ããã®ã»ãã¥ãªãã£ã¢ããªã¹ãã®å®åã®è¯ïŒ äŸµå®³äºæ
åæããå®ç¿ã§èº«ã«ã€ããŸãããã
ã»ãã¥ãªãã£ã¢ããªã¹ã ã®åºæ¬ã¹ãã«ã ã€ã³ã·ãã³ãåæïŒð¡ äŸµå®³äºæ
ãšã¯ïŒ
æ
å ±éä¿¡ç¶²æ³ç¬¬2æ¡ç¬¬1é
第7å· ã«ãããšããäŸµå®³äºæ
ããšã¯ããããã³ã°ãã³ã³ãã¥ãŒã¿ãŠã€ã«ã¹ãè«çç匟ãã¡ãŒã«ç匟ããµãŒãã¹æåŠããŸãã¯é«åºåé»ç£æ³¢ãªã©ã®æ¹æ³ã§æ
å ±éä¿¡ç¶²ãŸãã¯ããã«é¢é£ããæ
å ±ã·ã¹ãã ãæ»æããè¡çºã«ãã£ãŠçºçããäºæ
ããæå³ããŸãã" refers to "a situation caused by an act of attacking information and communications networks or related information systems through methods such as hacking, computer viruses, logic bombs, mail bombs, denial of service, or high-power electromagnetic waves."æ
å ±è³ç£é¢é£ã·ã¹ãã ã§çºçããäŸµå®³äºæ
ã¯ãã·ã¹ãã ããã³ã¢ããªã±ãŒã·ã§ã³ã§ç°åžžåäœãçºç ãããã管çè
ãæå³ããªãçŸè±¡ïŒåé€ãä¿®æ£ãæµåºãªã©ïŒãæ»æè
ã«ãã£ãŠçºç ãããããå Žåãæå³ããŸãã ãµã€ããŒäŸµå®³äºæ
ãçºçããå ŽåãäŒæ¥ã¯è¿
éã«è¢«å®³ç¯å²ãææ¡ããäºæ
ã®åæŸãéããŠããžãã¹ãžã®åœ±é¿ãæå°éã«æããªããã°ãªããŸãããæ¥çã§æ±ããããæ³èŠãŸãã¯ã³ã³ãã©ã€ã¢ã³ã¹éµå®ã®ããã«å¿
èŠãªæŽ»åãæŒããå Žåãé¢é£æ³èŠãèŠå®ã«ããåŠçœ°ã远å ã®å±¥è¡é
ç®ãçºçããå¯èœæ§ããããŸããããžãã¹ãžã®åœ±é¿ãæå°éã«ãããããäŒæ¥ã®ã»ãã¥ãªãã£ããŒã ãåºå ±ããŒã ãæ³åããŒã ãªã©ãå
šç€Ÿçã«äºæ
察å¿ã«éäžããŸããäŒæ¥ã§ã¯ãã»ãã¥ãªãã£äºæ
ãçºçããéã«å¯Ÿå¿ããããã«å¿
èŠãªå¿
é æŽ»åããæš¡æ¬èšç·ŽãéããŠå¹ŽéãŸãã¯ååæããšã«å®æœããŠããŸãã
ã»ãã¥ãªãã£ã¢ããªã¹ãã¯ãäŒæ¥ãçµç¹ã§äŸµå®³äºæ
ãçºçãããæ³çåé¡ãçãããããå Žåã«ãäºæ
åææ¥åãéè¡ããŸããããŸããŸãªåå ã§çºçããã·ã¹ãã ç°åžžã®åå ãææ¡ããããã«ã¯ãããããåé¡ç¶æ³ãå€å¥ã§ããèœåãå¿
èŠã§ããç¹ã«ãå€éšããã®äŸµå
¥ãå
éšåŸæ¥å¡ã«ããäŸµå®³äºæ
ãçºçããå Žåãäºæ
åæãéããŠã·ã¹ãã ã®è¢«å®³ç¶æ³ããã³äŸµå®³åå ã®åææ¥åãéè¡ããããšãã»ãã¥ãªãã£ã¢ããªã¹ãã®åœ¹å²ã§ãã
äŒæ¥ã®äºæ
被害ãåæããäºæ
ãåçºããªããã察å¿çãå°ãåºãããã«ã¯ãæ£ç¢ºãªäºæ
åå ãåæããããšãæãéèŠã§ããããããå®éã«äºæ
åæã®éçšãçµéšããããšã¯éåžžã«çšã§ãããé£ããããšã§ããããŸãã
ãBig Rootã ãšããçšèªã¯ãäžè¬çã«åé¡ãç¶æ³ã®è€éãã匷調ããéã«äœ¿çšãããŸãããBig Rootãã¯åé¡ã®æ ¹æºã倧ããè€éã§ããããšãæå³ããŸããããã¯ãåé¡ãåçŽãªåå ãèŠå ã ãã«éå®ãããã倿§ãªèŠå ãè€éã«çµ¡ã¿åã£ãŠããããš ã瀺ããŠããŸãã.
é«åºŠåããããµã€ããŒæ»æã«ããäŸµå®³äºæ
ãã衚é¢åããã·ã¹ãã åæã ãã§ã¯äºæ
åå ã®åé¡è§£æ±ºãå°é£ã§ããé«åºŠãªæ»æã«ãã£ãŠäºæ
ãç¹°ãè¿ãåçºããäŒæ¥ã®ããžãã¹ã«æç¶çãªè¢«å®³ãäžããããšã«ãªããŸããäŒæ¥ã®ã»ãã¥ãªãã£ããŒã ã¯ãã»ãã¥ãªãã£äºæ
ã®æ ¹æ¬åå ïŒroot causeïŒãšäŸµå
¥çµè·¯ïŒvectorïŒãç¹å®ããããã«ãåæã®éçšã§å€æ§ãªã·ã¹ãã ããœãªã¥ãŒã·ã§ã³ã®æ
å ±ã確èªããå¿
èŠããããŸãã
è¬çŸ©ãéããŠäŸµå®³äºæ
察å¿ã®æé ã«ã€ããŠèª¬æããäŒæ¥ã«æ·±å»ãªè¢«å®³ããããããµã€ããŒã»ãã¥ãªãã£äºæ
ã®é¡åãšåå ã«ã€ããŠåŠç¿ããŸãããããã³ã°äºæ
ã®åå ãšãªãã»ãã¥ãªãã£è匱æ§ãæ ¹æ¬çã«è§£æ±ºããããã«å¿
èŠãªèœåãåŠç¿ããŸãã
æŠå¿µããå®åãŸã§ äŸµå®³äºæ
åæã®åºç€ãå®åäºäŸã«é¡äŒŒããäŸµå®³äºæ
åæãã¬ãŒãã³ã°ãéããŠã äºæ
åæèœåã®åäžãå³ãããšãã§ããŸãã
ã»ãã¥ãªãã£ã¢ããªã¹ããšããŠã®æ¥åãéè¡ããããã®åºç€ç¥èã身ã«ã€ããåæããŒã«ãå®ç¿ããŸãã ãããã¯ãŒã¯éä¿¡ãšã¢ããªã±ãŒã·ã§ã³ãžã®çè§£ã«åºã¥ãããµã€ããŒã»ãã¥ãªãã£äºæ
ã®åå ãçªãæ¢ããŸãã æ§ã
ãªã»ãã¥ãªãã£æ©åšããçºçããè
åšãã°ãåæãã䟵å
¥ã詊ã¿ãæ»æè
ãç¹å®ããããšãã§ããŸãã äŒæ¥ãžã®äŸµå
¥å¯Ÿå¿ããã³åææ¥åã®éè¡ã«å¿
èŠãªãå®åç芳ç¹ããã®äŸµå®³äºæ
åæææ³ãåŠç¿ããŸãã ãã®è¬çŸ©ã§ã¯ãäŒæ¥ã«ããã䟵å
¥å¯Ÿå¿ããã³åææ¥åã®éè¡ã«å¿
èŠãªãå®åç芳ç¹ããã®ã€ã³ã·ãã³ãåæææ³ ãå
±ã«èŠãŠãããŸãããããã¯ãŒã¯ããŒã¹ã®äŸµå
¥æ€ç¥ãã°ããããã¯ãŒã¯ãã±ããåææ¥åãè¡ãå®åæ
åœè
ã«ãã»ãã¥ãªãã£ã¢ããªã¹ããåææã«å¿
èŠãšããç¥èãåæããŒã«ã®æŽ»çšããŠããŠãæäŸããåæãéããŠã©ã®ãããªçµæãèŠã€ãåºãã¹ããã説æããŸãã
ç¹ã«ãã»ãã¥ãªãã£åææ¥åãéè¡ããŠãããšã倿§ãªãã°ãåæããŒã«ã䜿çšããããšã«ãªããŸãã䟵å
¥æ€ç¥ã·ã¹ãã ïŒIDSïŒã®ãã°åæãWebãµãŒããŒãã°ããããã¯ãŒã¯ãã±ããåææ¥åã«æºããããæ¹ã®ããã«ãè
åšåæã®åºç€æŠå¿µãšå®åæè¡ã説æããããšæããŸããåºæ¬æŠå¿µããã³æè¡ãšãèè
ãæ¥åã§ç¿åŸããããŠããŠã䜵ããŠèª¬æããããšã§ãåè¬çã®çæ§ã®æ¥åéè¡èœåãåäžãããäžå©ãšãªãã°å¹žãã§ãã
äºæ
åæã®ããã«åæããæ
å ±ã¯ã代衚çãªãã®ãšããŠãŠã§ããã°ãIDS/IPSãã°ããããã¯ãŒã¯ãã±ãããã°ããããŸããå®éã®ã»ãã¥ãªãã£äºæ
ãçºçããã·ã¹ãã ã®ãã°ãåæããªãããäºæ
察å¿èšç·Žã宿œ ããäºå®ã§ããæåŸã«ããã£ãªã¢ç®¡çã®èгç¹ãããä»åŸã©ã®ããã«ãã£ãªã¢ãç¯ããŠãããã«ã€ããŠãå
±æããäºå®ã§ãã
å¹ççãªåæåŠç¿ ã ãµããŒãããŸãã
䟵å
¥å¯Ÿå¿/åæ å®åã«å¿
èŠãª æ
å ±åéæ¹æ³
䟵害察å¿/åæ å®åè
ã䜿çšãã åæããŒã«ããã³äœ¿çšæ³
䟵害察å¿/åæ äºäŸãéãã å®åããŠããŠ
1) 䟵害察å¿/åæã®å®åè
ã䜿çšããåæããŒã«ããã³ææ³ã®æè¡ãåŠç¿ããŸãã äŸµå®³äºæ
ã®åæçµéšãå°ãªãå Žåãäºæ
調æ»ã®éã«ã©ãããåæãå§ããã¹ããéæ¹ã«æ®ããããšããããŸããæ¬è¬çŸ©ã§ã¯ãåæè
ãè¿
éã«äºæ
åå ãç¹å®ããæ»æçµè·¯ãèå¥ã§ãããããã¿ã€ãå¥ã®äºæ
äºäŸãå®ç¿ããŸããå®ç¿ãéããŠãã»ãã¥ãªãã£ãã°ãåæããéã«äŸµå®³äºæ
ã®çè·¡ãèŠã€ããããã«äœã«éäžããã©ã®ããã«ããã°å¹ççã«åæã§ããããåŠã¶ããšãã§ããŸãã
â
æ£åžžãã°ã®å€å¥åºæºã®äºäŸåŠç¿ â
倧éãã°åæããã°ã©ã ã®äœ¿çšå®ç¿ â
äŸµå®³äºæ
ã¿ã€ãã®åŠç¿ 2) ãããã³ã°ææ³ã«äŸåããªãåææ¹æ³ãéããŠã倿§ãªç¶æ³ãžã®é©çšããã³å¿çšãå¯èœã§ãã æ»æè
ãã¡ã¯ããŸããŸãªæ¹æ³ã§ã·ã¹ãã ãžã®äŸµå
¥ã詊ã¿ãŸããç¹å®ã®æ»æããŒã«ãæ»æææ³ã«äŸåãããè匱æ§ãæªçšããåçãçè§£ããããšã§ã倿§ãªã»ãã¥ãªãã£æ»æã®è©Šã¿ã«å¯ŸããŠå¿çšããåæãè¡ãããšãã§ããããã«ãªããŸãã
èšç·Žã®ããã®ã»ãã¥ãªãã£åæå®ç¿ ã IDSãã°åæèšç·Ž åçšã»ãã¥ãªãã£è£œåã§æ€ç¥ãããæ»æè¡çºãã°ã®äžéšããã£ã«ã¿ãªã³ã°ããå®ç¿çšã«æäŸããŸããæ»æã€ãã³ãåãæ»ææéããã®ä»ã®æ
å ±ã¯ãå®éã®äºæ
äºäŸãšåæ§ã«æ§æãããŠããŸãã
Webãã°åæèšç·Ž WebãµãŒããŒã察象ã«è¡ãããæ»æææ³ãšãæ»æå¯Ÿè±¡ã®ãµãŒããŒã«æ®ããããã°ãçŽæ¥åæããŸããåæãéããŠWebãµãŒããŒã®è匱ãªèšå®ãææ¡ããäºæ
ã®åå ãç¹å®ããŸãã
ãããã¯ãŒã¯ãã±ããåæ ãµã€ããŒã»ãã¥ãªãã£äºæ
ã®äºäŸãã©ãç°å¢ã§åäžã®æ¡ä»¶ã§åçŸããæ»æè
ã®èŠç¹ããã·ã¹ãã ãæ»æããéçšãåçŸããŠãããã¯ãŒã¯ãã©ãã£ãã¯ããã£ããã£ããŸãããã£ããã£ãããã±ãããåæããæ»æå¯Ÿè±¡ãšè¢«å®³ç¯å²ãåæããŸãã
ð£ åè¬åã«ã確èªãã ããïŒ
å®ç¿ã«äœ¿çšããããã°ã®æ»æè
IPããã³æ»æå¯Ÿè±¡IPã¯ãå®ç¿ã®ããã«ä¿®æ£ãããŠããŸãã åŠç¿å
容 ð ããããã®å®ç¿äºäŸãéããŠäŸµå®³äºæ
åæãå®ç¿ããåæããã»ã¹ãåŠç¿ããããšãã§ããŸããåæããã»ã¹ãéããŠåŠç¿ããåã«ããŸãã¯èªèº«ã§åæãè¡ã£ãŠã¿ãåŸãèªãåæããéçšãšåæã¬ã€ãã®å
å®¹ãæ¯èŒããŠã¿ãŸãã
ã»ã¯ã·ã§ã³ 1 - äºååŠç¿ å®ç¿ã«å
ç«ã¡ãåæã«å¿
èŠãªææ³ã«ã€ããŠç¢ºèªããŸããç¹å®ã®ãã¿ãŒã³ã«åºã¥ããŠæ»æè¡çºãèå¥ããæ¹æ³ãšãæ¯ãèãã«åºã¥ããŠéŸå€ãèšå®ãè
åšãèå¥ããæ¹æ³ã«åããŠåæããææ³ãåŠç¿ããåŸãæ ç»ã®äžã®ç°åžžè¡çºèå¥ã®äºäŸãéããŠãã»ãã¥ãªãã£äºæ
ã®äºäŸã«é©çšããæ¹æ³ãäžç·ã«èŠãŠãããŸãã
æ ç»ã®äžã®ç°åžžè¡çºèå¥äºäŸã®åèåç» (ã¯ãªãã¯)
ã»ã¯ã·ã§ã³ 2 - äŸµå®³äºæ
察å¿åæå®ç¿ 1ïŒIDSã€ãã³ãåæ ç¹å®æéäžã«æ€ç¥ããã䟵å
¥æ€ç¥ãœãªã¥ãŒã·ã§ã³ã®ã€ãã³ããåæããå€§èŠæš¡ãªãããã¯ãŒã¯é害ãåŒãèµ·ãããåå ãåæããŸããæ¬¡ã®è¡šã¯ã䟵å
¥æ€ç¥ã·ã¹ãã ããæœåºãã䟵å
¥æ€ç¥ã€ãã³ãã§ãã
æ€ç¥é
ç®
æ€ç¥æ
å ±
ã€ãã³ãåéæé
3 ã¶æ
æ€ç¥ã·ã°ããã£å
TCP_Invalid_SACK
éä¿¡å
IP
10.0.0.1
éä¿¡å
ããŒã
ã©ã³ãã
å®å
IP
ã©ã³ãã
å®å
ããŒã
ã©ã³ãã
åèš
1441 ä»¶
TCP_Invalid_SACKãšãã䟵å
¥æ€ç¥ã·ã¹ãã ïŒIDSïŒã®ã·ã°ããã£ã¯ãéæ£åžžãªSYNãã±ãããšACKãã±ããã«ãã£ãŠçºçããŸããäžè¬çã«TCPéä¿¡ã¯ããããã³ã«ã§å®ããããæ¹æ³ã§å¿
èŠãªéä¿¡ãã±ãããããåãããŸããããããéä¿¡ã«äœ¿çšãããããã°ã©ã ããããã¯ãŒã¯ã®ç¹æ§ã«ãã£ãŠãå®ãããããããã³ã«ãšã¯ç°ãªãæ¹åŒã§éä¿¡ããçŸè±¡ãçºçããŸããTCP_Invalid_SACKã·ã°ããã£ã¯ããã®ãããªçŸè±¡ãèšé²ããŸãã
ãã®ãããªçç±ãããæ»æè
ãéæšæºçãªããã°ã©ã ã䜿çšããå Žåã§ããéä¿¡å
å®¹ãæ€ç¥ãããŸãããã¡ãããæ€ç¥ãããæ
å ±ã«ã¯æ»æè
ã®éä¿¡ã ããèšé²ãããããã§ã¯ãããŸãããæ€ç¥ããã1441ä»¶ã®ã€ãã³ãã®ãã¡ãæ»æè
ãéä¿¡ããåæ°ã¯å°æ°ã§ããããã»ãã¥ãªãã£ã¢ããªã¹ãã¯ãã€ãã³ãåæãéããŠå°æ°ã®æ»ææ€ç¥äºäŸãèŠã€ãåºãå¿
èŠããããŸãã
å®ç¿ãã°ãã¡ã€ã«ãçšããŠçŽæ¥åæããéçšãéããŠãäºæ
ã®åå ã远跡ããŸããäºæ
åå ã«é¢ããåæçµæã¯ãåæã¬ã€ãã»ã¯ã·ã§ã³ã§èª¬æããŸãã以åã«ã匷調ããŸããããäºæ
åæã®éçšããŸãã¯èªèº«ã§çŽæ¥åæããåæã¬ã€ãã»ã¯ã·ã§ã³ã®å
容ãåèã«ããªãããèªãåæããå
å®¹ãšæ¯èŒããããšã§äºæ
åæã®ãã¬ãŒãã³ã°ãè¡ããŸãã
ã»ã¯ã·ã§ã³ 3 - äŸµå®³äºæ
察å¿åæå®ç¿ 2ïŒã¢ããªã±ãŒã·ã§ã³ãã°åæ ãŠã§ããã°åæãéããŠãäŸµå®³äºæ
ãçºçããã·ã¹ãã ã®äºæ
çµç·¯ãåæããŸãããã°ã®å å·¥äœæ¥ã¯ãåæãããŠããªãæ
å ±ãäžèŠãªæ
å ±ãæŽçããããå¹ççã«ã€ãã³ããåæããããã®äœæ¥ã§ãããããããã®ãããªãã©ãã£ãã¯ã¯å¹²ãèã®å±±ã®ããã«èšå€§ã§ããå¹²ãèã®å±±ã«é ããŠããéã®ãããªæ»æãã©ãã£ãã¯ãèŠã€ãåºãããšã¯ã決ããŠå®¹æãªããšã§ã¯ãããŸããã
2çªç®ã®å®ç¿ã§ã¯ããŠã§ããã°ãå©çšããŠèã®å±±ãçä»ããæ¹æ³ãäžç·ã«èŠãŠãããŸããSplunkãLog ParserãElasticsearchãã€ã³ã¹ããŒã«ããWindowsãŠã§ããµãŒããŒã®ãã°åæããã»ã¹ãå®ç¿ããŠã¿ãŸãããã
ã»ã¯ã·ã§ã³ 4 - äŸµå®³äºæ
察å¿åæå®ç¿ 3ïŒãããã¯ãŒã¯ãã±ããåæ ãã¡ã€ã«æ¡åŒµåã®å¶éãåé¿ããæ»æè
ã¯ãæ²ç€ºæ¿ã«ã¢ããªã±ãŒã·ã§ã³å®è¡ãã¡ã€ã«ïŒASPæ¡åŒµãã¡ã€ã«ïŒãã¢ããããŒãããã·ã¹ãã ãææ¡ããŸãããããã¯ãŒã¯éä¿¡ãéããŠè¡ããããŠã§ãã·ã§ã«æ»æãåæããŠã¿ãŸãããããã±ããåæã®éçšã«ãããŠãåæå¯Ÿè±¡ãšãªãéä¿¡ããµãŒããŒã®åæç¯å²ãéžå®ããäœæ¥ã ãã§ãã䟵害åæãéåžžã«å¹ççã«éè¡ã§ããããã«ãªããŸãããŠã§ãã·ã§ã«ã®éä¿¡ãã±ãããåæããããã«ãåææã«äœ¿çšãããã£ã«ã¿æ§æã掻çšããŠãå¹ççã«ãã±ãããåæããŠãããŸãã
åæã®éçšã§ãå®éã®ãããã¯ãŒã¯éä¿¡ãéããŠå®è¡ãããããã¯ãã¢ãã¡ã€ã«ãæœåºããŠã¿ãŠãã©ã®ãããªéä¿¡ãè¡ããããµãŒããŒã«ã©ã®ãããªè¢«å®³ãäžããã®ããåçŸãéããŠè¿œè·¡ããŠã¿ãŸãããã
Q&A ð¬ Q. åŠç¿ããããã«å¿
èŠãªäºåç¥èã¯äœã§ããïŒ
æ¬è¬çŸ©ã¯å®ç¿äžå¿ã«æ§æãããŠããŸãããµã€ããŒã»ãã¥ãªãã£ã«é¢ããåºæ¬çãªæŠå¿µãçè«ã¯å«ãŸããŠããŸãããæ¬è¬çŸ©ã®å®ç¿ãéè¡ããããã«ã¯ãIDSã«ã€ããŠçè§£ããŠããããŠã§ãã¢ããªã±ãŒã·ã§ã³ã®èšå®ãšãŠã§ããµãŒããŒã®ã¬ã¹ãã³ã¹ã³ãŒãã«ã€ããŠã®çè§£ãå¿
èŠã§ããäºåç¥èã¯å¿
èŠã§ããããããã³ã°ã®çµéšããªããŠãäŸµå®³äºæ
åæãè¡ãããšãã§ããŸãã
Q. ä»ã®ã»ãã¥ãªãã£è¬çŸ©ãšäœãéãã®ã§ããïŒ
ã»ãã¥ãªãã£äºæ
åæã®ææ³ãããŠããŠã«é¢ããå®åçµéšãäžå¿ã«ãè¬çŸ©ã³ã³ãã³ããæ§æããŸããã3ã€ã®äŸµå®³äºæ
åæäºäŸã¯ãã¹ãŠå®éã®äºæ
äºäŸãèè²ããŠãããããã»ãã¥ãªãã£äºæ
åæã®çµéšå€ãé«ããããšãã§ããŸãããã ãããã£ã¹ã¯ã€ã¡ãŒãžãåéããæ³çæå³ã§ã®ãã©ã¬ã³ãžãã¯å·¥çšã«ã€ããŠã¯æ±ããŸããã
Q. åè¬ã«é¢ããæ³šæäºé
ã¯ãããŸããïŒ
å®ç¿ã¯å
¬éããŒã«ïŒMS Log Parser StudioãWiresharkïŒãšããªãŒãã©ã€ã¢ã«ã®ã»ãã¥ãªãã£è£œåãMicrosoft EXCELã䜿çšããŸããå®ç¿å
容ã«ã¯åæè£œåãã€ã³ã¹ããŒã«ããéçšã¯çç¥ãããŠããŸããå補åããšã®ã¡ãŒã«ãŒã®ã€ã³ã¹ããŒã«æ¡å
ãªã³ã¯ãåèã«ãåè¬çãåå¥ã«ã€ã³ã¹ããŒã«ãè¡ãå¿
èŠããããŸãã
ãã®è¬çŸ©ã®ç¥èå
±æè
㯠âïž ããã°ã«ãŒãã»ãã¥ãªã㣠CERTããŒã ã®äŸµå®³äºæ
察å¿å°éå®¶ããã³å€è³ç³»ã»ãã¥ãªãã£äŒæ¥ã®ãœãªã¥ãŒã·ã§ã³ãšã³ãžãã¢ãšããŠ18å¹Žç®æŽ»åããŠããŸããéåœIBMã§SOCæ§ç¯ãããžã§ã¯ããšéå¶ãããžã§ã¯ãã®PMãæ
åœããŸãããã»ãã¥ãªãã£ã€ã³ãã©ã®èšèšãšæ§ç¯ã»éå¶ããã»ã¹ã®éçºæ¥åãéè¡ããŸãããã¢ã³ã©ãïŒAhnLabïŒã®CERTããŒã ã§ãæ°éäŒæ¥ãå
Œ
±æ©é¢ã®ã»ãã¥ãªãã£äŸµå®³äºæ
ã®åæïŒå¯Ÿå¿æ¥åãéè¡ããŸããã3.20 DarkSeoulïŒããŒã¯ãœãŠã«ïŒãã£ã³ããŒã³çºçåœæãåœå
æŸéå±ã®ã·ã¹ãã ç¹æ€ãéè¡ããNateå人æ
å ±æµåºäºä»¶ã®éã«ã¯ãäºæ
æµåºã·ã¹ãã ã«å¯Ÿããç¹æ€ãæ¯æŽããŸããã
äž»ãªçµæŽ
ã»ãã¥ãªãã£ã³ã³ãµã«ã¿ã³ãïŒã»ãã¥ãªãã£ã€ã³ãã©ã³ã³ãµã«ãã£ã³ã°ãéããã»ãã¥ãªãã£åŒ·åæŠç¥ã®èšèš/æ§ç¯/éçš ã»ãã¥ãªãã£ç®¡å¶ã³ã³ãµã«ãã£ã³ã°ïŒSOCæ§ç¯ã³ã³ãµã«ãã£ã³ã°ããã³éå¶æ¥åã®éè¡ ã»ãã¥ãªãã£ãµãŒãã¹ååéçºïŒæ¬¡äžä»£ã»ãã¥ãªãã£ç£èŠãœãªã¥ãŒã·ã§ã³&ãµãŒãã¹éçº äŸµå®³äºæ
察å¿ïŒè»/å
Œ
±/æ°éäŒæ¥ãªã©å€æ° 2014 KISA K-Shield ã»ãã¥ãªãã£ä¿®äºè¬åž« (AhnLab ãããã¯ãŒã¯ãã©ã¬ã³ãžãã¯æè²æ
åœè¬åž«) 2016 å人æ
å ±ä¿è· PIS(Personal Information Security) FAIR / çºè¡šããŒã âSecurity Intelligenceâ ì¬ìŽë² 칚íŽì¬ê³ ë¶ì ì ëµ (ììŽìœì¶íì¬, 2016) ì íŽí¹, 칚íŽì¬ê³ ë¶ì (ì§ì€ì , 2009: 2009 묞í첎ì¡êŽêŽë¶ ì°ìíì ëì) ì