¹é ÁÖ¼Ò
4 °³ÀÇ »ç¼ÒÇÑ ´Ü¾î
 
Four Little Words

 

ÀúÀÚ : Steven J. Ross

 

Ãâó : Information Systems Control Journal, Volume 1, 2009

 

 

 

Áö±Ý ISO 27005°¡ ¿Â´Ù.

 

ISO 27000 Ç¥ÁØ ½Ã¸®Áî¿¡ ´ëÇÑ À̹ø Ãß°¡ºÐÀº ¡°ISO/IEC 27005:2008, Á¤º¸±â¼ú-º¸¾È Å×Å©´Ð-Á¤º¸ º¸¾È À§Çè °ü¸®¡±¶ó´Â Ç¥Á¦°¡ ºÙ¾ú´Ù.©ö °£´ÜÇϸ鼭 ÂüÁ¶Çϱ⠽±µµ·Ï ³ª´Â ÀÌ Ç¥ÁØÀ» ISO 27005·Î ºÎ¸¦ °ÍÀÌ´Ù. Á¤º¸ º¸¾ÈÀÇ ÀÔÀå¿¡¼­ À§Çè °ü¸®¿¡ ´ëÇÑ Á÷Á¢ÀûÀÎ Á¢±Ù¹æ¹ýÀ» Á¤ÀÇÇÑ °ÍÀº Á¤º¸ º¸¾È ÀÎÁõ ÇÁ·Î¼¼½º¿¡ °üÇÑ ISO 27001¿¡ Á¸ÀçÇÏ´Â °áÇÔÀ» º¸¿ÏÇÑ °ÍÀÌ´Ù.©÷ ƯÈ÷, Á¤º¸ ½Ã½ºÅÛ °ü¸® ½Ã½ºÅÛ(ISMS)ÀÇ ¼ö¸³À» ¿ä±¸ÇÏ´Â 4 ÀýÀº À§Çè Æò°¡¸¦ ¿ä±¸Çϸ鼭 Á¶Á÷ÀÇ À§Çè Æò°¡ ¹æ¹ý·ÐÀ» Á¤ÀÇÇÏ´Â ÀÏÀ» ÀÎÁõÀ» ¹Þ°íÀÚ ÇÏ´Â Á¶Á÷ ÀÚü¿¡ ¸Ã±â°í ÀÖ´Ù. ÀÌ°ÍÀº ¸ðµç À§ÇèÀÌ (´ëÀÀ) Á¶Ä¡°¡ ¾Æ´Ñ ºÐ¼®¿¡ ÀÇÇؼ­ ºÎÁ¤µÉ ¼ö ÀÖ´Â Æ÷¿ë·ÂÀÌ Å« Á¢±Ù¹æ¹ýÀ» ÃëÇÏ´Â °ÍÀÌ °¡´ÉÇÒ ¼ö ÀÖÀ¸¹Ç·Î ¿ÀÈ÷·Á ¿ìȸÀûÀÌ´Ù(circle).

 

±×·±µ¥, ³ª´Â °ú°Å ISO º¸¾È Ç¥ÁØ¿¡ ´ëÇØ ÀÏ°ü¼º ¹× Àü¹®¼ºÀÇ °á¿©·Î ÀÇ°ßÂ÷¸¦ °¡Áö°í ÀÖ¾úÀ¸³ª, ³»°¡ º¸±â¿¡ À̹ø °ÍÀº Á¦´ë·Î ±¸¼ºµÇ¾î ÀÖÀ¸¸ç À¯¿¬ÇÏ´Ù. ¸î¸î È帧µµ¿¡´Â ¾î¶² Á¤º¸ º¸¾È Àü¹®°¡¶óµµ ±×°ÍÀ» ÀÀ¿ëÇÒ ¼ö ÀÖ´Â ¹æ½ÄÀ¸·Î ÇØ´ç ÇÁ·Î¼¼½º¸¦ º¸¿©ÁØ´Ù. ³ª´Â ƯÈ÷ À§Çè Æò°¡°¡ »óÀ§ ¼öÁØÀ̰ųª ¶Ç´Â »ó¼¼ÇÒ ¼öµµ ÀÖ´Ù´Â ºÎ·Ï E ¿¡¼­ÀÇ ÀÎÁ¤¿¡ Âù»ç¸¦ º¸³½´Ù. ±×°ÍÀº ÇÕ¸®ÀûÀ¸·Î Àß ¸¸µé¾îÁø ¾ð¾î·Î ¾²¿©Á³À¸¸ç ÀÌÇØÇϱ⠽±´Ù - ½¬¿ö¾ß ÇÑ´Ù -.

 

¾Õ¿¡¼­ÀÇ ¿ËÁ¹ÇÑ ÀǽÉÀº Á¤ÀÇ ¹®Á¦ ȤÀº Á¤ÀÇ ´©¶ô ¹× À߸øµÈ Á¤ÀÇ¿¡¼­ ºñ·ÔµÇ¾ú´Ù. ƯÈ÷, µ¶ÀÚ·Î ÇÏ¿©±Ý Á¤ÀÇÇϵµ·Ï ³²°ÜÁø °áÁ¤ÀûÀÎ 3°³ÀÇ ¿ë¾î°¡ ÀÖ°í, ¹«¾ùº¸´Ù °¡Àå Áß¿äÇÑ °ÍÀº Á¦½ÃµÈ ¿ë¾î Á¤ÀÇ¿¡¼­ ¿äÁ¡ÀÌ ºüÁø °ÍÀÌ´Ù. À§Çè °ü¸® Ç¥ÁØ¿¡¼­ À§Çù(threat), Ãë¾à¼º(vulnerability) ±×¸®°í °¡´É¼º(likelihood)¿¡ ´ëÇÑ Á¤ÀÇ°¡ ºüÁ®ÀÖ´Ù´Â °Í¿¡ ¼Ò¸§ÀÌ µ¸´Â´Ù. °Ô´Ù°¡, ³ª´Â À§Çè °ü¸® Ç¥ÁØÀ̶ó¸é À§ÇèÀ̶õ ¿ë¾î´Â ¾ö¹ÐÈ÷ ¼³¸íµÇ¾î Àֱ⸦ ±â´ëÇß¾ú´Ù; ³ª´Â ISO 27005¿¡ ³ª¿ÍÀÖ´Â ¼³¸í°ú ´Ù¸¥ °ßÇظ¦ °¡Áö°í ÀÖ´Ù. ±×¸®ÇÏ¿©, °ø°³ ¼­ºñ½º Á¤½Å¿¡ ÀÔ°¢ÇÏ¿©, »ý·« ¹× À§ÀÓÀÇ Á˸¦ ¹Ù·Î Àâ±â À§ÇÏ¿© º» Ä÷³Àº ¿ë±â¸¦ °®°í ¹àÈú °ÍÀÌ´Ù. (ÁÁ¾Æ¿ä, Á˶ó°í ÇÑ °ÍÀº Á¶±ÝÀº Áö³ªÄ¡Áö¸¸, °ËÅ並 ¿ëÀÎÇØ¾ß ÇÒ ¿ë¾îµéÀº Á¸ÀçÇÑ´Ù.)

 

À§Çù(Threat)

 

ÀÌ·¯ÇÑ »ó´çÈ÷ Áß½ÉÀûÀÎ ¿ë¾î¸¦ Á¤ÀÇÇϴµ¥ ÀǵµÇÏÁö ¾ÊÀº ½Ãµµ°¡ ÀÖÀ¸³ª,©ù ¡°À§ÇùÀº ÀǵµÀû, ¿ì¹ßÀû ¾Æ´Ï¸é (ÀÚ¿¬) ȯ°æÀûÀÌ¸ç ±×¸®°í, ¿¹¸¦ µé¾î¼­, Áß¿äÇÑ ¼­ºñ½ºÀÇ ¼ÕÇØ È¤Àº ¼Õ½ÇÀ» ÃÊ·¡ÇÑ´Ù.¡± ¸¦ ÀÌÇØÇϱâ À§Çؼ­ »ç¶÷Àº ºÎ·Ï C¿¡ ´ëÇØ °­ÇÏ°Ô ÁÖÀåÇؾ߸¸ ÇÑ´Ù. ¡°¿¹¸¦ µé¾î¼­¡±¶ó´Â ÇÑÁ¤¾î´Â À§ÇùÀ¸·ÎºÎÅÍ ¶Ç ´Ù¸¥ °á°úµéÀÌ ³ª¿Ã ¼ö ÀÖ´Ù´Â Á¡°ú ÀÌ·Î ÀÎÇؼ­ ºÎ·Ï C-ÆĶó¿À ºí·¯½Ã(pharaoh blush)¸¦ ¸¸µå´Â õÀçÁöº¯ ¸ñ·Ï-¿¡ µé¾îÀÖ´Â Å×ÀÌºí ¾È¿¡ ÀÖ´Â °Í ÀÌ¿Ü¿¡ À§ÇùÀ» ÀÌÇØÇÏ´Â ´Ù¸¥ ¹æ½ÄÀÌ ÀÖÀ» ¼ö ÀÖ´Ù´Â »ý°¢À» °®°Ô ÇÑ´Ù. ±× ºÎ·Ï¿¡´Â ¿À·¡µÈ ¹ÏÀ»¸¸ÇÑ °ÍµéÀÌ µé¾î ÀÖ´Ù: ÁöÁø, ¹Ù¶÷ ±×¸®°í È­Àç.©ë ´ÙÀ½°ú °°Àº ´õ¿í ºÒ°¡»çÀÇÇÑ »ç·Êµéµµ µé¾î ÀÖ´Ù: ÀüÀÚ¼®Àû ¹æ»ç, ÀǽɹÞÀ» ¹æÇØ ½ÅÈ£ÀÇ Â÷´Ü, ±×¸®°í ±Ç¸®ÀÇ À§Á¶. ÇØÄ¿, Å©·¡Ä¿, ¹üÁËÀÚ, Å×·¯¸®½ºÆ®, Æı« È°µ¿°¡, ¾ÇÀÇÀûÀÎ ³»ºÎÀÚµéÀ» ÁöĪÇÏ´Â Àΰ£Àû À§Çù ¿øõÀº Ưº°ÇÑ ÁÖÀǸ¦ ¿äÇÑ´Ù.

 

¿¹½ÃµÈ Á¤ÀÇ´Â ¸í·áÇÔÀÇ °á¿©¸¦ º¸¿©ÁÖ°í ±×¸®°í, À½¶õ¹°°ú °ü·ÃÇÏ¿© ¹Ì±¹ ÃÖ°í¹ýÁ¤ ÆÇ»çÀÎ Æ÷ÅÍ ½ºÆ©¾îÆ®¿¡ ÀÇÇØ À¯¸íÇØÁø Æø³ÐÀº ÁÖ°üÀû Çؼ®¿¡ ´ëÇÑ ¿©Áö¸¦ ³²°Ü ³õ¾Ò´Ù: ¡°³ª´Â ±×°Í(Æ÷¸£³ë)À» Á¤ÀÇÇÒ ¼ö´Â ¾øÀ¸³ª º¸¸é ¾È´Ù.¡± ±× ÈÄ·Î ¹Ì±¹ ¹ýÁ¤¿¡¼­´Â Á¤È®È÷ ´©°¡ ¹«¾ùÀ» º¸¾Ò´Â°¡¿¡ ´ëÇÑ ³íÀïÀÌ ÀϾ´Ù.

 

À§ÇùÀº ´Ü¼øÈ÷ ¼ÕÇظ¦ ÀÏÀ¸Å³ ¼ö Àֱ⠶§¹®¿¡ À§ÇùÀΰ¡? ±×·± °æ¿ì¿¡´Â, °Å´ëÇÑ ½ÄÀÎ °³±¸¸®µµ ¸ðµç À§Çè Æò°¡¿¡¼­ ´Ù·ïÁ®¾ß ÇÏ´Â À§ÇèÇÑ °ÍÀÌ´Ù. öÀÚ¸¦ À߸ø ¾´ °ÍÀº ¾î¶»°í; ±×·¯ÇÑ ÀÏÀº °íµîÇб³¿¡¼­ ¿©·¯ºÐÀÇ ¼ºÀûÀ» ¶³¾î¶ß¸®´Â °ÍÀº °¡´ÉÇÏÁö¸¸, ÁÖ¿ä ÄÄÇ»Æà ȯ°æ¿¡¼­´Â ½É°¢ÇÑ À§ÇùÀ¸·Î °ÅÀÇ °í·ÁÇÏÁö ¾Ê´Â´Ù. ºÎ·Ï C¿¡´Â ÇÔ¼öÀÇ À§ÇèÈ­(compromise of functions)¶ó ºÎ¸£´Â ±×·¯ÇÑ À¯ÇüÀÇ À§Çù¿¡ ´ëÇÑ ¿¹½Ã·Î ¡°»ç¿ëÁß ¿À·ù error in use¡±°¡ µé¾î ÀÖ´Ù. À¯È¤¿¡ ºüÁö±â ½¬¿î »ç¶÷µéÀÎ ¿ì¸® Àΰ£Àº ¸ðµç Á¤º¸½Ã½ºÅÛ¿¡ ´ëÇØ À§ÇùÀÌ ¾Æ´Ï°Ú´Â°¡?

 

³ª´Â À§ÇùÀ» ¡°Á¤º¸½Ã½ºÅÛ¿¡, Á¤º¸½Ã½ºÅÛ ÀÚüÀûÀ¸·Î º¸¸é ¿ÜºÎ, Áß¿äÇÑ ¼ÕÇظ¦ ³¢Ä¡´Â È®½ÇÇÑ ¿øõ¡±À¸·Î Á¤ÀÇÇÏ°íÀÚ ÇÑ´Ù. È®½Ç¼ºÀº ±×·¯ÇÑ(°Å´ëÇÑ ½ÄÀÎ) °³±¸¸®µéÀ» Á¦°ÅÇÑ´Ù; Á߿伺Àº ÇÏÂúÀº ½Ç¼ö¸¦ Á¦°ÅÇÑ´Ù; ±×¸®°í ¿ÜÀû ¿µÇâÀº ¿¡·¯¸¦ Á¦°ÅÇÑ´Ù. ³ª´Â ¿¡·¯¸¦ À§Çù¿¡¼­ »©³»¾ú´Ù, ¿Ö³ÄÇÏ¸é ¿¡·¯¸¦ ¹üÇÒ °Í °°Àº »ç¶÷µéÀº ¿ÀÁ÷ ±×µéÀÌ ÇØ´ç ½Ã½ºÅÛ ¾È¿¡ ÀÖ¾î¾ß¸¸ Áß´ëÇÑ ¼ÕÇظ¦ ÃÊ·¡ÇÑ´Ù.

 

Ãë¾à¼º(Vulnerability)

 

Ãë¾à¼ºÀ̶õ ÀÌ¿ëµÇ¾îÁö¸é Á¤º¸½Ã½ºÅÛ¿¡ Áß´ëÇÑ ¼ÕÇظ¦ ÃÊ·¡ÇÒ ¼ö ÀÖ´Â ³»ºÎ Ãë¾àÁ¡(weaknesses)ÀÌ´Ù. ISO 27005 µµ ¡°Ãë¾à¼ºÀº Á¸Àç ÀÚü¸¸À¸·Î´Â ¼ÕÇظ¦ À¯¹ßÇÏÁö ¾Ê´Â´Ù, µû¶ó¼­ ±×°ÍÀ» ÀÌ¿ëÇÏ°íÀÚ ÇÏ´Â À§ÇùÀÌ Á¸ÀçÇÒ ÇÊ¿ä°¡ ÀÖ´Ù. »óÀÀÇÏ´Â À§ÇùÀÌ ÀüÇô ¾ø´Â Ãë¾à¼º¿¡ ´ëÇؼ­´Â ÅëÁ¦¸¦ ±¸ÇöÇÒ ÇÊ¿ä´Â ¾øÀ¸³ª, (Ãë¾à¼ºÀÇ) º¯È­¿¡ ´ëÇÏ¿© ÀνÄÇÏ°í ¸ð´ÏÅÍÇÏ¿©¾ß ÇÑ´Ù¡±¶ó°í ¹àÈ÷´Â Á¡¿¡¼­ ÀÌ·¯ÇÑ Á¤ÀÇ¿¡ µ¿ÀÇÇÏ´Â °Í °°´Ù.©ì ±×·¸Áö¸¸, °ø½ÄÀûÀÎ Á¤ÀÇÀÇ ºÎÀç´Â Ç¥ÁØ¿¡ ´ëÇÑ Çؼ®À» ÀÚÀ¯·Ó°Ô ¹æÄ¡ÇÏ´Â °ÍÀε¥, ±×°ÍÀº À§Çè °ü¸® ¹× º¸¾È ¸ðµÎ¿¡ ÇØ°¡ µÉ ¼ö ÀÖ´Ù.

 

Á¤º¸½Ã½ºÅÛÀÌ Ãë¾àÇÏ´Ù´Â °ÍÀº (¾ö¿¬ÇÑ) »ç½ÇÀÌ´Ù. ÇÑ°¡Áö ¿¹·Î, ½Ã½ºÅÛÀº »ç¶÷¿¡ ÀÇÇØ °³¹ßµÇ°í, ±¸ÇöµÇ°í ±×¸®°í ¿î¿µµÈ´Ù. ±×·¸±â ¶§¹®¿¡ ¾Õ¼­ ¾ð±ÞµÈ ¡°»ç¿ë»ó ¿À·ù¡±´Â ¸ðµç »ç¶÷¿¡°Ô º»ÁúÀûÀÌ´Ù. ÇÁ·Î±×·¡¸Ó³ª °ü¸®ÀÚ°¡ ³ªÁß¿¡ ÀڽŵéÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖµµ·Ï Çϱâ À§ÇÏ¿© ¾ÇÀÇÀûÀ¸·Î ½Ã½ºÅÛ ³»¿¡ °áÇÔÀ» ¹èÄ¡ÇÏ´Â »ç·ÊµéÀÌ ºÐ¸íÈ÷ ÀÖ´Â ¹Ý¸é, ´ëºÎºÐÀÇ Ãë¾à¼ºÀº º¹À⼺, ¹«½Ã ȤÀº ´ëóÇÏ´Â ÅëÁ¦ ºñ¿ë °°Àº ¿ä¼Ò·ÎºÎÅÍ ¹ß»ýÇÑ´Ù.

 

À§Çè °ü¸® - ¹× ±×¿¡ ´ëÇÑ °¨»ç - ÀÇ ¿äÁ¡Àº Ãë¾à¼ºÀÌ ¾Ç¿ëµÉ ¼ö ÀÖ±â Àü¿¡ ±×°ÍµéÀ» È®ÀÎÇÏ°í ±³Á¤ÇÏ´Â °Í, ¾Æ´Ï¸é ÃÖ¼ÒÇÑ ÇØ´ç À§ÇùµéÀÌ ´õ ÀÌ»ó Àǹ̰¡ ¾øÀ» ¶§±îÁö Ãë¾à¼ºÀ» ¾Ç¿ëÇÒÁöµµ ¸ð¸£´Â °¡´ÉÇÑ À§ÇùµéÀÇ ¹üÀ§¸¦ Á¦ÇÑÇÏ´Â °ÍÀÌ´Ù. ½Ã½ºÅÛÀº ¼³°è °úÁ¤¿¡¼­ÀÇ ¿À·ù (ȤÀº °íÀÇ·Î µµÀÔµÈ ¹ÌºñÁ¡) °¡ ÀÖÀ»Áö ¸ð¸¥´Ù; ÇÁ·Î±×·¡¹Ö °úÁ¤¿¡¼­; ȤÀº ½ÃÇè, ±¸Çö, ¿î¿µ, ÀúÀå ȤÀº »ç¿ë Áß¿¡; ³» »ý°¢¿¡´Â ÀÌ·¯ÇÑ Ãë¾à¼ºÀÇ ¸ðµç ¿øõµéÀ» ÇÔ²² Ãë±ÞÇÏ°í ±× °á°úµéÀ» °áÇÕ½ÃÅ°´Â °ÍÀº À§Çè¿¡ ´ëÇÑ ¹«±â·ÂÇÏ°í ±Ã±ØÀûÀ¸·Î´Â ÇêµÈ Æò°¡ ¹× Ãë±ÞÀ» ³º´Â´Ù.

 

ISO 27005 Ç¥ÁØ ºÎ·Ï D¿¡ ³ªÅ¸³ª ÀÖ´Â À§Çù¿¡ ´ëÇÑ ºÐ·ùó·³, Ãë¾à¼º¿¡µµ ºÐ·ù¹ýÀÌ ÀÖ´Ù. ÀÌ ºÎ·Ï¿¡ ³ªÅ¸³­ ¿¹½ÃµéÀÌ °¡Ä¡ÀÖ´Â °ÍÀ̳ª, (°Ü¿ì) 2 ÆäÀÌÁö ¹Ý ±æÀÌÀÇ ¸®½ºÆ®¿¡ ¸ðµÎ ´ã¾Ò´Ù°í °¨È÷ ÁÖÀåÇÒ ¼ö´Â ¾ø´Ù.

 

°¡´É¼º(Likelihood)

 

ISO 27005 Ç¥ÁØ ¼½¼Ç 3.5¿¡´Â, À§ÇèÀ» ÃøÁ¤Çϱâ À§Çؼ­ ¡°È®·ü probability¡± ´ë½Å ¡°°¡´É¼º likelihood¡±ÀÌ ¸í½ÃÀûÀ¸·Î ¾²ÀÌ°í ÀÖ´Ù. È®·üÀº ¿¹ÃøÀÌ °¡´ÉÇÏ´Ù; ±×°ÍÀº ÁÖ¾îÁø ½Ã°£ µ¿¾ÈÀÇ ¹ß»ý Ƚ¼öÀÌ´Ù. ÀüÈÄ °ü°è¸¦ º¸¾Æ, ¿ì¸®´Â È®·üÀ» °ú°Å·ÎºÎÅÍ ¹Ì·¡¸¦ ÃßÁ¤Çϴµ¥ ÀÌ¿ëÇÑ´Ù. °ú°Å ¾î¶°ÇÑ ´Þ¿¡ ¹ß»ýÇÑ ÀÏÀº À̹ø ´Þ ±×¸®°í ´ÙÀ½ ´Þ¿¡µµ ¹ß»ýÇÒ °ÍÀÌ´Ù. °¡´É¼ºÀº ÀüÀûÀ¸·Î ÁÖ°üÀûÀÌ°í °æÇèÀûÀÌ´Ù. ¹Ì±¹ ¾Ö¸®Á¶³ªÁÖÀÇ ÇǴнº¿¡ º¸´Ù ·±´ø¿¡ ºñ°¡ ¿Ã °¡´É¼ºÀÌ ´õ ¸¹Áö¸¸, »ç¶÷Àº µÎ °÷ÀÇ ³¯¾¾¿¡ Ä£¼÷Çؾ߸¸ ÀÌ°ÍÀ» ¾Ë ¼ö ÀÖ´Ù. ±×·¯ÇÑ Áö½Äµµ ¹Ù·Î ¿À´Ã ¾î´À °÷¿¡ ºñ°¡ ³»¸± °ÍÀΰ¡¿¡ ´ëÇÑ Â¡ÈÄ´Â °ÅÀÇ Á¦°øÇÏÁö ¾Ê´Â´Ù. ºñ½ÁÇÏ°Ô, º¸¾È °áÇÔÀº Á¢±Ù ÅëÁ¦, °¨»ç ÁõÀû, ħÀÔ Å½Áö, µîµî¿¡ ´ëÇÑ Á¤±³ÇÑ ¸ÞÄ¿´ÏÁòÀ» °¡Áø ½Ã½ºÅÛ º¸´Ù´Â ´ú º¸È£µÈ ½Ã½ºÅÛ¿¡¼­ ¹ß»ýÇÒ °¡´É¼ºÀÌ ´õ ÀÖ´Ù. ÃøÁ¤ÇÒ ¼öµµ ¾øÀ¸¸ç ¾ÆÁ÷ ¾Ë·ÁÁöÁö ¾ÊÀº °ÍÀÌ ¾ó¸¶³ª ¸¹°Ú´Â°¡.

 

ÇöÀç·Î¼­´Â ÁÖ°üÀûÀÎ ºÐ¼®¿¡ À־ º»ÁúÀûÀ¸·Î À߸øµÈ °ÍÀº ¾Æ¹« °Íµµ ¾øÁö¸¸, ºÐ¸í ºÐ¼®°¡ÀÇ Áö½ÄÀ̳ª ¼Ø¾¾(skills)¿¡ ÀÇÁ¸ÇÑ´Ù. ¾î¶°ÇÑ È°µ¿À» ÀÌÇàÇϴ ǥÁØ ¹æ¹ýÀº ´©°¡ ±×°ÍÀ» ¼öÇàÇϴ°¡¿¡ »ó°ü¾øÀÌ µ¿ÀÏÇϰųª ¾Æ´Ï¸é ÃÖ¼ÒÇÑ ºñ½ÁÇÑ °á°ú¸¦ ³º¾Æ¾ß ÇÑ´Ù. È®·üÀ̶ó´Â ¿ë¾î¸¦ ȸÇÇÇÔÀ¸·Î½á, ISO 27005´Â ÀÏÁ¤ÇÏ°Ô ¾Ë ¼ö ¾ø´Â °´°üÀûÀÎ »ç½ÇµéÀÇ ºóÆ´À» Á¶Á¾ÇÏÁö¸¸, Á¾±¹¿¡ À־ À§Çè °ü¸®´Â È¿°ú¿¡ ´ëÇÑ ´Ù¾çÇÑ Çؼ®À» ÀÚÀ¯·Ó°Ô ¹æÄ¡Çϸç, ¶ÇÇÑ Æ¯Á¤ À§ÇèÀ» ´Ù·ç°í Ưº°ÇÑ ÅëÁ¦¸¦ Àû¿ëÇÒ ¿ä±¸¿¡ ´ëÇÑ ¼­·Î ´Ù¸¥ ÀÌÇظ¦ ³º´Â´Ù.

 

À§Çè

 

ISO 27005´Â ÀûÁ¤ÇÑ ºÎºÐ ÁýÇÕÀÎ Á¤º¸ º¸¾È À§ÇèÀ» Á¤ÀÇÇÑ´Ù: ¡°Æ¯Á¤ À§ÇùÀÌ °³º° ÀÚ»ê ¶Ç´Â ÀÚ»ê ±×·ìÀÇ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ¿© Á¶Á÷¿¡ ¼ÕÇظ¦ ³¢Ä¥ °¡´É¼º.¡± ³ª´Â Á¤ÀǵÇÁö ¾ÊÀº ´Ù¸¥ ÁÖ¿ä ¿ë¾îµéÀ»(ÀÌ °æ¿ì¿¡´Â À§Çù°ú Ãë¾à¼º) ½Å·ÚÇÏ°í, ¶ÇÇÑ ¡°°¡´É¼º¡±À̶õ ¿ë¾îÀÇ ¼Ò°³¿Í ÇÔ²² ±× Àǹ̸¦ ¾Ö¸Å¸ðÈ£ÇÑ Ã¼·Î ³²°Ü³õÀº Á¤ÀǸ¦ ÀǽÉÇÑ´Ù.©í

 

³ª´Â À§ÇèÀ» °³º° ÀÚ»ê ¶Ç´Â ÀÚ»ê ±×·ì¿¡ ´ëÇÑ ¼ÕÇØ¿¡ ´ëÇÑ ºÒÈ®½Ç¼ºÀÇ Å©±â(measurement)·Î °£ÁÖÇÏÁö¸¸, ÀÌ ÁÖÀåÀº ´õ ¸¹Àº ¼³¸í°ú Åä·ÐÀ» ÇÊ¿ä·Î ÇÑ´Ù. ³ª´Â ´ÙÀ½¿¡ ¾µ Ä÷³¿¡¼­ ±×°Í¿¡ ´äÇÒ °ÍÀ» ¾à¼ÓÇÑ´Ù.

 

Endnotes

1 In the beginning, there was BS 7799, parts 1 and 2, and it was good. (Actually it was so-so, but a lot has happened since.) BS 7799 begat ISO 17799 with only one part, which begat ISO 27002, which begat ISO 27001, which was, in fact, begotten by BS 7799, part 2. ISO 27001/2 begat ISO 27005 and BS 27006, the security auditing standard. ISO 27003 and ISO 27004 are, at the time of writing, still in the process of being begotten.

2 International Organization for Standardization, ISO/IEC 27001:2005/BS 7799-2:2005, Information Technology—Security Techniques—Requirements, 2005

3 Ross, Steven; ¡°Contents and Context,¡± Information Systems Control Journal, vol. 1, 2006

4 ¡°A threat has the potential to harm assets such as information, processes and systems and therefore organizations.¡± ISO 27005, section 8.2.1.3. Explanatory, in my opinion, but not definitional.

5 Or, more accurately, seismic phenomena, meteorological phenomena and fire.

6 ISO 27005, section 8.2.1.5

7 Ibid., section 3.2

 

Steven J. Ross, CISA, CBCP, CISSP

is a director at Deloitte. He welcomes comments at stross@deloitte.com.

 

 

--------------------------------------------------------------------------------

ISACA Journal, formerly Information Systems Control Journal, is published by ISACA, a nonprofit organization created for the public in 1969. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscript-xion to the ISACA Journal.

Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute and their committees, and from opinions endorsed by authors, employers or the editors of this Journal. ISACA Journal does not attest to the originality of authors¡¯ content.

 

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited.

 

Subscript-xion Rates:

US: one year (6 issues) $75.00

All international orders: one year (6 issues) $90.00

Remittance must be made in US funds.

 


ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
¹ø¿ª¿¡ ´ëÇÑ º¯ (1) ½ÅÀÎö 07-03-24 7830 17
23 IT À§Çè Ž±¸: IT À§Çè °ü¸® ºÐ·ù ¹× ÁøÈ­ By Steve Schlarman, CISM, CISSP ½ÅÀÎö 09-07-09 3712 15
22 IT °Å¹ö³Í½º¿¡¼­ Àü»ç IT °Å¹ö³Í½º·Î À̵¿ By Steven De Haes, Ph.D. and Wim Van Grembergen, Ph.D. ½ÅÀÎö 09-06-03 3058 18
21 Àü»ç IT °Å¹ö³Í½º¿Í IT ¼­ºñ½º °Å¹ö³Ê½ºÀÇ ºñ±³Ç¥ ½ÅÀÎö 09-05-14 3210 12
20 Val IT¸¦ µµÀÔÇϱâ À§ÇÑ 5°¡Áö Çٽɼº°ø¿äÀÎ By Sarah Harries and Peter Harrison ½ÅÀÎö 09-05-06 3830 12
19 ÀÌÀÍ ½ÇÇö°ú ÇÁ·Î±×·¥ °ü¸®: ºñÁî´Ï½º ÄÉÀ̽º¸¦ ³Ê¸Ó¼­ By Sarah Harries and Peter Harrison ½ÅÀÎö 09-04-10 4891 13
18 Æ÷Æ®Æú¸®¿À °ü¸® ±¸ÇöÀÇ µµÀü °úÁ¦ by Sarah Harries and Peter Harrison ½ÅÀÎö 09-03-31 3789 10
17 4 °³ÀÇ »ç¼ÒÇÑ ´Ü¾î: À§Çù, Ãë¾à¼º, °¡´É¼º, À§Çè (Four Little Words) By Steven J. Ross ½ÅÀÎö 09-02-13 7691 18
16 IT °Å¹ö³Í½º ´ë´ã: IT °Å¹ö³Í½º Ãß¼¼ ½ÅÀÎö 08-11-16 3217 7
15 ºñ±ØÀ¸·ÎºÎÅÍ ±³ÈÆ (Lessons from Tragedy) By Steven J. Ross ½ÅÀÎö 08-10-11 3160 7
14 ºñ±ØÀ¸·ÎºÎÅÍ ±³ÈÆ, Àç°í (Lessons from Tragedy, Revisited) By Steven J. Ross ½ÅÀÎö 08-10-08 3299 8
13 CMMI, TOGAF 8.1, IT BPM, NIST 800-14 ¼Ò°³ ½ÅÀÎö 08-06-25 4252 10
12 FIPS PUB 200, ISO/IEC TR 13335, ISO/IEC 15408:2005/COMMON CRITERIA/ITSEC, TickIT ¼Ò°³ ½ÅÀÎö 08-06-24 4000 12
11 PRINCE2, ISO/IEC 17799, PMBOK, ITIL, COBIT ¼Ò°³ ½ÅÀÎö 08-06-24 8033 21
10 °¡Ä¡ °ü¸® ¿ø¸®(Value Management Principles) by Erik Guldentops ½ÅÀÎö 08-06-05 3859 21
9 IT ÇÁ·ÎÁ§Æ® Ãë¼Ò: ´ë°¡ ÁöºÒ, Áö±ÝÀÌ³Ä ³ªÁßÀÌ³Ä by John Thorp ½ÅÀÎö 08-05-05 3602 6
 1  2  3