
ÈÀÌÆ® ÇØÄ¿¸¦ À§ÇÑ ¾ÏÈ£¿Í ÇØÅ·
- ÀúÀÚÀå»ï¿ë
- ÃâÆÇ»çÁ¤º¸¹®È»ç
- ÃâÆÇÀÏ2016-07-15
- µî·ÏÀÏ2018-02-07
- SNS°øÀ¯
- ÆÄÀÏÆ÷¸ËPDF
- ÆÄÀÏÅ©±â17 MB
- °ø±Þ»ç±³º¸¹®°í
-
Áö¿ø±â±â
PC
PHONE
TABLET
ÇÁ·Î±×·¥ ¼öµ¿¼³Ä¡
ÀüÀÚÃ¥ ÇÁ·Î±×·¥ ¼öµ¿¼³Ä¡ ¾È³»
¾ÆÀÌÆù, ¾ÆÀÌÆÐµå, ¾Èµå·ÎÀ̵åÆù, ÅÂºí¸´, PC
º¸À¯ 2, ´ëÃâ 0,
¿¹¾à 0, ´©Àû´ëÃâ 9, ´©Àû¿¹¾à 0
Ã¥¼Ò°³
¡ºÈÀÌÆ® ÇØÄ¿¸¦ À§ÇÑ ¾ÏÈ£¿Í ÇØÅ·¡»Àº ¡®¾ÏÈ£¡¯¿Í »çÀ̹ö °ø°ÝÀ» ¼öÇàÇÏ´Â ¡®ÇØÅ·¡¯À» ÀÌÇØÇÏ¿© »çÀ̹ö º¸¾È¿¡ °ü½ÉÀÌ Àְųª ÀÀ¿ëÇϰíÀÚ ÇÏ´Â ºÐµéÀ» À§ÇØ ÁýÇʵǾú½À´Ï´Ù. ÆÄÀ̽ãÀÇ ±âº» ÀÚ·áÇüÀ» »ìÆìº¸°í, °£´ÜÇÑ ¾ÏÈ£ µµ±¸¸¦ ¸¸µé¾î º¸´Â °ÍÀ¸·Î ½ÃÀÛµÇ¸ç ´ëĪŰ ¾ÏÈ£¿Í °ø°³Å° ¾ÏÈ£ÀÇ °¢Á¾ ¿¹Á¦¸¦ ÇÔ²²ÇÕ´Ï´Ù. ÀÌÈÄ ÇØÅ·ÀÇ À¯Çü°ú ±â¹ýÀ» ¼Ò°³Çϰí Á÷Á¢ ±¸ÇöÇØº½À¸·Î½á ÀÌ·Ð Áß½ÉÀÌ ¾Æ´Ñ, ´Éµ¿ÀûÀ¸·Î Á÷Á¢ ½ÇÇàÇÒ ¼ö ÀÖ½À´Ï´Ù.
ÀúÀÚ¼Ò°³
ÀúÀÚ : Àå»ï¿ë
ÀúÀÚ Àå»ï¿ëÀº ¼¿ï´ëÇб³ ÁöÁú°úÇаú, µ¿´ëÇпø Áö±¸¹°¸®ÇÐ ¼®»ç¸¦ Á¹¾÷ÇÏ¿´À¸¸ç, ¿ìÁÖÇ×°øºÐ¾ß º¥Ã³, ÀÓº£µðµå ¼ÒÇÁÆ®¿þ¾î Àü¹®±â¾÷¿¡¼ ¼ÒÇÁÆ®¿þ¾î °³¹ßÀ» ´ã´çÇÏ¿´´Ù.
±¹³» 1À§ CDN ¾÷ü¿¡¼ ÆÄÀ̽ãÀ¸·Î P2P ±â¹Ý ÇÏÀ̺긮µå ÄÜÅÙÃ÷ Àü¼Û ½Ã½ºÅÛÀ» °³¹ß, ½Ç¼ºñ½º¿¡ Àû¿ëÇÏ¿´°í, Ƽ¸Æ½º¼ÒÇÁÆ®¿¡¼ ¹Ìµé¿þ¾î Àü¹® ÄÁ¼³ÅÏÆ®·Î Ȱµ¿ÇÏ¿´´Ù.
ÇöÀç´Â ÆÄÀ̽ãÀ» Ȱ¿ëÇÑ ±â¾÷Á¤º¸ º¸¾È, ÄÄÇ»ÅͺñÀü, ¸Ó½Å·¯´×¿¡ ´ëÇÑ ±â¼úÀ» ¿¬±¸Çϰí ÀÖ´Ù.
¸ñÂ÷
¥° ¾ÏÈ£(Cipher)1Àå °£´ÜÇÑ ¾ÏÈ£ µµ±¸ ¸¸µé±â
1. ¾ÏÈ£¶õ ¹«¾ùÀΰ¡
2. ÆÄÀ̽㠰³¹ß ȯ°æ ÁغñÇϱâ
2-1 ÆÄÀ̽ã ÃֽйöÀü ¼³Ä¡Çϱâ
2-2 IDLE ½ÃÀÛÇϱâ
3. ÆÄÀ̽㠱⺻ ÀÚ·áÇü »ìÆìº¸±â
3-1 ¼öÄ¡Çü ÀÚ·á
3-2 ¹®ÀÚ¿ ÀÚ·á
3-3 ¸®½ºÆ® ÀÚ·á
3-4 »çÀü ÀÚ·á
3-5 Æ©Çà ÀÚ·á
3-6 ½ÃÄö½º ÀÚ·áÇü
3-7 ÀÚ·áÇü Ãâ·Â - print( )
4. ù ¹øÂ° ¾ÏÈ£ µµ±¸ ±¸ÇöÇϱâ
4-1 ºÐ¼®Çϱâ
4-2 ¾ÏÈ£ µµ±¸ ¼Ò½ºÄÚµå
4-3 µé¿©¾²±â(Indentation)
4-4 ÇÔ¼ö Ȱ¿ëÇϱâ
4-5 ¼Ò½ºÄÚµå ¼³¸í
4-6 for¹®
4-7 if¹®
4-8 string.replace( )
4-9 ´Ü¹® ¸Þ½ÃÁö ¾Ïȣȡ¤º¹È£È Çϱâ
4-10 if __name__ == ¡®__main__¡¯:
4-11 import
4-12 ÆÄÀÏ ¾Ïȣȡ¤º¹È£ÈÇϱâ
4-13 open( ), file.close( ), file.read( ), file.write( )
5. Ä«À̻縣 ¾ÏÈ£ µµ±¸ ¸¸µé±â
5-1 ¾ÏÈ£ ¿ø¸®
5-2 ¾ÏÈ£ µð½ºÅ©(Cipher Disk)
5-3 ¾ÏÈ£ µµ±¸ ±¸ÇöÇϱâ
5-4 lambda ÇÔ¼ö
5-5 map( )
5-6 ¹®ÀÚ¿ Æ÷¸ËÆÃ
5-7 À̽ºÄÉÀÌÇÁ ¹®ÀÚ
5-8 ¾ÆÇÉ ¾ÏÈ£ µµ±¸ ±¸ÇöÇϱâ
6. ÀüÄ¡ ¾ÏÈ£ µµ±¸ ¸¸µé±â
6-1 ¾ÏÈ£ ¿ø¸®
6-2 ¾ÏÈ£ µµ±¸ ±¸ÇöÇϱâ
6-3 sorted( )
2Àå ´ëĪŰ ¾ÏÈ£(Symmetric-key Cryptography)
1. ´ëĪŰ ¾ÏÈ£
1-1 ´ëĪŰ ¾ÏÈ£ ¿ø¸®
1-2 ºí·Ï ¾ÏÈ£
1-3 ½ºÆ®¸² ¾ÏÈ£
1-4 3DES
1-5 AES(Rijndael ¾Ë°í¸®Áò)
2. Pycrypto ¼³Ä¡Çϱâ
2-1 ¼Ò½º¸¦ ´Ù¿î¹Þ¾Æ Á÷Á¢ ¼³Ä¡Çϱâ
2-2 PIP¸¦ ÀÌ¿ëÇÏ¿© ¼³Ä¡Çϱâ
3. ´Ü¹® ¸Þ½ÃÁö ¾ÏÈ£ÈÇϱâ
3-1 3DES·Î ±¸ÇöÇϱâ
3-2 AES·Î ±¸ÇöÇϱâ
3-3 ½ºÆ®¸² ¾ÏÈ£·Î ±¸ÇöÇϱâ
3-4 Ŭ·¡½º Ȱ¿ëÇϱâ
3-5 À¯´ÏÄÚµå
3-6 string.split( )
4. ÆÄÀÏ ¾ÏÈ£ÈÇϱâ
4-1 3DES·Î ±¸ÇöÇϱâ
4-2 AES·Î ±¸ÇöÇϱâ
4-3 µ¥ÀÌÅÍ ¹«°á¼º °ËÁõÇϱâ
3Àå °ø°³Å° ¾ÏÈ£(Public-key Cryptography)
1. °ø°³Å° ¾ÏÈ£¶õ
1-1 °ø°³Å° ¾ÏÈ£ ¿ø¸®
1-2 °ø°³Å° ¾ÏÈ£¿Í °ø°³Å° ¼¸í
1-3 °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
2. RSA °ø°³Å° ¾ÏÈ£ ±¸Çö ¿¹Á¦
2-1 RSA °ø°³Å° ¾ÏÈ£ ±¸ÇöÇϱâ
2-2 RSA °ø°³Å° ¼¸í ±¸ÇöÇϱâ
¥± ÇØÅ·(Hacking)
4Àå ÇØÅ·À̶õ
1. ÇØÅ·°ú Å©·¡Å·
2. ÇØÅ· À¯Çü
2-1 ¼ÒÇÁÆ®¿þ¾î Å©·¡Å·
2-2 ½Ã½ºÅÛ ÇØÅ·
2-3 ³×Æ®¿öÅ© ÇØÅ·¡¦
2-4 ¼ºñ½º °ÅºÎ °ø°Ý
2-5 APT(Advanced Persistent Threat)
3. ÇØÅ· ±â¹ý
3-1 ¾ÏÈ£ °ø°Ý
3-2 ۷αë
3-3 ¹öÆÛ ¿À¹öÇ÷οì
3-4 ½º´ÏÇÎ
3-5 ½ºÇªÇÎ
3-6 ¾Ç¼ºÄÚµå
3-7 ¹éµµ¾î
3-8 ICMP Flooding
3-9 ÄÚµå ÁÖÀÔ
5Àå ÇØÅ· ±â¹ý ±¸ÇöÇϱâ
1. ¾ÏÈ£ °ø°Ý
1-1 ¾ÏÈ£¹® ´Üµ¶ °ø°Ý
1-2 ¾Ë·ÁÁø Æò¹® °ø°Ý
2. ÆÐ½º¿öµå Å©·¡Å·
2-1 ½Ã½ºÅÛ ÆÐ½º¿öµå Å©·¡Å· À¯Çü
2-2 À¯´Ð½º ÆÐ½º¿öµå Å©·¡Å·
2-3 with open( ) as ±¸¹®
2-4 ZIP ÆÄÀÏ ÆÐ½º¿öµå Å©·¡Å·
2-5 ¿¹¿Ü ó¸®
2-6 threading.Thread¡¦
3. ½º´ÏÇÎ
3-1 ½º´ÏÇÎÀ» À§ÇÑ ³×Æ®¿öÅ© ±âÃÊ
3-2 °£´ÜÇÑ ½º´ÏÇÎ ÇÁ·Î±×·¥ ±¸ÇöÇϱâ
3-3 IP Çì´õ ÀÌÇØÇϱâ
3-4 IP Çì´õ ½º´ÏÆÛ ±¸ÇöÇϱâ
3-5 ICMP ½º´ÏÆÛ ±¸ÇöÇϱâ
3-6 È£½ºÆ® ½ºÄ³³Ê ±¸ÇöÇϱâ
3-7 PINGÀ» ÀÌ¿ëÇÑ È£½ºÆ® ½ºÄ³³Ê ±¸ÇöÇϱâ
3-8 Scapy ¼³Ä¡Çϱâ
3-9 Scapy¸¦ ÀÌ¿ëÇÏ¿© ½º´ÏÆÛ ±¸ÇöÇϱâ
3-10 ¸Þ½ÃÁö ³»¿ë °¡·Îä±â
3-11 ½º´ÏÇÎ ¹æ¾î ´ëÃ¥
4. ½ºÇªÇÎ
4-1 ARP ÀÌÇØÇϱâ
4-2 ARP ½ºÇªÇÎ ±¸ÇöÇϱâ
4-3 APR ½ºÇªÇÎÀ¸·Î ÇÇ½Ì »çÀÌÆ® À¯µµÇϱâ
4-4 IP ½ºÇªÇÎ
4-5 SYN Flooding
4-6 DNS ½ºÇªÇÎ
4-7 ½ºÇªÇÎ °ø°Ý ¹æ¾î ´ëÃ¥
5. À¥ ÇØÅ·
5-1 HTTP ÀÌÇØÇϱâ
5-2 Referer Á¶ÀÛÇϱâ
5-3 urlopen( )°ú Request °´Ã¼
5-4 ÄíŰ Á¶ÀÛÇϱâ
5-5 ÆÄÀ̽ã Á¤±Ô½Ä
5-6 À¥ ¸µÅ© Å©·Ñ·¯ ±¸ÇöÇϱâ
5-7 À¥ ¼¹ö ½ºÄµÇϱâ
5-8 À¥ ÀÎÁõ Å©·¡Å·
5-9 SQL ÁÖÀÔÇϱâ
5-10 HTTPS?HTTP over SSL
6. Æ®·ÎÀÌ ¸ñ¸¶ ¸¸µé±â
6-1 ÁغñÇϱâ
6-2 Ű·Î±ë ±¸ÇöÇϱâ
6-3 ȸé ĸó ±¸ÇöÇϱâ
6-4 cx_Freeze·Î ¹ÙÀ̳ʸ® ½ÇÇà ÆÄÀÏ ¸¸µé±â
6-5 PyInstaller¸¦ ÀÌ¿ëÇÏ¿© ¹ÙÀ̳ʸ® ½ÇÇà ÆÄÀÏ ¸¸µé±â¡¦