본문 바로가기

Work Log/As Cybersecurity Consultant

악성코드 감염 예방을 위한 지침 - TTA 문서


찾아보니 TTA에서 악성코드 감염 예방을 위한 지침이라는 표준문서를 발간했었군요


구글링 시 다음 검색어 사용: 악성코드감염예방을위한지침 TTA

또는 아래 링크

http://committee.tta.or.kr/data/standard_view.jsp?commit_code=TC5&nowPage=27&pk_num=TTAK.KO-12.0010/R2&nowSu=1



아래와 같은 목차이고, 내용을 훑어보니 악성코드와 안티바이러스에 대한 개념을 잡기에도 좋은 자료로 보입니다



목 차

1. 개요 ········································································································································ 1

2. 표준의 구성 및 범위 ·········································································································· 2

3. 악성 코드 개요 ···················································································································· 2

3.1 악성 코드 정의 ············································································································ 2

3.2 악성 코드 분류 ············································································································ 4

3.2.1 바이러스 ·············································································································· 5

3.2.2 웜(Worm) ············································································································ 7

3.2.3 트로이 목마(Trojan horse) ············································································ 8

3.2.4 악성 코드의 주요 기능적 속성 ······································································ 8

3.3 악성 코드 동작 원리 ································································································ 10

3.3.1 악성 코드 감염 순서 ····················································································· 10

3.3.2 악성 코드 감염 경로 ····················································································· 12

3.3.3 악성 코드 감염 증상 및 피해 ····································································· 14

3.4 악성 코드 대응 - 백신 프로그램 ·········································································· 17

3.4.1 백신 프로그램의 정의 ··················································································· 17

3.4.2 백신 프로그램의 탐지 기술 ········································································· 18

3.4.3 백신 프로그램의 동작 원리 ········································································· 19

3.4.4 백신 프로그램의 종류 및 선택 ··································································· 19

3.4.5 백신 프로그램 사용상의 주의점 ································································· 20

4. 악성 코드 방지 지침 ········································································································ 21

4.1 시스템 사용자 관리 지침 ························································································ 22

4.1.1 소프트웨어 관리 ····························································································· 22

4.1.2 운영 관리 ········································································································· 22

4.1.3 사후 지침 ········································································································· 23

4.2 시스템 관리자 관리 지침 ························································································ 24

4.2.1 소프트웨어 관리 ····························································································· 24

4.2.2 컴퓨터 관리 ····································································································· 24

4.2.3 네트워크 관리 ································································································· 25

4.2.4 운영 관리 ········································································································· 25

4.2.5 경영 관리적 지침 ··························································································· 25

4.2.6 사후 검색 ········································································································· 26

정보통신단체표준(국문표준)

- 2 - TTAK.KO-12.0010/R2

4.2.7 사용자 교육 ····································································································· 26

4.2.8 기록 ··················································································································· 26

4.3 악성 코드의 일반적인 예방 수칙 ·········································································· 27

4.3.1 악성 코드 예방 수칙 ····················································································· 27

4.3.2 취약성 제거 ··································································································· 30

4.4 비상시 대응 지침 ······································································································ 31

4.4.1 감시 ··················································································································· 31

4.4.2 비상시 대응책 ································································································· 32

부록 1. 악성 봇 개요 ············································································································ 33

부록 2. 악성 코드의 발전 단계 ·························································································· 36

부록 3. 참고 문헌 ·················································································································· 43