์ „์ฒด ๊ธ€

์ „์ฒด ๊ธ€

    ํด๋ผ์šฐ๋“œ ๋น„์šฉ ์–ด๋–ป๊ฒŒ ์ค„์ผ ์ˆ˜ ์žˆ์„๊นŒ(100)

    1. Gather data - My billing dashboard๋ฅผ ํ†ตํ•ด ํ™•์ธ ๊ฐ€๋Šฅ(์„œ๋น„์Šค/์›” ๊ณผ๊ธˆ ํ˜„ํ™ฉ ํ™•์ธ ๊ฐ€๋Šฅ) - Invoice - Cost and Usage Report(CUR) : ์‹œ๊ฐ„๋‹น ๋น„์šฉ ๋ฆฌํฌํŠธ - Trusted Advisor(์ถ”์ฒœ) - Cost explorer(๋น„์šฉ ํƒ์ƒ‰) - Tagging 2. Apply methods - Rightsizing(Amazon Cloudwathํ†ตํ•ด ๋ชจ๋‹ˆํ„ฐ๋ง ํ›„ sizing ์ถ”์ฒœ) - EC2 Rightsizing solution - Elasticity - Instance scheduler 3. Pricing - AWS ๊ฐ€๊ฒฉ ์˜ต์…˜ : ์˜จ๋””๋งจ๋“œ, ์˜ˆ์•ฝ ์ธ์Šคํ„ด์Šค(RI), ์ŠคํŒŸ ์ธ์Šคํ„ด์Šค . ์˜จ๋””๋งจ๋“œ : ์•ฝ์ • ์—†์ด ์‚ฌ์šฉํ•œ EC2 ์ธ์Šคํ„ด์Šค์— ๋Œ€ํ•œ ๋น„์šฉ๋งŒ ์ง€๋ถˆ, ํŠธ๋ž˜ํ”ฝ..

    ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€(100)

    1. IAM ์„œ๋น„์Šค ๋ฐ EFA ํ™œ์„ฑํ™”๋ฅผ ํ†ตํ•œ ์•ˆ์ „ํ•œ ๊ณ„์ • ๊ด€๋ฆฌ ๊ฐ€์ด๋“œ - root ๊ณ„์ • : ๋ชจ๋“  ๊ถŒํ•œ์„ ๊ฐ€์ง€๋Š” Master or Admin - IAM : root ๊ณ„์ • ์•„๋ž˜ User ๋ฐ User Group์„ ์ƒ์„ฑํ•˜๊ณ  ๊ถŒํ•œ์„ ๊ด€๋ฆฌ, ์‚ฌ์šฉ์ž๋ณ„๋กœ ์•ก์„ธ์Šค ๊ฐ€๋Šฅํ•œ AWS ๋ฆฌ์†Œ์†Œ๋ฅผ ์ œ์–ด ๊ฐ€๋Šฅ . IAM ๊ธฐ๋Šฅ ์ฐธ์กฐ : https://aws.amazon.com/ko/iam/features/?nc=sn&loc=2 AWS Identity & Access Management (IAM) ๊ธฐ๋Šฅ - Amazon Web Services aws.amazon.com . Tag : ์œ ์ € ์ •๋ณด๋ฅผ ํƒœํ‚นํ•˜์—ฌ ๊ด€๋ฆฌํ•˜๋ฉด ์ถ”์  ์ข‹์Œ . Policy : ์—ฌ๋Ÿฌ๊ฐ€์ง€ ํ…œํ”Œ๋ฆฟ์„ ์ œ๊ณตํ•˜๊ณ  ์žˆ์œผ๋ฉฐ ์ปค์Šคํ„ฐ๋งˆ์ด์ง•๋„ ๊ฐ€๋Šฅ . link๋ฅผ ์ „๋‹ฌ or send emai..

    AWS์™€ ํ•จ๊ป˜ํ•˜๋Š” ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…(100)

    1. Cloud Computing์ด๋ž€? - ์ž์ฒด ๋ฐ์ดํ„ฐ ์„ผํ„ฐ/ํ˜ธ์ŠคํŒ… ์„œ๋น„์Šค/IDC ์‚ฌ์šฉํ•˜๋Š” ๊ฒฝ์šฐ -> Cloud computing . ๋ฐ์ดํ„ฐ ์„ผํ„ฐ ๊ตฌ์ถ•, ํ•˜๋“œ์›จ์–ด ๊ตฌ๋งค -> ํ•„์š”ํ•  ๋•Œ ์–ธ์ œ๋‚˜ . ๋†’์€ ์ดˆ๊ธฐ ํˆฌ์ž ๋น„์šฉ -> ์‚ฌ์šฉํ•œ ๋งŒํผ๋งŒ ์ง€๋ถ• . ํ•œ์ •๋œ ์šฉ๋Ÿ‰ -> ์œ ์—ฐํ•œ ์šฉ๋Ÿ‰ . ๋งŽ์€ ๊ณต์ˆ˜, ์†Œ์š” ์‹œ๊ฐ„ -> ์ ์€ ๋…ธ๋ ฅ, ์†Œ์š” ์‹œ๊ฐ„ - ์ดˆ๊ธฐ ํˆฌ์ž๋‚˜ ์žฅ๊ธฐ ๊ณ„์•ฝ ์—†์ด - ์ธํ„ฐ๋„ท์„ ํ†ตํ•ด IT ๋ฆฌ์†Œ์Šค์™€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ - ์›ํ•  ๋•Œ ์–ธ์ œ๋“ ์ง€(on-demand) - ์‚ฌ์šฉํ•œ ๋งŒํผ๋งŒ ์š”๊ธˆ์„ ๋‚ด๋Š” ์„œ๋น„์Šค - ์ดˆ๊ธฐ ์„ ํˆฌ์ž ๋น„์šฉ ์—†์Œ(๊ณ ์ • ๋น„์šฉ -> ๊ฐ€๋ณ€ ๋น„์šฉ) - ์šด์˜ ๋น„์šฉ ์ ˆ๊ฐ - ํƒ„๋ ฅ์ ์ธ ์šด์˜ ๋ฐ ํ™•์žฅ - ์†๋„ ๋ฐ ๋ฏผ์ฒฉ์„ฑ(on-premise -> on-demand) - ๋น„์ฆˆ๋‹ˆ์Šค์—๋งŒ ์ง‘์ค‘ ๊ฐ€๋Šฅ - ๊ธ€๋กœ๋ฒŒ ํ™•์žฅ 2. Why A..

    Shell์˜ ์‹œ์ž‘ ํŒŒ์ผ? ๋กœ๊ทธ์ธ Shell? ๋น„๋กœ๊ทธ์ธ Shell?

    Shell์ด ์‹œ์ž‘๋˜๋ฉด ์‹œ์ž‘ ํŒŒ์ผ(startup files)์ด๋ผ๊ณ  ํ•˜๋Š” ํŒŒ์ผ์ด ์‹œํ–‰๋ฉ๋‹ˆ๋‹ค! ์‹œ์ž‘ ํŒŒ์ผ์€ ์ผ๋ จ์˜ ์Šคํฌ๋ฆฝํŠธ์ด๋ฉฐ ๋ชจ๋“  ์‚ฌ์šฉ์ž๋“ค์—๊ฒŒ ์ ์šฉ๋˜๋Š” ํ™˜๊ฒฝ์„ค์ • ๊ฐ’์„ ์„ธํŒ…ํ•ฉ๋‹ˆ๋‹ค. ์ฒซ๋ฒˆ์งธ ๋ชจ๋“  ์‚ฌ์šฉ์ž๋“ค์—๊ฒŒ ์ ์šฉ๋˜๋Š” ์ผ๋ฐ˜ ํ™˜๊ฒฝ์„ค์ •์„ ์„ธํŒ…ํ•˜๊ธฐ ์œ„ํ•œ ์‹œ์ž‘ ํŒŒ์ผ์ด ๋Œ์•„๊ฐ€๊ณ , ๋‘๋ฒˆ์งธ ๊ฐœ์ธ ์‚ฌ์šฉ์ž๋“ค์—๊ฒŒ ์ ์šฉ๋˜๋Š” ๊ฐœ์ธ ํ™˜๊ฒฝ์„ค์ •์„ ์„ธํŒ…ํ•˜๊ธฐ ์œ„ํ•œ ์‹œ์ž‘ ํŒŒ์ผ์ด ๋Œ์•„๊ฐ‘๋‹ˆ๋‹ค. ์‹œ์ž‘ ํŒŒ์ผ์€ Shell ์„ธ์…˜์— ๋”ฐ๋ผ ๋‹ฌ๋ผ์ง€๋Š” Shell ์„ธ์…˜์€ ๋‘๊ฐ€์ง€ ์ข…๋ฅ˜๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค. - ๋กœ๊ทธ์ธ Shell ์„ธ์…˜ : ๋กœ๊ทธ์ธ์„ ํ†ตํ•ด ์‹คํ–‰๋˜๋Š” Shell(์›๊ฒฉ ssh ๋“ฑ) - ๋น„๋กœ๊ทธ์ธ Shell ์„ธ์…˜ : ๋กœ๊ทธ์ธ์—†์ด ์‹คํ–‰๋˜๋Š” Shell(๋กœ์ปฌ ํ„ฐ๋ฏธ๋„, sudo bash, su ๋“ฑ) Shell ์„ธ์…˜์— ๋”ฐ๋ผ์„œ ์‹คํ–‰๋˜๋Š” ์‹œ์ž‘ ํŒŒ์ผ์˜ ์œ„์น˜๊ฐ€ ๋˜ํ•œ ๋‹ค๋ฆ…๋‹ˆ๋‹ค. ๋กœ๊ทธ์ธ She..

    AWS IPsec VPN

    VPN connection: A secure connection between your on-premises equipment and your VPCs. VPN tunnel(๊ธฐ๋ณธ ์ด์ค‘ํ™”): An encrypted link where data can pass from the customer network to or from AWS. Each VPN connection includes two VPN tunnels which you can simultaneously use for high availability. Customer gateway(๊ธฐ๋ณธ ์ด์ค‘ํ™”): An AWS resource which provides information to AWS about your customer gateway device...

    5. ๋ช…๋ น์–ด์™€ ์นœํ•ด์ง€๊ธฐ

    ๋ช…๋ น์–ด - /usr/bin์— ์„ค์น˜๋˜์–ด์žˆ๋Š” ์‹คํ–‰ ํ”„๋กœ๊ทธ๋žจ - shell์— ๋‚ด์žฅ๋œ ๋ช…๋ น์–ด - shell ํ•จ์ˆ˜ - ๋ณ„์นญ ๋ช…๋ น์–ด ํ™•์ธ [eunhye@computer ~]$ type cd cd is a shell builtin [eunhye@computer ~]$ type ls ls is /bin/ls [eunhye@computer ~]$ which cd /usr/bin/cd [eunhye@computer ~]$ which ls /bin/ls ๋ช…๋ น์–ด ๋„์›€๋ง ๋ณด๊ธฐ [eunhye@computer ~]$ help cd #help | ์ฐพ๊ณ  ์‹ถ์€ ๋ช…๋ น์–ด(๊ฐ„๋‹จํžˆ) cd: cd [-L|-P] [dir] Change the current directory to DIR. The variable $HOME is the defaul..

    4. ํŒŒ์ผ๊ณผ ๋””๋ ‰ํ† ๋ฆฌ ์กฐ์ž‘

    ์™€์ผ๋“œ์นด๋“œ ์™€์ผ๋“œ์นด๋“œ ๋งค์นญ ๋ฌธ์ž * ๋ชจ๋“  ๋ฌธ์ž ? ๋ชจ๋“  ํ•˜๋‚˜์˜ ๋ฌธ์ž [characters] characters ๋ฌธ์ž์…‹์— ํฌํ•จ๋œ ๋ฌธ์ž [!characters] characters ๋ฌธ์ž์…‹์— ํฌํ•จ๋˜์ง€ ์•Š์€ ๋ฌธ์ž [[:class:]] ์ €์žฅ๋œ ๋ฌธ์ž ํด๋ž˜์Šค์— ํฌํ•จ๋œ ๋ฌธ์ž ๋ฌธ์ž ํด๋ž˜์Šค ๋งค์นญ ๋ฌธ์ž [:alnum:] ๋ชจ๋“  ์•ŒํŒŒ๋ฒณ๊ณผ ์ˆซ์ž ๋ฌธ์ž [:alpha:] ๋ชจ๋“  ์•ŒํŒŒ๋ฒณ ๋ฌธ์ž [:digit:] ๋ชจ๋“  ์ˆซ์ž ๋ฌธ์ž [:lower:] ๋ชจ๋“  ์†Œ๋ฌธ์ž [:upper:] ๋ชจ๋“  ๋Œ€๋ฌธ์ž ํŒจํ„ด ๋งค์นญ ๋ฌธ์ž * ๋ชจ๋“  ํŒŒ์ผ g* g๋กœ ์‹œ์ž‘ํ•˜๋Š” ๋ชจ๋“  ํŒŒ์ผ b*.txt b๋กœ ์‹œ์ž‘ํ•˜๋Š” txt ํŒŒ์ผ Data??? Data๋กœ ์‹œ์ž‘ํ•˜๋ฉด์„œ ๋’ค์— ์ •ํ™•ํžˆ ์„ธ ๊ฐœ์˜ ๋ฌธ์ž๋งŒ ์žˆ๋Š” ํŒŒ์ผ [abc]* a, b, c๋กœ ์‹œ์ž‘ํ•˜๋Š” ๋ชจ๋“  ํŒŒ์ผ BACKUP[0-9][0-9][..

    3. ์‹œ์Šคํ…œ ์‚ดํŽด๋ณด๊ธฐ

    ls ๋ช…๋ น์–ด ์˜ต์…˜๊ณผ ๋ช…๋ น ์ธ์ž - ํ˜„์žฌ ์ž‘์—… ๋””๋ ‰ํ† ๋ฆฌ์— ์žˆ๋Š” ํŒŒ์ผ๊ณผ ํ•˜์œ„ ๋””๋ ‰ํ† ๋ฆฌ๋“ค์ด ๋ชจ๋‘ ํ‘œ์‹œ - ls -์˜ต์…˜ ๋ช…๋ น์ธ์ž ์˜ต์…˜ long ์˜ต์…˜ ์„ค๋ช… -a --all ์ˆจ๊น€ ํŒŒ์ผ์„ ํฌํ•จํ•˜์—ฌ ๋ชจ๋“  ํŒŒ์ผ ๋ณด๊ธฐ -d --dirctory ๋””๋ ‰ํ† ๋ฆฌ ๋‚ด์šฉ์„ ํ™•์ธ ๊ฐ€๋Šฅ, ls -ld๋กœ ์‚ฌ์šฉํ•˜๋ฉด ๋””๋ ‰ํ† ๋ฆฌ ๋‚ด์šฉ์ด ์•„๋‹Œ ๋””๋ ‰ํ† ๋ฆฌ ์ž์ฒด ์ •๋ณด ํ™•์ธ ๊ฐ€๋Šฅ -F --classify ์ง€์‹œ ๋ฌธ์ž๋ฅผ ์ถ”๊ฐ€๋กœ ํ‘œ์‹œ, /์ด ๋ถ™์Œ -h --human-readable -lh๋กœ ์‚ฌ์šฉํ•˜๋ฉด ํŒŒ์ผ ํฌ๊ธฐ๋ฅผ ์‚ฌ๋žŒ์ด ์ธ์‹ํ•˜๊ธฐ ์‰ฌ์šด ํ˜•ํƒœ๋กœ ๋ณ€๊ฒฝ -l ์ข€ ๋” ์ž์„ธํ•œ ์ •๋ณด ์ถœ๋ ฅ -r --reserve ์ถœ๋ ฅ ๊ฒฐ๊ณผ๋ฅผ ์—ญ์ˆœ์œผ๋กœ ํ‘œ์‹œ, ์ผ๋ฐ˜์ ์œผ๋กœ๋Š” ์•ŒํŒŒ๋ฒณ ์˜ค๋ฆ„์ฐจ์ˆœ์œผ๋กœ ํ‘œ์‹œ๋จ -s ํŒŒ์ผ ํฌ๊ธฐ์ˆœ์œผ๋กœ ์ •๋ ฌ -t ํŒŒ์ผ ์ˆ˜์ • ์‹œ๊ฐ„์ˆœ์œผ๋กœ ์ •๋ ฌ long ํฌ๋งท์œผ๋กœ ์ถœ๋ ฅ ๊ฒฐ๊ณผ ๋ณด๊ธฐ [eu..

    2. ํŒŒ์ผ์‹œ์Šคํ…œ ํƒ์ƒ‰

    ํŒŒ์ผ์‹œ์Šคํ…œ - ๊ณ„์ธต์ ์ธ ๋””๋ ‰ํ† ๋ฆฌ ๊ตฌ์กฐ๋กœ ํŒŒ์ผ์„ ๊ตฌ์„ฑ(ํŠธ๋ฆฌ ํ˜•์‹) - ์ตœ์ƒ์œ„ ๋””๋ ‰ํ† ๋ฆฌ๋ฅผ ๋ฃจํŠธ(root) ๋””๋ ‰ํ† ๋ฆฌ๋ผ๊ณ  ํ•จ - ์œ ๋‹‰์Šคํ˜• ์‹œ์Šคํ…œ์—์„œ๋Š” ๋‹จ์ผ ํŒŒ์ผ์‹œ์Šคํ…œ์œผ๋กœ ๊ด€๋ฆฌ - ์ €์žฅ์žฅ์น˜๋“ค์€ ์œ ์ €์˜ ์žฌ๋Ÿ‰์— ๋”ฐ๋ผ ๋‹ค์–‘ํ•œ ์œ„์น˜์— ๋งˆ์šดํŠธ ๊ฐ€๋Šฅ ํ˜„์žฌ ์ž‘์—… ๋””๋ ‰ํ† ๋ฆฌ(print working dir) [eunhye@computer ~]$ pwd /usr/eunhye ๋””ํ…ํ† ๋ฆฌ ๋ชฉ๋ก ํ‘œ์‹œ - .๋กœ ์‹œ์ž‘ํ•˜๋Š” ํŒŒ์ผ๋ช…์„ ๊ฐ€์ง„ ํŒŒ์ผ์€ ์ˆจ๊ฒจ์ง„ ํŒŒ์ผ(user home dir์ด ์ƒ์„ฑ๋˜๋ฉด ํ™˜๊ฒฝ์„ค์ •์„ ์œ„ํ•ด ๋‹ค์ˆ˜์˜ ์ˆจ๊ฒจ์ง„ ํŒŒ์ผ์ด ์ƒ์„ฑ๋จ) - -a ์˜ต์…˜์„ ํ†ตํ•ด ์ˆจ๊ฒจ์ง„ ํŒŒ์ผ๋„ ํ™•์ธ ๊ฐ€๋Šฅ - ํŒŒ์ผ ํ™•์žฅ์ž๊ฐ€ ์—†๊ธฐ ๋•Œ๋ฌธ์— ์›ํ•˜๋Š” ํ™•์žฅ์ž๋ฅผ ๋งˆ์Œ๋Œ€๋กœ ๋งŒ๋“ค ์ˆ˜ ์žˆ์Œ - ๋„์–ด์“ฐ๊ธฐ, ๊ตฌ๋‘์  ๊ธฐํ˜ธ(., -, _)๋ฅผ ํฌํ•จํ•˜์—ฌ ํŒŒ์ผ๋ช… ์„ค์ •์ด ๊ฐ€๋Šฅ but ๋„์–ด์“ฐ๊ธฐ๋Š” ..

    Security

    ๊ธฐ๋ฐ€์„ฑ - ๋ฐ์ดํ„ฐ ์ž์›์— ๋น„๋ฐ€์„ฑ์„ ์œ ์ง€ํ•˜๋Š” ์„ฑ์งˆ - ํ—ˆ๊ฐ€ ๋ฐ›์€ ์‚ฌ์šฉ์ž๋งŒ ๋‚ด์šฉ์„ ํ™•์ธํ•˜๊ณ  ์ฒ˜๋ฆฌํ•˜๋Š” ์„ฑ์งˆ - ํ•จ๋ถ€๋Ÿฌ ๋ณด์ง€ ๋ชปํ•˜๊ฒŒ ์•”ํ˜ธํ™” ์„ค์ • -ํ›”์ณ๋ณด๋Š” Sniffing ๊ณต๊ฒฉ : ํ—ˆ๊ฐ€ ๋ฐ›์ง€ ์•Š์€ ์‚ฌ์šฉ์ž๊ฐ€ ํ•จ๋ถ€๋Ÿฌ ํ›”์ณ๋ณด๋Š” ๊ธฐ๋ฒ• ๋ฌด๊ฒฐ์„ฑ - ๊ฒฐํ•จ์ด ์—†๋‹ค๋Š” ๋œป - ๋ฐ์ดํ„ฐ๊ฐ€ ๋ฌธ์ œ ์—†๊ฒŒ ๋ณ€์กฐ๋˜์ง€ ์•Š๋„๋ก ํ•˜๋Š” ์„ค์ • - ์ธ์ฆ ์ฝ”๋“œ๋ฅผ ์‚ฌ์šฉํ•ด ๋ณ€์กฐ ์—ฌ๋ถ€ ํ™•์ธ - ๋ณ€์กฐ Spoofing ๊ณต๊ฒฉ : ํ—ค๋”์˜ ๋‚ด์šฉ ๋ฐ ๋ฐ์ดํ„ฐ์˜ ๋‚ด์šฉ์„ ์ˆ˜์ •ํ•˜๋Š” ๊ธฐ๋ฒ• ๊ฐ€์šฉ์„ฑ - ์–ธ์ œ๋“ ์ง€ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์„ฑ์งˆ - ์‚ฌ์šฉ์ž๊ฐ€ ์„œ๋น„์Šค๋ฅผ ์š”์ฒญํ•  ๊ฒฝ์šฐ ์ฆ‰์‹œ ์„œ๋น„์Šค ์‚ฌ์šฉ ๊ฐ€๋Šฅ - Dos, DDos ์„œ๋น„์Šค ๊ฑฐ๋ถ€ ๊ณต๊ฒฉ : ์–ธ์ œ๋“ ์ง€ ์ ‘๊ทผํ•ด์•ผ ํ•˜๋Š”๋ฐ ๋ชปํ•˜๋„๋ก ํ•˜๋Š” ๊ธฐ๋ฒ• ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ๋ฉ”์ปค๋‹ˆ์ฆ˜ 1. ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™”(์•Œ๊ณ ๋ฆฌ์ฆ˜) 2. ์ ‘๊ทผ์ œ์–ด(ACL, ๋ฐฉํ™”๋ฒฝ) : IP, Port๋ฅผ ..

    ARP Spoofing

    ARP Spoofing - Client IP ์ฃผ์†Œ๋ฅผ ๊ฐ€์ง€๊ณ  MAC ์ฃผ์†Œ๋ฅผ ์ฐพ์•„๋‚ด๋Š” ๋ฐฉ๋ฒ• - ARP Request : ARP ํ…Œ์ด๋ธ”์— IP ์ฃผ์†Œ๊ฐ€ ์—†๋‹ค๋ฉด ๋ธŒ๋กœ๋“œ์บ์ŠคํŠธ๋ฅผ ํ†ตํ•ด IP ์ฃผ์†Œ๋ฅผ ์•Œ์•„๋‚ด MAC ์ฃผ์†Œ ์š”์ฒญ - ARP Response : Request๋ฅผ ์ˆ˜์‹ ํ•œ Client๋Š” IP ์ฃผ์†Œ๊ฐ€ ์ž์‹ ์˜ IP ์ฃผ์†Œ์ผ ๊ฒฝ์šฐ MAC ์ฃผ์†Œ ์‘๋‹ต - ARP ํ…Œ์ด๋ธ”์€ ์ตœ๊ทผ Response ์—…๋ฐ์ดํŠธ(์ธ์ฆ ์—†์Œ, ์ทจ์•ฝ์ ) - LAN์—์„œ ์˜จ๋ผ์ธ์œผ๋กœ ํ™•์ธ๋˜์ง€ ์•Š์œผ๋ฉด ARP ํ…Œ์ด๋ธ”์—์„œ ์‚ญ์ œ(์ฃผ๊ธฐ์ ์œผ๋กœ Spoofing Packet์„ ๋ณด๋‚ด์•ผ ํ•จ) - Linux/Windows๋Š” 120์ดˆ ํ˜น์€ ์ด์ƒ์ด์ง€๋งŒ 40์ดˆ๊ฐ€ ๊ฐ€์žฅ ์ ๋‹น - Client ARP ํ…Œ์ด๋ธ” ์œ„์กฐ ๋Œ€์ฑ… - ํŒจํ‚ท ๋ถ„์„์„ ํ†ตํ•ด ARP Storm์ด ์žˆ๋Š”์ง€ ํ™•์ธ - IP ์ฃผ์†Œ์™€ MA..

    Switch Jamming Attack

    Switch Jamming Attack - Fail open ์ •์ฑ…์„ ๋”ฐ๋ฅด๋Š” ์žฅ๋น„๋กœ ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ•˜๋ฉด ํ—ˆ๋ธŒ์ฒ˜๋Ÿผ ๋™์ž‘ - Fail open ์ •์ฑ… : ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ• ์‹œ ํŠน์ • ์š”์†Œ๋ฅผ ํ—ˆ์šฉํ•˜๋Š” ์ •์ฑ… - Fail close ์ •์ฑ… : ์žฅ๊ฐœ๊ฐ€ ๋ฐœ์ƒํ•  ์‹œ ํŠน์ • ์š”์†Œ๋ฅผ ์ฐจ๋‹จํ•˜๋Š” ์ •์ฑ… - MAC ์ฃผ์†Œ ํ…Œ์ด๋ธ”์„ ์˜ค๋ฒ„ํ”Œ๋กœ์šฐ ์‹œ์ผœ ์žฅ์• ๋ฅผ ๋ฐœ์ƒ์‹œ์ผœ ๋ธŒ๋กœ๋“œ์บ์ŠคํŠธ๋กœ ๋™์ž‘ํ•˜๊ฒŒ ๋งŒ๋“ฆ(MAC Flooding) ๋Œ€์ฑ… - port์— ํ•™์Šตํ•  ์ˆ˜ ์žˆ๋Š” MAC ์ฃผ์†Œ๋ฅผ ์ œํ•œ(port security) - ์žฅ์• ์‹œ ๋Œ€์‘ ์ •์ฑ…์„ shutdown | protect | restrict ๋กœ ๋ณ€๊ฒฝ

    CDN

    Internet? - ๊ฑฐ๋Œ€ํ•œ Network - ๋‹จ์ผํ•œ ์šด์˜/ํ†ต์ œ ์ฃผ์ฒด๊ฐ€ ์—†์Œ - ๋ˆ„๊ตฌ์—๊ฒŒ๋‚˜ ์—ด๋ ค์žˆ์œผ๋‚˜ ๊ทธ ๋ˆ„๊ตฌ๋„ ์ฑ…์ž„์ง€์ง€ ์•Š์Œ why ์ธํ„ฐ๋„ท์ด ๋Š๋ฆฐ๊ฐ€? - ๋ฌผ๋ฆฌ์  ๊ฑฐ๋ฆฌ - ๋ผ์šฐํŒ… - latency - ์†์‹ค ๋”์šฑ ๋” ๋งŽ์€ ์žฅ๋น„๋ฅผ ๋„์ž…ํ•˜๋ฉด ๋˜์ง€๋งŒ ์™œ ๋„์ž…ํ•˜์ง€ ์•Š๋Š”๊ฐ€? - ํ†ต์‹ ์‚ฌ๋Š” ๋ˆ์ด ๊ธฐ์ค€ ๊ทธ๋ ‡๋‹ค๋ฉด ์ธํ„ฐ๋„ท์„ ๋น ๋ฅด๊ฒŒ ํ•˜๋ ค๋ฉด ์–ด๋–ป๊ฒŒ ํ•ด์•ผํ•˜๋Š”๊ฐ€? - ํ…์ŠคํŠธ์— ๋น„ํ•ด์„œ ๋Šฆ๋Š” ์ด๋ฏธ์ง€๋ฅผ ์œ„ํ•ด ISP ์—…์ฒด์—์„œ ์บ์‹œ ์„œ๋ฒ„๋ฅผ ๋‘์ž ์บ์‹œ ์„œ๋ฒ„์— - ์ด๋ฏธ์ง€/ํ”Œ๋ž˜์‰ฌ ์บ์‹ฑ, ์›น ์‚ฌ์ดํŠธ, ๋ฉ€ํ‹ฐ๋ฏธ๋””์–ด ์ŠคํŠธ๋ฆฌ๋ฐ, ๋Œ€์šฉ๋Ÿ‰ ํŒŒ์ผ ์—…๋กœ๋“œ - ์‚ฌ์šฉ์ž ์†๋„ ๊ฐœ์„ (์ „์†ก ๊ฑฐ๋ฆฌ ์ถ•์†Œ), origin ์„œ๋ฒ„ ๋ฐ ๋„คํŠธ์›Œํฌ ๋ถ€ํ•˜ ๊ฐ์†Œ, ๋Œ€๊ทœ๋ชจ ๋™์‹œ ์ ‘์†์‹œ ์‚ฌ์ดํŠธ ๋‹ค์šด ๋ฐฉ์ง€

    ๋„คํŠธ์›Œํฌ ๊ธฐ๋ณธ

    LAN, WAN * ํ•œ์ •๋œ ์ง€์—ญ ๋‚ด์˜ ๋„คํŠธ์›Œํฌ๋ฅผ ๋งํ•ฉ๋‹ˆ๋‹ค. LAN ๋ณด๋‹ค๋Š” WAN์ด ๋” ํฐ ๋ฒ”์œ„์ด์ง€๋งŒ ์ธํ„ฐ๋„ท์„ ์‚ฌ์šฉํ•˜๋Š” ์š”์ฆ˜์€ LAN, WAN์ด๋ผ๋Š” ๋ง์€ ์ž˜ ์‚ฌ์šฉํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ์ด๋”๋„ท ๋„คํŠธ์›Œํ‚น ๋ฐฉ์‹์—๋Š” FDDI, ํ† ํฐ๋ง, ์ด๋”๋„ท ๋“ฑ์ด ์žˆ๊ณ  ์ด๋”๋„ท์€ ๊ทธ ์ค‘ ํ•˜๋‚˜๋กœ ๊ฐ€์žฅ ๋งŽ์ด ์‚ฌ์šฉํ•˜๋Š” ๋„คํŠธ์›Œํ‚น ๋ฐฉ์‹์ž…๋‹ˆ๋‹ค. ์ด๋”๋„ท์˜ ๊ฐ€์žฅ ํฐ ํŠน์ง•์œผ๋กœ๋Š” CSMA/CD๋ผ๋Š” ํ†ต์‹  ๋ฐฉ์‹์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. CSMA/CD(Carrier Sense Multiple Access /Collision Detection) ๋ฐฉ์‹์€ ๋„คํŠธ์›Œํฌ ๋‚ด์— ์—ฐ๊ฒฐ๋œ ์ปดํ“จํ„ฐ๊ฐ€ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณด๋‚ด๊ธฐ ์œ„ํ•ด ๋„คํŠธ์›Œํฌ ์ƒ์— ์บ๋ฆฌ์–ด ์„ผ์Šค(Carrier Sense)๋ผ๊ณ  ํ•˜๋Š” ์‹ ํ˜ธ๋ฅผ ๋ณด๋ƒ…๋‹ˆ๋‹ค. ๋งŒ์•ฝ ๋„คํŠธ์›Œํฌ ์ƒ์— ๋ฐ˜์‘์ด ์—†์„ ๋•Œ ๋„คํŠธ์›Œํฌ์— ๋ฐ์ดํ„ฐ๋ฅผ ์‹ค์–ด ๋ณด๋‚ด๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ๋งŒ์•ฝ ๋„ค..

    ๋„คํŠธ์›Œํฌ ์ข…๋ฅ˜

    ์ธํ„ฐ๋„ท(Internet) Inter ์—ฐ๊ฒฐํ•˜๋‹ค + net ๋„คํŠธ์›Œํฌ๊ฐ€ ํ•ฉ์ณ์ง„ ๋ง๋กœ ๋ชจ๋“  ๋„คํŠธ์›Œํฌ๊ฐ€ ํ•ฉ์ณ์ง„ ๊ฒƒ์„ ์ธํ„ฐ๋„ท์ด๋ผ๊ณ  ํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋ ‡๊ธฐ ๋•Œ๋ฌธ์— ๊ฑฐ์˜ ๋ชจ๋“  ์ •๋ณด๋Š” ์ธํ„ฐ๋„ท์— ์žˆ๋‹ค๊ณ  ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์—ฌ๊ธฐ์„œ ๋ชจ๋“ ์€ ์ „์„ธ๊ณ„๋ฅผ ์˜๋ฏธํ•ฉ๋‹ˆ๋‹ค. ๊ทธ๋ ‡๊ธฐ ๋•Œ๋ฌธ์— ์ „์„ธ๊ณ„์™€ ํ†ต์‹ ํ•  ์ˆ˜ ์žˆ๋Š” ๊ทœ๊ฒฉํ™”๋œ ํ”„๋กœํ† ์ฝœ์ด ์กด์žฌํ•˜๊ณ  ๋Œ€ํ‘œ์ ์œผ๋กœ ์ธํ„ฐ๋„ท์„ ์‚ฌ์šฉํ•˜๊ธฐ ์œ„ํ•œ TCP/IP๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค. ์ธํ„ฐ๋„ท์„ ์‚ฌ์šฉํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ํ”ํžˆ ์‚ฌ์šฉํ•˜๋Š” ํฌ๋กฌ, ํŒŒ์ด์–ดํญ์Šค, ์ธํ„ฐ๋„ท ์ต์Šคํ”Œ๋กœ๋Ÿฌ ๋“ฑ์˜ ์›น ๋ธŒ๋ผ์šฐ์ €๋ฅผ ์ด์šฉํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ์ธํŠธ๋ผ๋„ท(Intranet) Intra ๋‚ด๋ถ€์˜ + net ๋„คํŠธ์›Œํฌ๊ฐ€ ํ•ฉ์ณ์ง„ ๋ง๋กœ ๋‚ด๋ถ€์—์„œ ์‚ฌ์šฉํ•˜๋Š” ๋„คํŠธ์›Œํฌ๋ฅผ ์ธํŠธ๋ผ๋„ท์ด๋ผ๊ณ  ํ•ฉ๋‹ˆ๋‹ค. ํ”ํžˆ ํšŒ์‚ฌ์—์„œ ์‚ฌ์šฉํ•˜๋ฉฐ ์—…๋ฌด๋Š” ์›น ๋ธŒ๋ผ์šฐ์ €๋ฅผ ํ†ตํ•ด ๊ฐ€๋Šฅํ•˜๋ฉฐ ์™ธ๋ถ€์—์„œ๋Š” ์ ‘์†์ด ๋ถˆ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ์—‘์ŠคํŠธ๋ผ๋„ท(Ext..