ÃÖ±Ù ¹ß»ýÇÏ´Â ³×Æ®¿öÅ©¸¦ ÀÌ¿ëÇÑ °ø°ÝÀ¸·ÎºÎÅÍ ½Ã½ºÅÛÀ» º¸È£ÇÏ°í, ¾Ç¼º Æ®·¡ÇÈÀ¸·Î ÀÎÇÑ ¿À¿°°ú ³×Æ®¿öÅ©ÀÇ ¸¶ºñ¸¦ ¹æÁöÇÏ°í IT ÀÎÇÁ¶óÀÇ º¸È£Çϵµ·Ï ħÀÔ¿¡ ´ëÇØ ´Éµ¿ÀûÀ¸·Î ¹æ¾îÇÏ´Â Á¦Ç°ÀÔ´Ï´Ù.
 
 
±âÁ¸ÀÇ Á¤º¸ ȹµæÀ» ¸ñÀûÀ¸·Î ÇÏ´Â °ø°Ý°ú ´Þ¸® ÃÖ±ÙÀÇ ³×Æ®¿öÅ©¸¦ ÀÌ¿ëÇÑ °ø°ÝÀº Á¤»óÀûÀÎ ¼­ºñ½º¸¦ ¹æÇØÇϰųª ½Ã½ºÅÛÀ» ´Ù¿î ½ÃÅ°´Â °ÍÀ» ¸ñÀûÀ¸·Î ÇÏ°í ÀÖ½À´Ï´Ù.
¿î¿µÃ¼Á¦ÀÇ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ¿© ´ë¿ë·®ÀÇ Æ®·¡ÇÈÀ» ¹ß»ý½ÃÅ°´Â worm ¹ÙÀÌ·¯½ºÀÇ ÃâÇö ¶ÇÇÑ ÃÖ±Ù¿¡ ÀϾ »ç°ÇÀÔ´Ï´Ù.
»Ó¸¸ ¾Æ´Ï¶ó P2P, messenger¸¦ ÀÌ¿ëÇÑ ±â¾÷ ³»ºÎÀÇ Á¤º¸ À¯ÃâÀº ºÒƯÁ¤ÀÇ ´Ù¼ö°¡ ¼ö½ÅÀÚ°¡ µÈ´Ù´Â Ãø¸é¿¡¼­ º¸¾È¿¡ ±¸¸ÛÀÌ ¶Õ·È´Ù°í Ç¥Çö ÇÒ ¼ö ÀÖ½À´Ï´Ù.
ÀÌ·¯ÇÑ ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇØ ²ÙÁØÇÑ ¼ÒºñÀÚÀÇ ÇÊ¿ä¿¡ ÀÇÇØ °³¹ßµÈ Á¦Ç°ÀÌ SecureFortÀÔ´Ï´Ù.
 
 
±âÁ¸ º¸¾È ¼Ö·ç¼Çµé(¹æÈ­º®, IDS, ¹é½Åµî)ÀÇ ÇÑ°èÁ¡À» ±Øº¹ÇÏ¿©, °ü¸® ³ë·ÂÀ» ÃÖ¼ÒÈ­ Çϸ鼭 ÃÖ´ëÇÑÀÇ º¸¾È È¿°ú¸¦ Á¦°øÇÒ ¼ö ÀÖ´Â ±â¹Ý ±â¼úÀ» ConceptÀ¸·Î ¼³°èµÇ¾ú½À´Ï´Ù. ±âÁ¸ÀÇ º¸¾È ±â¼úµéÀÇ ¿©·¯°¡Áö ´ÜÁ¡°ú ÇѰ踦 º¸¿ÏÇϸç, ½ÇÁ¦ ³×Æ®¿öÅ© ȯ°æ¿¡ ÃÖÀûÈ­µÇ¾î ÃÖ»óÀÇ ¼º´ÉÀ» Á¦°øÇÒ ¼ö ÀÖ´Â ±â¹Ý ±¸Á¶·Î ¼³°è µÇ¾ú½À´Ï´Ù.
 

SecureFortÀÇ ±âº» °³¹ß Guideline ¹× Requirements
¤ý°£ÆíÇÏ°Ô ¼³Ä¡ÇÏ°í, ½±°Ô ¿î¿ë ÇÒ ¼ö ÀÖ¾î¾ß ÇÕ´Ï´Ù.
¤ýħÀÔÀ¸·ÎºÎÅÍ ½Ã½ºÅÛÀ» º¸È£Çϴµ¥ °ü¸®ÀÚÀÇ °³ÀÔÀ» ÃÖ¼ÒÈ­ ÇØ¾ß ÇÕ´Ï´Ù.
¤ý³×Æ®¿öÅ©¿¡ ¼³Ä¡ ÀÌÈÄ Àüü ³×Æ®¿öÅ©ÀÇ ¼Óµµ°¡ ´Ê¾îÁö¸é ¾ÊµË´Ï´Ù.
¤ý°ø°Ý¸¸À» Á¤È®ÇÏ°Ô Â÷´ÜÇÏ¿© Á¤»óÀûÀÎ ¼­ºñ½º³ª ³×Æ®¿öÅ© ÀÌ¿ë¿¡ ¿µÇâÀ» ÁÖÁö ¸»¾Æ¾ß ÇÕ´Ï´Ù.
¤ý¾Ë·ÁÁø °ø°Ý, ¾Ë·ÁÁöÁö ¾ÊÀº °ø°Ý¿¡ ´ëÇÑ Å½Áö/¹æ¾î°¡ °¡´ÉÇØ¾ß ÇÕ´Ï´Ù.
¤ýÀüü Æ®·¡ÇÈ¿¡¼­ °ø°Ý Æ®·¡ÇÈÀÌ 100%°¡ µÇ´õ¶óµµ ÀåºñÀÇ ¼º´ÉÀúÇÏ°¡ ÀϾÁö ¾Ê¾Æ¾ß ÇÕ´Ï´Ù.
¤ýÀåºñÀÇ ¾ÈÁ¤¼ºÀ» ÃÖ´ëÇÑ º¸ÀåÇØ¾ß ÇÕ´Ï´Ù.
¤ýŽÁö, Â÷´Ü, ·êÀÇ Áõ°¡¿¡µµ Àåºñ´Â Ç×»ó µ¿ÀÏÇÑ ÃÖ»óÀÇ ¼º´ÉÀ» ¹ßÈÖÇØ¾ß ÇÕ´Ï´Ù.
 
 
ºê¸´Áö ¹æ½ÄÀ» ÀÌ¿ëÇÑ ³×Æ®¿öÅ©»óÀÇ ÆÐŶó¸® ½Ã½ºÅÛ
- System for processing a packet on a network of computer System using a multi-bridge mode
¿ÜºÎ ³×Æ®¿öÅ© ¹× ³»ºÎ ³×Æ®¿öÅ©·ÎºÎÅÍÀÇ Ä§ÀÔ ¹æÁö ¹æ¹ý
- Method of Preventing intrusion from on exterior network and interior network.
2002 ´ëÇѹα¹ À̸Ó¡ ¿ì¼ö ±â¼ú»ó - ¼­¿ï°æÁ¦½Å¹® ¼±Á¤
2002 Áß¼Ò±â¾÷ ±â¼úÇõ½Å´ëÀü ±â¼úÇõ½Å»ó - Áß¼Ò±â¾÷û