IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
 
 
HOME > Ä¿¹Â´ÏƼ > ¼­Æò & ¹ø¿ª¹°
  4 °³ÀÇ »ç¼ÒÇÑ ´Ü¾î: À§Çù, Ãë¾à¼º, °¡´É¼º, À§Çè (Four Little Words) By Steven J. Ross
  ±Û¾´ÀÌ : ½ÅÀÎö     ³¯Â¥ : 09-02-13 12:07     Á¶È¸ : 7691     Ãßõ : 18     Æ®·¢¹é ÁÖ¼Ò
4 °³ÀÇ »ç¼ÒÇÑ ´Ü¾î
 
Four Little Words

 

ÀúÀÚ : Steven J. Ross

 

Ãâó : Information Systems Control Journal, Volume 1, 2009

 

 

 

Áö±Ý ISO 27005°¡ ¿Â´Ù.

 

ISO 27000 Ç¥ÁØ ½Ã¸®Áî¿¡ ´ëÇÑ À̹ø Ãß°¡ºÐÀº ¡°ISO/IEC 27005:2008, Á¤º¸±â¼ú-º¸¾È Å×Å©´Ð-Á¤º¸ º¸¾È À§Çè °ü¸®¡±¶ó´Â Ç¥Á¦°¡ ºÙ¾ú´Ù.©ö °£´ÜÇϸ鼭 ÂüÁ¶Çϱ⠽±µµ·Ï ³ª´Â ÀÌ Ç¥ÁØÀ» ISO 27005·Î ºÎ¸¦ °ÍÀÌ´Ù. Á¤º¸ º¸¾ÈÀÇ ÀÔÀå¿¡¼­ À§Çè °ü¸®¿¡ ´ëÇÑ Á÷Á¢ÀûÀÎ Á¢±Ù¹æ¹ýÀ» Á¤ÀÇÇÑ °ÍÀº Á¤º¸ º¸¾È ÀÎÁõ ÇÁ·Î¼¼½º¿¡ °üÇÑ ISO 27001¿¡ Á¸ÀçÇÏ´Â °áÇÔÀ» º¸¿ÏÇÑ °ÍÀÌ´Ù.©÷ ƯÈ÷, Á¤º¸ ½Ã½ºÅÛ °ü¸® ½Ã½ºÅÛ(ISMS)ÀÇ ¼ö¸³À» ¿ä±¸ÇÏ´Â 4 ÀýÀº À§Çè Æò°¡¸¦ ¿ä±¸Çϸ鼭 Á¶Á÷ÀÇ À§Çè Æò°¡ ¹æ¹ý·ÐÀ» Á¤ÀÇÇÏ´Â ÀÏÀ» ÀÎÁõÀ» ¹Þ°íÀÚ ÇÏ´Â Á¶Á÷ ÀÚü¿¡ ¸Ã±â°í ÀÖ´Ù. ÀÌ°ÍÀº ¸ðµç À§ÇèÀÌ (´ëÀÀ) Á¶Ä¡°¡ ¾Æ´Ñ ºÐ¼®¿¡ ÀÇÇؼ­ ºÎÁ¤µÉ ¼ö ÀÖ´Â Æ÷¿ë·ÂÀÌ Å« Á¢±Ù¹æ¹ýÀ» ÃëÇÏ´Â °ÍÀÌ °¡´ÉÇÒ ¼ö ÀÖÀ¸¹Ç·Î ¿ÀÈ÷·Á ¿ìȸÀûÀÌ´Ù(circle).

 

±×·±µ¥, ³ª´Â °ú°Å ISO º¸¾È Ç¥ÁØ¿¡ ´ëÇØ ÀÏ°ü¼º ¹× Àü¹®¼ºÀÇ °á¿©·Î ÀÇ°ßÂ÷¸¦ °¡Áö°í ÀÖ¾úÀ¸³ª, ³»°¡ º¸±â¿¡ À̹ø °ÍÀº Á¦´ë·Î ±¸¼ºµÇ¾î ÀÖÀ¸¸ç À¯¿¬ÇÏ´Ù. ¸î¸î È帧µµ¿¡´Â ¾î¶² Á¤º¸ º¸¾È Àü¹®°¡¶óµµ ±×°ÍÀ» ÀÀ¿ëÇÒ ¼ö ÀÖ´Â ¹æ½ÄÀ¸·Î ÇØ´ç ÇÁ·Î¼¼½º¸¦ º¸¿©ÁØ´Ù. ³ª´Â ƯÈ÷ À§Çè Æò°¡°¡ »óÀ§ ¼öÁØÀ̰ųª ¶Ç´Â »ó¼¼ÇÒ ¼öµµ ÀÖ´Ù´Â ºÎ·Ï E ¿¡¼­ÀÇ ÀÎÁ¤¿¡ Âù»ç¸¦ º¸³½´Ù. ±×°ÍÀº ÇÕ¸®ÀûÀ¸·Î Àß ¸¸µé¾îÁø ¾ð¾î·Î ¾²¿©Á³À¸¸ç ÀÌÇØÇϱ⠽±´Ù - ½¬¿ö¾ß ÇÑ´Ù -.

 

¾Õ¿¡¼­ÀÇ ¿ËÁ¹ÇÑ ÀǽÉÀº Á¤ÀÇ ¹®Á¦ ȤÀº Á¤ÀÇ ´©¶ô ¹× À߸øµÈ Á¤ÀÇ¿¡¼­ ºñ·ÔµÇ¾ú´Ù. ƯÈ÷, µ¶ÀÚ·Î ÇÏ¿©±Ý Á¤ÀÇÇϵµ·Ï ³²°ÜÁø °áÁ¤ÀûÀÎ 3°³ÀÇ ¿ë¾î°¡ ÀÖ°í, ¹«¾ùº¸´Ù °¡Àå Áß¿äÇÑ °ÍÀº Á¦½ÃµÈ ¿ë¾î Á¤ÀÇ¿¡¼­ ¿äÁ¡ÀÌ ºüÁø °ÍÀÌ´Ù. À§Çè °ü¸® Ç¥ÁØ¿¡¼­ À§Çù(threat), Ãë¾à¼º(vulnerability) ±×¸®°í °¡´É¼º(likelihood)¿¡ ´ëÇÑ Á¤ÀÇ°¡ ºüÁ®ÀÖ´Ù´Â °Í¿¡ ¼Ò¸§ÀÌ µ¸´Â´Ù. °Ô´Ù°¡, ³ª´Â À§Çè °ü¸® Ç¥ÁØÀ̶ó¸é À§ÇèÀ̶õ ¿ë¾î´Â ¾ö¹ÐÈ÷ ¼³¸íµÇ¾î Àֱ⸦ ±â´ëÇß¾ú´Ù; ³ª´Â ISO 27005¿¡ ³ª¿ÍÀÖ´Â ¼³¸í°ú ´Ù¸¥ °ßÇظ¦ °¡Áö°í ÀÖ´Ù. ±×¸®ÇÏ¿©, °ø°³ ¼­ºñ½º Á¤½Å¿¡ ÀÔ°¢ÇÏ¿©, »ý·« ¹× À§ÀÓÀÇ Á˸¦ ¹Ù·Î Àâ±â À§ÇÏ¿© º» Ä÷³Àº ¿ë±â¸¦ °®°í ¹àÈú °ÍÀÌ´Ù. (ÁÁ¾Æ¿ä, Á˶ó°í ÇÑ °ÍÀº Á¶±ÝÀº Áö³ªÄ¡Áö¸¸, °ËÅ並 ¿ëÀÎÇØ¾ß ÇÒ ¿ë¾îµéÀº Á¸ÀçÇÑ´Ù.)

 

À§Çù(Threat)

 

ÀÌ·¯ÇÑ »ó´çÈ÷ Áß½ÉÀûÀÎ ¿ë¾î¸¦ Á¤ÀÇÇϴµ¥ ÀǵµÇÏÁö ¾ÊÀº ½Ãµµ°¡ ÀÖÀ¸³ª,©ù ¡°À§ÇùÀº ÀǵµÀû, ¿ì¹ßÀû ¾Æ´Ï¸é (ÀÚ¿¬) ȯ°æÀûÀÌ¸ç ±×¸®°í, ¿¹¸¦ µé¾î¼­, Áß¿äÇÑ ¼­ºñ½ºÀÇ ¼ÕÇØ È¤Àº ¼Õ½ÇÀ» ÃÊ·¡ÇÑ´Ù.¡± ¸¦ ÀÌÇØÇϱâ À§Çؼ­ »ç¶÷Àº ºÎ·Ï C¿¡ ´ëÇØ °­ÇÏ°Ô ÁÖÀåÇؾ߸¸ ÇÑ´Ù. ¡°¿¹¸¦ µé¾î¼­¡±¶ó´Â ÇÑÁ¤¾î´Â À§ÇùÀ¸·ÎºÎÅÍ ¶Ç ´Ù¸¥ °á°úµéÀÌ ³ª¿Ã ¼ö ÀÖ´Ù´Â Á¡°ú ÀÌ·Î ÀÎÇؼ­ ºÎ·Ï C-ÆĶó¿À ºí·¯½Ã(pharaoh blush)¸¦ ¸¸µå´Â õÀçÁöº¯ ¸ñ·Ï-¿¡ µé¾îÀÖ´Â Å×ÀÌºí ¾È¿¡ ÀÖ´Â °Í ÀÌ¿Ü¿¡ À§ÇùÀ» ÀÌÇØÇÏ´Â ´Ù¸¥ ¹æ½ÄÀÌ ÀÖÀ» ¼ö ÀÖ´Ù´Â »ý°¢À» °®°Ô ÇÑ´Ù. ±× ºÎ·Ï¿¡´Â ¿À·¡µÈ ¹ÏÀ»¸¸ÇÑ °ÍµéÀÌ µé¾î ÀÖ´Ù: ÁöÁø, ¹Ù¶÷ ±×¸®°í È­Àç.©ë ´ÙÀ½°ú °°Àº ´õ¿í ºÒ°¡»çÀÇÇÑ »ç·Êµéµµ µé¾î ÀÖ´Ù: ÀüÀÚ¼®Àû ¹æ»ç, ÀǽɹÞÀ» ¹æÇØ ½ÅÈ£ÀÇ Â÷´Ü, ±×¸®°í ±Ç¸®ÀÇ À§Á¶. ÇØÄ¿, Å©·¡Ä¿, ¹üÁËÀÚ, Å×·¯¸®½ºÆ®, Æı« È°µ¿°¡, ¾ÇÀÇÀûÀÎ ³»ºÎÀÚµéÀ» ÁöĪÇÏ´Â Àΰ£Àû À§Çù ¿øõÀº Ưº°ÇÑ ÁÖÀǸ¦ ¿äÇÑ´Ù.

 

¿¹½ÃµÈ Á¤ÀÇ´Â ¸í·áÇÔÀÇ °á¿©¸¦ º¸¿©ÁÖ°í ±×¸®°í, À½¶õ¹°°ú °ü·ÃÇÏ¿© ¹Ì±¹ ÃÖ°í¹ýÁ¤ ÆÇ»çÀÎ Æ÷ÅÍ ½ºÆ©¾îÆ®¿¡ ÀÇÇØ À¯¸íÇØÁø Æø³ÐÀº ÁÖ°üÀû Çؼ®¿¡ ´ëÇÑ ¿©Áö¸¦ ³²°Ü ³õ¾Ò´Ù: ¡°³ª´Â ±×°Í(Æ÷¸£³ë)À» Á¤ÀÇÇÒ ¼ö´Â ¾øÀ¸³ª º¸¸é ¾È´Ù.¡± ±× ÈÄ·Î ¹Ì±¹ ¹ýÁ¤¿¡¼­´Â Á¤È®È÷ ´©°¡ ¹«¾ùÀ» º¸¾Ò´Â°¡¿¡ ´ëÇÑ ³íÀïÀÌ ÀϾ´Ù.

 

À§ÇùÀº ´Ü¼øÈ÷ ¼ÕÇظ¦ ÀÏÀ¸Å³ ¼ö Àֱ⠶§¹®¿¡ À§ÇùÀΰ¡? ±×·± °æ¿ì¿¡´Â, °Å´ëÇÑ ½ÄÀÎ °³±¸¸®µµ ¸ðµç À§Çè Æò°¡¿¡¼­ ´Ù·ïÁ®¾ß ÇÏ´Â À§ÇèÇÑ °ÍÀÌ´Ù. öÀÚ¸¦ À߸ø ¾´ °ÍÀº ¾î¶»°í; ±×·¯ÇÑ ÀÏÀº °íµîÇб³¿¡¼­ ¿©·¯ºÐÀÇ ¼ºÀûÀ» ¶³¾î¶ß¸®´Â °ÍÀº °¡´ÉÇÏÁö¸¸, ÁÖ¿ä ÄÄÇ»Æà ȯ°æ¿¡¼­´Â ½É°¢ÇÑ À§ÇùÀ¸·Î °ÅÀÇ °í·ÁÇÏÁö ¾Ê´Â´Ù. ºÎ·Ï C¿¡´Â ÇÔ¼öÀÇ À§ÇèÈ­(compromise of functions)¶ó ºÎ¸£´Â ±×·¯ÇÑ À¯ÇüÀÇ À§Çù¿¡ ´ëÇÑ ¿¹½Ã·Î ¡°»ç¿ëÁß ¿À·ù error in use¡±°¡ µé¾î ÀÖ´Ù. À¯È¤¿¡ ºüÁö±â ½¬¿î »ç¶÷µéÀÎ ¿ì¸® Àΰ£Àº ¸ðµç Á¤º¸½Ã½ºÅÛ¿¡ ´ëÇØ À§ÇùÀÌ ¾Æ´Ï°Ú´Â°¡?

 

³ª´Â À§ÇùÀ» ¡°Á¤º¸½Ã½ºÅÛ¿¡, Á¤º¸½Ã½ºÅÛ ÀÚüÀûÀ¸·Î º¸¸é ¿ÜºÎ, Áß¿äÇÑ ¼ÕÇظ¦ ³¢Ä¡´Â È®½ÇÇÑ ¿øõ¡±À¸·Î Á¤ÀÇÇÏ°íÀÚ ÇÑ´Ù. È®½Ç¼ºÀº ±×·¯ÇÑ(°Å´ëÇÑ ½ÄÀÎ) °³±¸¸®µéÀ» Á¦°ÅÇÑ´Ù; Á߿伺Àº ÇÏÂúÀº ½Ç¼ö¸¦ Á¦°ÅÇÑ´Ù; ±×¸®°í ¿ÜÀû ¿µÇâÀº ¿¡·¯¸¦ Á¦°ÅÇÑ´Ù. ³ª´Â ¿¡·¯¸¦ À§Çù¿¡¼­ »©³»¾ú´Ù, ¿Ö³ÄÇÏ¸é ¿¡·¯¸¦ ¹üÇÒ °Í °°Àº »ç¶÷µéÀº ¿ÀÁ÷ ±×µéÀÌ ÇØ´ç ½Ã½ºÅÛ ¾È¿¡ ÀÖ¾î¾ß¸¸ Áß´ëÇÑ ¼ÕÇظ¦ ÃÊ·¡ÇÑ´Ù.

 

Ãë¾à¼º(Vulnerability)

 

Ãë¾à¼ºÀ̶õ ÀÌ¿ëµÇ¾îÁö¸é Á¤º¸½Ã½ºÅÛ¿¡ Áß´ëÇÑ ¼ÕÇظ¦ ÃÊ·¡ÇÒ ¼ö ÀÖ´Â ³»ºÎ Ãë¾àÁ¡(weaknesses)ÀÌ´Ù. ISO 27005 µµ ¡°Ãë¾à¼ºÀº Á¸Àç ÀÚü¸¸À¸·Î´Â ¼ÕÇظ¦ À¯¹ßÇÏÁö ¾Ê´Â´Ù, µû¶ó¼­ ±×°ÍÀ» ÀÌ¿ëÇÏ°íÀÚ ÇÏ´Â À§ÇùÀÌ Á¸ÀçÇÒ ÇÊ¿ä°¡ ÀÖ´Ù. »óÀÀÇÏ´Â À§ÇùÀÌ ÀüÇô ¾ø´Â Ãë¾à¼º¿¡ ´ëÇؼ­´Â ÅëÁ¦¸¦ ±¸ÇöÇÒ ÇÊ¿ä´Â ¾øÀ¸³ª, (Ãë¾à¼ºÀÇ) º¯È­¿¡ ´ëÇÏ¿© ÀνÄÇÏ°í ¸ð´ÏÅÍÇÏ¿©¾ß ÇÑ´Ù¡±¶ó°í ¹àÈ÷´Â Á¡¿¡¼­ ÀÌ·¯ÇÑ Á¤ÀÇ¿¡ µ¿ÀÇÇÏ´Â °Í °°´Ù.©ì ±×·¸Áö¸¸, °ø½ÄÀûÀÎ Á¤ÀÇÀÇ ºÎÀç´Â Ç¥ÁØ¿¡ ´ëÇÑ Çؼ®À» ÀÚÀ¯·Ó°Ô ¹æÄ¡ÇÏ´Â °ÍÀε¥, ±×°ÍÀº À§Çè °ü¸® ¹× º¸¾È ¸ðµÎ¿¡ ÇØ°¡ µÉ ¼ö ÀÖ´Ù.

 

Á¤º¸½Ã½ºÅÛÀÌ Ãë¾àÇÏ´Ù´Â °ÍÀº (¾ö¿¬ÇÑ) »ç½ÇÀÌ´Ù. ÇÑ°¡Áö ¿¹·Î, ½Ã½ºÅÛÀº »ç¶÷¿¡ ÀÇÇØ °³¹ßµÇ°í, ±¸ÇöµÇ°í ±×¸®°í ¿î¿µµÈ´Ù. ±×·¸±â ¶§¹®¿¡ ¾Õ¼­ ¾ð±ÞµÈ ¡°»ç¿ë»ó ¿À·ù¡±´Â ¸ðµç »ç¶÷¿¡°Ô º»ÁúÀûÀÌ´Ù. ÇÁ·Î±×·¡¸Ó³ª °ü¸®ÀÚ°¡ ³ªÁß¿¡ ÀڽŵéÀÌ ÀÌ¿ëÇÒ ¼ö ÀÖµµ·Ï Çϱâ À§ÇÏ¿© ¾ÇÀÇÀûÀ¸·Î ½Ã½ºÅÛ ³»¿¡ °áÇÔÀ» ¹èÄ¡ÇÏ´Â »ç·ÊµéÀÌ ºÐ¸íÈ÷ ÀÖ´Â ¹Ý¸é, ´ëºÎºÐÀÇ Ãë¾à¼ºÀº º¹À⼺, ¹«½Ã ȤÀº ´ëóÇÏ´Â ÅëÁ¦ ºñ¿ë °°Àº ¿ä¼Ò·ÎºÎÅÍ ¹ß»ýÇÑ´Ù.

 

À§Çè °ü¸® - ¹× ±×¿¡ ´ëÇÑ °¨»ç - ÀÇ ¿äÁ¡Àº Ãë¾à¼ºÀÌ ¾Ç¿ëµÉ ¼ö ÀÖ±â Àü¿¡ ±×°ÍµéÀ» È®ÀÎÇÏ°í ±³Á¤ÇÏ´Â °Í, ¾Æ´Ï¸é ÃÖ¼ÒÇÑ ÇØ´ç À§ÇùµéÀÌ ´õ ÀÌ»ó Àǹ̰¡ ¾øÀ» ¶§±îÁö Ãë¾à¼ºÀ» ¾Ç¿ëÇÒÁöµµ ¸ð¸£´Â °¡´ÉÇÑ À§ÇùµéÀÇ ¹üÀ§¸¦ Á¦ÇÑÇÏ´Â °ÍÀÌ´Ù. ½Ã½ºÅÛÀº ¼³°è °úÁ¤¿¡¼­ÀÇ ¿À·ù (ȤÀº °íÀÇ·Î µµÀÔµÈ ¹ÌºñÁ¡) °¡ ÀÖÀ»Áö ¸ð¸¥´Ù; ÇÁ·Î±×·¡¹Ö °úÁ¤¿¡¼­; ȤÀº ½ÃÇè, ±¸Çö, ¿î¿µ, ÀúÀå ȤÀº »ç¿ë Áß¿¡; ³» »ý°¢¿¡´Â ÀÌ·¯ÇÑ Ãë¾à¼ºÀÇ ¸ðµç ¿øõµéÀ» ÇÔ²² Ãë±ÞÇÏ°í ±× °á°úµéÀ» °áÇÕ½ÃÅ°´Â °ÍÀº À§Çè¿¡ ´ëÇÑ ¹«±â·ÂÇÏ°í ±Ã±ØÀûÀ¸·Î´Â ÇêµÈ Æò°¡ ¹× Ãë±ÞÀ» ³º´Â´Ù.

 

ISO 27005 Ç¥ÁØ ºÎ·Ï D¿¡ ³ªÅ¸³ª ÀÖ´Â À§Çù¿¡ ´ëÇÑ ºÐ·ùó·³, Ãë¾à¼º¿¡µµ ºÐ·ù¹ýÀÌ ÀÖ´Ù. ÀÌ ºÎ·Ï¿¡ ³ªÅ¸³­ ¿¹½ÃµéÀÌ °¡Ä¡ÀÖ´Â °ÍÀ̳ª, (°Ü¿ì) 2 ÆäÀÌÁö ¹Ý ±æÀÌÀÇ ¸®½ºÆ®¿¡ ¸ðµÎ ´ã¾Ò´Ù°í °¨È÷ ÁÖÀåÇÒ ¼ö´Â ¾ø´Ù.

 

°¡´É¼º(Likelihood)

 

ISO 27005 Ç¥ÁØ ¼½¼Ç 3.5¿¡´Â, À§ÇèÀ» ÃøÁ¤Çϱâ À§Çؼ­ ¡°È®·ü probability¡± ´ë½Å ¡°°¡´É¼º likelihood¡±ÀÌ ¸í½ÃÀûÀ¸·Î ¾²ÀÌ°í ÀÖ´Ù. È®·üÀº ¿¹ÃøÀÌ °¡´ÉÇÏ´Ù; ±×°ÍÀº ÁÖ¾îÁø ½Ã°£ µ¿¾ÈÀÇ ¹ß»ý Ƚ¼öÀÌ´Ù. ÀüÈÄ °ü°è¸¦ º¸¾Æ, ¿ì¸®´Â È®·üÀ» °ú°Å·ÎºÎÅÍ ¹Ì·¡¸¦ ÃßÁ¤Çϴµ¥ ÀÌ¿ëÇÑ´Ù. °ú°Å ¾î¶°ÇÑ ´Þ¿¡ ¹ß»ýÇÑ ÀÏÀº À̹ø ´Þ ±×¸®°í ´ÙÀ½ ´Þ¿¡µµ ¹ß»ýÇÒ °ÍÀÌ´Ù. °¡´É¼ºÀº ÀüÀûÀ¸·Î ÁÖ°üÀûÀÌ°í °æÇèÀûÀÌ´Ù. ¹Ì±¹ ¾Ö¸®Á¶³ªÁÖÀÇ ÇǴнº¿¡ º¸´Ù ·±´ø¿¡ ºñ°¡ ¿Ã °¡´É¼ºÀÌ ´õ ¸¹Áö¸¸, »ç¶÷Àº µÎ °÷ÀÇ ³¯¾¾¿¡ Ä£¼÷Çؾ߸¸ ÀÌ°ÍÀ» ¾Ë ¼ö ÀÖ´Ù. ±×·¯ÇÑ Áö½Äµµ ¹Ù·Î ¿À´Ã ¾î´À °÷¿¡ ºñ°¡ ³»¸± °ÍÀΰ¡¿¡ ´ëÇÑ Â¡ÈÄ´Â °ÅÀÇ Á¦°øÇÏÁö ¾Ê´Â´Ù. ºñ½ÁÇÏ°Ô, º¸¾È °áÇÔÀº Á¢±Ù ÅëÁ¦, °¨»ç ÁõÀû, ħÀÔ Å½Áö, µîµî¿¡ ´ëÇÑ Á¤±³ÇÑ ¸ÞÄ¿´ÏÁòÀ» °¡Áø ½Ã½ºÅÛ º¸´Ù´Â ´ú º¸È£µÈ ½Ã½ºÅÛ¿¡¼­ ¹ß»ýÇÒ °¡´É¼ºÀÌ ´õ ÀÖ´Ù. ÃøÁ¤ÇÒ ¼öµµ ¾øÀ¸¸ç ¾ÆÁ÷ ¾Ë·ÁÁöÁö ¾ÊÀº °ÍÀÌ ¾ó¸¶³ª ¸¹°Ú´Â°¡.

 

ÇöÀç·Î¼­´Â ÁÖ°üÀûÀÎ ºÐ¼®¿¡ À־ º»ÁúÀûÀ¸·Î À߸øµÈ °ÍÀº ¾Æ¹« °Íµµ ¾øÁö¸¸, ºÐ¸í ºÐ¼®°¡ÀÇ Áö½ÄÀ̳ª ¼Ø¾¾(skills)¿¡ ÀÇÁ¸ÇÑ´Ù. ¾î¶°ÇÑ È°µ¿À» ÀÌÇàÇϴ ǥÁØ ¹æ¹ýÀº ´©°¡ ±×°ÍÀ» ¼öÇàÇϴ°¡¿¡ »ó°ü¾øÀÌ µ¿ÀÏÇϰųª ¾Æ´Ï¸é ÃÖ¼ÒÇÑ ºñ½ÁÇÑ °á°ú¸¦ ³º¾Æ¾ß ÇÑ´Ù. È®·üÀ̶ó´Â ¿ë¾î¸¦ ȸÇÇÇÔÀ¸·Î½á, ISO 27005´Â ÀÏÁ¤ÇÏ°Ô ¾Ë ¼ö ¾ø´Â °´°üÀûÀÎ »ç½ÇµéÀÇ ºóÆ´À» Á¶Á¾ÇÏÁö¸¸, Á¾±¹¿¡ À־ À§Çè °ü¸®´Â È¿°ú¿¡ ´ëÇÑ ´Ù¾çÇÑ Çؼ®À» ÀÚÀ¯·Ó°Ô ¹æÄ¡Çϸç, ¶ÇÇÑ Æ¯Á¤ À§ÇèÀ» ´Ù·ç°í Ưº°ÇÑ ÅëÁ¦¸¦ Àû¿ëÇÒ ¿ä±¸¿¡ ´ëÇÑ ¼­·Î ´Ù¸¥ ÀÌÇظ¦ ³º´Â´Ù.

 

À§Çè

 

ISO 27005´Â ÀûÁ¤ÇÑ ºÎºÐ ÁýÇÕÀÎ Á¤º¸ º¸¾È À§ÇèÀ» Á¤ÀÇÇÑ´Ù: ¡°Æ¯Á¤ À§ÇùÀÌ °³º° ÀÚ»ê ¶Ç´Â ÀÚ»ê ±×·ìÀÇ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ¿© Á¶Á÷¿¡ ¼ÕÇظ¦ ³¢Ä¥ °¡´É¼º.¡± ³ª´Â Á¤ÀǵÇÁö ¾ÊÀº ´Ù¸¥ ÁÖ¿ä ¿ë¾îµéÀ»(ÀÌ °æ¿ì¿¡´Â À§Çù°ú Ãë¾à¼º) ½Å·ÚÇÏ°í, ¶ÇÇÑ ¡°°¡´É¼º¡±À̶õ ¿ë¾îÀÇ ¼Ò°³¿Í ÇÔ²² ±× Àǹ̸¦ ¾Ö¸Å¸ðÈ£ÇÑ Ã¼·Î ³²°Ü³õÀº Á¤ÀǸ¦ ÀǽÉÇÑ´Ù.©í

 

³ª´Â À§ÇèÀ» °³º° ÀÚ»ê ¶Ç´Â ÀÚ»ê ±×·ì¿¡ ´ëÇÑ ¼ÕÇØ¿¡ ´ëÇÑ ºÒÈ®½Ç¼ºÀÇ Å©±â(measurement)·Î °£ÁÖÇÏÁö¸¸, ÀÌ ÁÖÀåÀº ´õ ¸¹Àº ¼³¸í°ú Åä·ÐÀ» ÇÊ¿ä·Î ÇÑ´Ù. ³ª´Â ´ÙÀ½¿¡ ¾µ Ä÷³¿¡¼­ ±×°Í¿¡ ´äÇÒ °ÍÀ» ¾à¼ÓÇÑ´Ù.

 

Endnotes

1 In the beginning, there was BS 7799, parts 1 and 2, and it was good. (Actually it was so-so, but a lot has happened since.) BS 7799 begat ISO 17799 with only one part, which begat ISO 27002, which begat ISO 27001, which was, in fact, begotten by BS 7799, part 2. ISO 27001/2 begat ISO 27005 and BS 27006, the security auditing standard. ISO 27003 and ISO 27004 are, at the time of writing, still in the process of being begotten.

2 International Organization for Standardization, ISO/IEC 27001:2005/BS 7799-2:2005, Information Technology—Security Techniques—Requirements, 2005

3 Ross, Steven; ¡°Contents and Context,¡± Information Systems Control Journal, vol. 1, 2006

4 ¡°A threat has the potential to harm assets such as information, processes and systems and therefore organizations.¡± ISO 27005, section 8.2.1.3. Explanatory, in my opinion, but not definitional.

5 Or, more accurately, seismic phenomena, meteorological phenomena and fire.

6 ISO 27005, section 8.2.1.5

7 Ibid., section 3.2

 

Steven J. Ross, CISA, CBCP, CISSP

is a director at Deloitte. He welcomes comments at stross@deloitte.com.

 

 

--------------------------------------------------------------------------------

ISACA Journal, formerly Information Systems Control Journal, is published by ISACA, a nonprofit organization created for the public in 1969. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscript-xion to the ISACA Journal.

Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute and their committees, and from opinions endorsed by authors, employers or the editors of this Journal. ISACA Journal does not attest to the originality of authors¡¯ content.

 

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited.

 

Subscript-xion Rates:

US: one year (6 issues) $75.00

All international orders: one year (6 issues) $90.00

Remittance must be made in US funds.

 


ÀÇ°ß¾²±â

¹øÈ£ Á¦¸ñ ±Û¾´ÀÌ ³¯Â¥ Á¶È¸ Ãßõ
¹ø¿ª¿¡ ´ëÇÑ º¯ (1) ½ÅÀÎö 07-03-24 7831 17
38 ¿£ÅÍÇÁ¶óÀÌÁîÀÇ °³³ä ½ÅÀÎö 13-01-08 2402 8
37 ÅëÁ¦¸¦ Áø´ÜÇϱâ Àü¿¡ ´øÁ®¾ß ÇÒ 5°¡Áö Áú¹® By Brian Barnier, CGEIT ½ÅÀÎö 11-06-13 2673 9
36 Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ, ¹ý±Ô ±×¸®°í µ¥ÀÌÅÍ º¸¾È À§Çè¿¡ °üÇÑ ÀÔ¹® By Carl Cadregari, and Alfonzo Cutaia, Esq (4) ½ÅÀÎö 11-05-31 5441 20
35 Àü»ç À§Çè °ü¸®¿¡¼­ÀÇ IT ½Ã³ª¸®¿À ºÐ¼® By Urs Fischer, CISA, CRISC, CPA Swiss ½ÅÀÎö 11-05-04 5290 11
34 º¸¾ÈÀÇ °¡Ä¡´Â ¹«¾ùÀΰ¡? By Steven J. Ross, CISA, CISSP, MBCP ½ÅÀÎö 11-04-17 3233 10
33 º¸¾È Á¤Ã¥À» ÀÛ¼ºÇÏ´Â ¹æ¹ý: ³×Æ®¿öÅ© º¸¾È Á¤Ã¥ ¸Å´º¾ó by Paul R. Meynen ½ÅÀÎö 11-03-25 3579 14
32 ¼ÒÇÁÆ® IT °Å¹ö³Í½º By Kazuhiro Uehara, CGEIT, CISA, CIA, PMP, and Sayaka Akino, CISA ½ÅÀÎö 11-01-31 3522 13
31 IS °³¹ß ÇÁ·ÎÁ§Æ®¿¡¼­ À§Çè °ü¸®¸¦ À§ÇÑ ¡®¿ä±¸»çÇ× ÁïÈZ¡¯ °ü¸® by Sachidanandam Sakthivel ½ÅÀÎö 11-01-20 3456 12
30 ÇÑ°¡Áö Áß¿äÇÑ Áú¹® by Steven J. Ross ½ÅÀÎö 11-01-11 3184 13
29 ¼­ºñ½º °¡¿ë¼º°ú ÀçÇØ º¹±¸ by Steven J. Ross ½ÅÀÎö 11-01-05 4572 13
28 ISO/IEC 38500 ¿¡ ±â¹ÝÇÑ IT °Å¹ö³Í½ºÀÇ ±Ùº» by Haris Hamidovic ½ÅÀÎö 10-12-02 5111 15
27 IT À§Çè ºÐ¼® – ºü¶ß¸°¡°A¡± By Eric J. Brown and William A. Yarberry Jr., ½ÅÀÎö 10-11-08 3766 20
26 Ŭ¶ó¿ìµå ÄÄÇ»ÆÃÀÇ ÇöȤ (Cloudy Daze) by Steven J. Ross ½ÅÀÎö 10-03-03 3936 16
25 IT °Å¹ö³Í½º¸¦ ÇÑ Â÷¿ø ²ø¾î¿Ã¸®±â À§ÇÑ 5°¡Áö ÆÁ By Brian Barnier ½ÅÀÎö 10-01-22 3341 14
24 ¿ä¾à: ¸Å·ÂÀÖ´Â ÀüÇâÀû °Å¹ö³Í½º ¸ÅÇÎ À̴ϼÅƼºê By ISACA (¹ø¿ªÀÚ Ãßõ) ½ÅÀÎö 09-08-10 3627 13
 1  2  3