»ç¹° ÀÎÅͳÝÀÇ »ç¹°ÀÌ ÇØÅ·µÈ´Ù¸é?

åǥÁö

ÀηùÀÇ »îÀÌ Áß¾Óó¸®ÀåÄ¡ÀÇ Áö¹è¸¦ ¹ÞÀ¸¸é¼­, »çÀ̹ö º¸¾ÈÀº Á¤ºÎ¿Í ±â¾÷»Ó¸¸ ¾Æ´Ï¶ó ÀÌÁ¦ °³ÀÎÀÇ Æò¿ÂÇÑ »îÀ» Ã¥ÀÓÁ®¾ß ÇÏ´Â °úÁ¦±îÁö ¾È°Ô µÇ¾ú´Ù. ƯÈ÷ ¿À´Ã³¯ »ç¹° ÀÎÅͳݰú ÀÚÀ² ÁÖÇà ÀÚµ¿Â÷, ÁøÈ­ÇÏ°í ÀÖ´Â À̵¿ ¼ö´Ü µî ¿©·¯ °¡Áö Çõ¸íÀÌ µ¿½Ã´Ù¹ßÀûÀ¸·Î ÁøÇàµÇ¸é¼­, º¸¾È¿¡ ´ëÇÑ À§ÇùÀÌ °©Àڱ⠴õ Ä¿Á³°í, ÀÌÁ¦ Áï°¢Àû ´ëÀÀÀÌ ÇÊ¿äÇÑ »óȲÀ¸·Î µ¹º¯ÇÏ°í ÀÖ´Ù. ¹«¾ùÀÌ ¿ì¸®ÀÇ »îÀ» À§ÇùÇÏ°í Àִ°¡? ÇöÁ¸ÇÏ´Â »çÀ̹ö À§ÇùÀº ¾î´À ¼öÁØÀΰ¡? Á¤ºÎ¿Í ±â¾÷, °³ÀÎÀº ÀÌ·¯ÇÑ À§Çù¿¡ ¾î¶»°Ô ´ëÀÀÇØ¾ß Çϴ°¡? ¶óÀÌÇÁ½ºÅ¸ÀÏ, ÇÁ¶óÀ̹ö½Ã, ±â¾÷ÀÇ ¼öÀͼº µî °¢ Ãø¸é¿¡¼­ ÀÌ ¹®Á¦¸¦ »ìÆ캸ÀÚ.




America

»ç¹° ÀÎÅͳÝÀÇ »ç¹°ÀÌ ÇØÅ·µÈ´Ù¸é? Managing the Intenet of (Hackable) Things


ÀηùÀÇ »îÀÌ Áß¾Óó¸®ÀåÄ¡ÀÇ Áö¹è¸¦ ¹ÞÀ¸¸é¼­, »çÀ̹ö º¸¾ÈÀº Á¤ºÎ¿Í ±â¾÷»Ó¸¸ ¾Æ´Ï¶ó ÀÌÁ¦ °³ÀÎÀÇ Æò¿ÂÇÑ »îÀ» Ã¥ÀÓÁ®¾ß ÇÏ´Â °úÁ¦±îÁö ¾È°Ô µÇ¾ú´Ù. ƯÈ÷ ¿À´Ã³¯ »ç¹° ÀÎÅͳݰú ÀÚÀ² ÁÖÇà ÀÚµ¿Â÷, ÁøÈ­ÇÏ°í ÀÖ´Â À̵¿ ¼ö´Ü µî ¿©·¯ °¡Áö Çõ¸íÀÌ µ¿½Ã´Ù¹ßÀûÀ¸·Î ÁøÇàµÇ¸é¼­, º¸¾È¿¡ ´ëÇÑ À§ÇùÀÌ °©Àڱ⠴õ Ä¿Á³°í, ÀÌÁ¦ Áï°¢Àû ´ëÀÀÀÌ ÇÊ¿äÇÑ »óȲÀ¸·Î µ¹º¯ÇÏ°í ÀÖ´Ù. ¹«¾ùÀÌ ¿ì¸®ÀÇ »îÀ» À§ÇùÇÏ°í Àִ°¡? ÇöÁ¸ÇÏ´Â »çÀ̹ö À§ÇùÀº ¾î´À ¼öÁØÀΰ¡? Á¤ºÎ¿Í ±â¾÷, °³ÀÎÀº ÀÌ·¯ÇÑ À§Çù¿¡ ¾î¶»°Ô ´ëÀÀÇØ¾ß Çϴ°¡? ¶óÀÌÇÁ½ºÅ¸ÀÏ, ÇÁ¶óÀ̹ö½Ã, ±â¾÷ÀÇ ¼öÀͼº µî °¢ Ãø¸é¿¡¼­ ÀÌ ¹®Á¦¸¦ »ìÆ캸ÀÚ.


»ç¹°ÀÎÅͳÝ(IoT)ÀÌ ÀÏ»óÀÇ ºñÁî´Ï½º¿Í »îÀ» Çõ¸íÀûÀ¸·Î º¯È­½ÃÅ°°í ÀÖ´Ù. ±â¼ú ¸®¼­Ä¡ ȸ»ç °¡Æ®³Ê(Gartner) Inc.´Â 2016³â ÇÏ·ç Æò±Õ ¾à 550¸¸ °³¿¡ ´ÞÇÏ´Â °ÅÀÇ ¸ðµç À¯ÇüÀÇ Á¦Ç°µéÀÌ ÀÎÅͳݿ¡ ¿¬°áµÇ°í ÀÖÀ¸¸ç, 2016³â ¸»¿¡´Â 65¾ï °³ÀÇ ±â±âµéÀÌ ³×Æ®¿öÅ©È­ µÇ¾ú°í, ÀÌ ¼öÄ¡´Â 2015³â ±âÁØ 30% Áõ°¡ÇÑ °ÍÀ̶ó°í ¹àÇû´Ù. ÀÌ ¼Óµµ¶ó¸é 2020³â¿¡ À̸£·¯ ¾à 208¾ï °³ÀÇ ±â±â°¡ ÀÎÅͳݿ¡ ¿¬°áµÉ °ÍÀÌ´Ù.


±×·¸´Ù¸é »ç¹°ÀÎÅͳݿ¡ ¿¬°áµÇ°í ÀÖ´Â »ç¹°(Things)Àº ¾î¶² °ÍµéÀϱî? °ÅÀÇ ¸ðµç °ÍÀ̶ó°í ºÁµµ ¹«¹æÇÏ´Ù. ½Å»ý¾Æ ¸ð´ÏÅ͸µ ±â±â, ¿þ¾î·¯ºí ÇÇÆ®´Ï½º Æ®·¢Ä¿, ÀÇ·á ±â±â, Æó¼âȸ·Î º¸¾È Ä«¸Þ¶ó, µµ³­ °æº¸±â, ½º¸¶Æ® ¿ÂµµÁ¶ÀýÀåÄ¡, ÀÚµ¿Â÷, Å佺ÅÍ, ³ÃÀå°í, ½Ä±â¼¼Ã´±â, ½º¸¶Æ® TV, ½º¸¶Æ® ½Ã°è, µðÁöÅÐ Ä«¸Þ¶ó, ¾Ö¿Ï¿ë ¸ñ°ÉÀÌ, ÀüÀÚ ÀåÄ¡, °øÀå ±â°è, ÆÄ¿ö ±×¸®µå, Á¤¼ö ÇÊÅÍ µî ¼öµµ ¾øÀÌ ¸¹´Ù.


¸ÆŲÁö & ÄÄÆÛ´Ï ±Û·Î¹ú ¿¬±¸¼Ò´Â 2025³â »ç¹°ÀÎÅͳÝÀÇ ÀüüÀûÀÎ °æÁ¦ ¼öÇý ±Ô¸ð°¡ ¿¬°£ 3Á¶9õ¾ï ´Þ·¯¿¡¼­ 11Á¶1õ¾ï ´Þ·¯°¡ µÉ °ÍÀ¸·Î º¸°í ÀÖ´Ù. ÀÌ ±â¼úÀº ºÐ¸íÈ÷ ºÎ¸¦ âÃâÇÏ´Â µ¥ »ó´çÇÑ ±âȸµéÀ» ¿­¾îÁÖ°í ÀÖ´Â °ÍÀº È®½ÇÇÏ´Ù. ¹°·Ð ±×·¯ÇÑ ±âȸµéÀÌ ¸ðµÎ ÇÕ¹ýÀûÀÎ °ÍÀº ¾Æ´Ò °ÍÀÌ´Ù. ÇÕ¹ýÀû ºñÁî´Ï½ºµéÀº »ç¹°ÀÎÅͳÝÀ» ÅëÇØ ¼öÀÍÀ» ¹ß»ý½ÃÅ°´Â ´Ù¾çÇÑ ¹æ½Ä¿¡¼­ ¿î¿ëµÉ °ÍÀÌÁö¸¸, ¹Ý¸é »çÀ̹ö ¹üÁË ¶ÇÇÑ ±×·¯ÇÑ ÀáÀç·Â¿¡ ¹ö±Ý°¥ ¸¸Å­ ±â½ÂÀ» ºÎ¸± ¼ö Àֱ⠶§¹®ÀÌ´Ù.


ÀÌ°ÍÀº ´Ü¼øÈ÷ ´©±º°¡ÀÇ Å佺Ʈ¸¦ Å¿î´Ù°Å³ª, ³ÃÀå°íÀÇ ¾ÆÀ̽ºÅ©¸²À» ³ìÀÌ´Â ÇüÅÂÀÇ À§ÇùÀº ¾Æ´Ò °ÍÀÌ´Ù. ¹°·Ð ±×·¯ÇÑ °¡´É¼ºµµ ¿­·Á ÀÖ´Ù. ±×·¯³ª ½ÇÁ¦ ´õ Ä¡¸íÀûÀÎ À§ÇùÀº Ȩ ³×Æ®¿öÅ©¿¡ Á¢¼ÓÇÏ¿© º¸¾ÈÀÌ Ãë¾àÇÑ ºÎºÐÀ» °ø°ÝÇÏ´Â °ÍÀ¸·Î, ¹üÁËÀÚµéÀÌ °³ÀÎ Á¤º¸ ȤÀº ±ÝÀ¶ Á¤º¸¸¦ ÈÉÄ¡´Â °ÍÀÌ´Ù. ¿Ö ÈÉÄ¡´ÂÁö´Â ±»ÀÌ ¼³¸íÇÏÁö ¾Ê¾Æµµ µÉ °ÍÀÌ´Ù.


ÀÌ·± ÀÏÀÌ ¾ÆÁ÷Àº ½Ã±â»óÁ¶¶ó°í »ý°¢ÇÏ´Â »ç¶÷µéÀÌ ÀÖÀ» °ÍÀÌ´Ù. ±×·¯³ª Á¤¸» ±×·²±î? ÃÖ±Ù FBI°¡ ¹ßÇ¥ÇÑ ³»¿ëÀ» º¸ÀÚ.


"ºó¾àÇÑ º¸¾È ´É·Â°ú »ç¹°ÀÎÅͳÝÀÇ Ãë¾àÁ¡, ¿©±â¿¡ ¼ÒºñÀÚµéÀÇ º¸¾È ÀÎ½Ä ºÎÁ·À¸·Î, »çÀ̹ö ¹üÁËÀÚµéÀÌ ÀÌ·¯ÇÑ ±â±â¸¦ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ±âȸ°¡ ¹ß»ýÇÏ°í ÀÖ´Ù. ¹üÁËÀÚµéÀº ¿ø°ÝÀ¸·Î ´Ù¸¥ ½Ã½ºÅÛÀ» °ø°ÝÇϱâ À§ÇØ, ¾ÇÀÇÀûÀÎ ½ºÆÔ¼º À̸ÞÀÏÀ» º¸³»±â À§ÇØ, °³ÀÎ Á¤º¸¸¦ ÈÉÄ¡±â À§ÇØ, ȤÀº º¸¾ÈÀ» ¹æÇØÇϱâ À§ÇØ, ÀÌ·¯ÇÑ ±âȸ¸¦ È°¿ëÇÒ ¼ö ÀÖ´Ù. »ç¹°ÀÎÅͳÝÀÇ ÁÖ¿ä À§ÇùÀº ´ÙÀ½°ú °°´Ù."


- ¼ö¸¹Àº »ç¹°ÀÎÅÍ³Ý ±â±â¿¡ Á¢±ÙÇϱâ À§ÇÑ UPnP(universal plug and play, ¸¶ÀÌÅ©·Î¼ÒÇÁÆ® »ç°¡ Á¦Ã¢ÇÑ °ÍÀ¸·Î °¢Á¾ °¡Àü Á¦Ç°À» Ȩ ³×Æ®¿öÅ©¿¡ Á¢¼ÓÇÏ´Â ÀÎÅÍÆäÀ̽º ±Ô°Ý. À©µµ ¿î¿µ üÁ¦°¡ °¡Áö°í ÀÖ´Â Ç÷¯±× ¾Øµå Ç÷¹ÀÌ ±â´ÉÀ» °¡ÀüÀ¸·Î È®ÀåÇÑ °Í)ÀÇ ¾Ç¿ë. ÀÌ ÇÁ·ÎÅäÄÝÀº ¾î¶² ±â±â°¡ ¿ø°ÝÀûÀ¸·Î ¿¬°áµÇ¾î ÀÎÁõ ¾øÀÌ ÀÚµ¿ÀûÀ¸·Î ³×Æ®¿öÅ©¿Í ¼ÒÅëÇÒ ¶§ÀÇ ÇÁ·Î¼¼½º¸¦ Çü¼ºÇÏ´Â °ÍÀÌ´Ù. UPnP´Â ƯÁ¤ IP ¾îµå·¹½º¿¡ ¼ÓÇÒ ¶§ ½º½º·Î ÀÚµ¿ ¼³Á¤µÇµµ·Ï °í¾ÈµÇ¾ú±â ¶§¹®¿¡, º¸¾È¿¡ ¸Å¿ì Ãë¾àÇÑ ±¸Á¶¸¦ °®°í ÀÖ´Ù. »çÀ̹ö ¹üÁËÀÚµéÀº ¼³Á¤À» ¹Ù²Ü ¼ö ÀÖ°í, ±â±â¿¡ ¸í·ÉÀ» ³»¸± ¼öµµ ÀÖ´Ù. ÀáÀçÀûÀ¸·Î ±â±â¿¡¼­ ¹Î°¨ÇÑ Á¤º¸¸¦ »Ì¾Æ³»°Å³ª °¡Á¤°ú »ç¾÷Àå¿¡ ´ëÇÑ °ø°Ýµµ °¨ÇàÇÒ ¼ö ÀÖ´Ù. µðÁöÅÐ µµÃ»µµ °¡´ÉÇÏ´Ù.


- ¾ÇÀÇÀûÀÎ ½ºÆÔ ¸ÞÀÏÀ» ¹ß¼ÛÇϱâ À§ÇØ È¤Àº °³ÀÎ ½Äº° Á¤º¸³ª ½Å¿ëÄ«µå Á¤º¸¸¦ ÈÉÄ¡±â À§ÇÑ µðÆúÆ®(default, Ãʱ⼳Á¤) Æнº¿öµåÀÇ ÀÌ¿ë

- ¹°¸®Àû ÇÇÇظ¦ ¾ß±âÇϱâ À§ÇÑ »ç¹°ÀÎÅÍ³Ý ±â±â Á¶ÀÛ

- ±â±â¸¦ µ¿ÀÛ ºÒ´É »óÅ·Π¸¸µé±â À§ÇÑ °úºÎÇÏ

- ºñÁî´Ï½º °Å·¡ ¹æÇØ


½º¸¶Æ® ½Ã°è ³»ÀÇ ¸ð¼Ç ¼¾¼­¿Í °°Àº »ç¼ÒÇÑ ±â¼úÁ¶Â÷µµ ¹üÁË¿¡ ¾Ç¿ëµÉ ¼ö Àִµ¥, »ç¿ëÀÚÀÇ °Ç°­°ü¸® ¸ñÇ¥¸¦ ÃßÀûÇϱâ À§ÇÑ ±â¼ú ¿ëµµ°¡ ¼ÕÀÇ ¿òÁ÷ÀÓÀ» ÇØÅ·À¸·Î ¸ð´ÏÅ͸µÇÏ¿© ½Å¿ë Ä«µåÀÇ Æнº¿öµå ÀÔ·ÂÀ» ³¬¾Æ ä°¡´Â °ÍÀ¸·Î ¹Ù²ð ¼öµµ ÀÖ´Ù.


¶ÇÇÑ ÇØÄ¿´Â º¿³×Æ®(botnet, ÀÏÁ¾ÀÇ ±º´ëó·³ ¾Ç¼º º¿¿¡ °¨¿°µÇ¾î ¸í·É¡¤Á¦¾î ¼­¹ö¿¡ ÀÇÇØ Á¦¾î´çÇÏ´Â ´ë·®ÀÇ ½Ã½ºÅÛµé·Î ±¸¼ºµÈ ³×Æ®¿öÅ©. ¼ö½Ê¿¡¼­ ¼ö¸¸ ´ëÀÇ ½Ã½ºÅÛÀÌ µ¿½Ã¿¡ ¸í·ÉÀ» Àü´Þ¹Þ¾Æ ½ÇÇàÇÏ¿© ´ë±Ô¸ðÀÇ ³×Æ®¿öÅ© °ø°Ý µî ´Ù¾çÇÑ ¾ÇÀÇÀÇ ÇàÀ§°¡ °¡´ÉÇÏ´Ù)¸¦ ¸¸µé±â À§ÇØ »ç¹°ÀÎÅÍ³Ý ±â±âÀÇ ÅëÁ¦±ÇÀ» »©¾ÑÀ» ¼öµµ ÀÖ´Ù.


¼ö³â Àü, º¸¾È ȸ»ç ÇÁ·çÇÁÆ÷ÀÎÆ®(Proofpoint)»ç°¡ ÃÖÃÊÀÇ »ç¹°ÀÎÅÍ³Ý º¿³×Æ®¸¦ Àû¹ßÇÑ ¹Ù ÀÖ´Ù. ÀÌ º¿³×Æ®¿¡ °¨¿°µÈ ±â±âÀÇ 1/4Àº ½Å»ý¾Æ ¸ð´ÏÅ͸µ ±â±â, ÅÚ·¹ºñÀü, ±âŸ ºñÀüÅëÀûÀÎ ÄÄÇ»Æà ±â±â¿´´Ù.


2016³â¿¡´Â ¼öÄí¸® ½ÃÅ¥·¯Æ¼(Sucuri Security)»ç°¡ ÇØÅ· ´çÇÑ Æó¼âȸ·Î º¸¾È Ä«¸Þ¶ó 25,500´ë ÀÌ»óÀ¸·Î ±¸¼ºµÈ º¿³×Æ®¸¦ Àû¹ßÇß´Ù. ÀÌ º¿³×Æ®´Â ¼­ºñ½º °ÅºÎ °ø°Ý(denial of service attacks, ¼­¹ö°¡ ó¸®ÇÒ ¼ö ÀÖ´Â ´É·Â ÀÌ»óÀÇ °ÍÀ» ¿ä±¸ÇÏ¿©, ±× ¿ä±¸¸¸ ó¸®ÇÏ°Ô ¸¸µêÀ¸·Î½á ´Ù¸¥ ¼­ºñ½º¸¦ Á¤Áö½ÃÅ°°Å³ª ½Ã½ºÅÛÀ» ´Ù¿î½ÃÅ°´Â °Í) ¹æ½ÄÀε¥, »ó¾÷¿ë À¥»çÀÌÆ®µéÀ» °ø°ÝÇϱâ À§ÇÑ ¸ñÀûÀ¸·Î »ç¿ëµÇ°í ÀÖ¾ú´Ù.


ÀÌ·¯ÇÑ Ä«¸Þ¶óµéÀº ÇØÄ¿µé¿¡°Ô ¾ÆÁÖ ¸Å·ÂÀûÀÎ ¸ñÇ¥°¡ µÇ´Âµ¥, Áö³­ÇØ¿¡¸¸ 2¾ï5õ5¹é¸¸ ´ë°¡ °ø°Ý ´ë»óÀ¸·Î ³ëÃâµÇ¾î ÀÖ¾ú±â ¶§¹®ÀÌ´Ù. ¼ÒºñÀÚµéÀ» µÑ·¯½Ñ ¼ö¸¹Àº Ä«¸Þ¶óµé°ú ´õºÒ¾î µðÆúÆ® Æнº¿öµå´Â °ÅÀÇ º¯ÇÏÁö ¾Ê±â ¶§¹®¿¡ ´©±¸³ª ±× Ä«¸Þ¶óµé¿¡ ¼ö¿ùÇÏ°Ô Á¢±ÙÇÒ ¼ö ÀÖ´Â »óÅ¿´´Ù.


»ç½Ç °¡Àå Å« À§ÇùÀº ÇÁ¶óÀ̹ö½Ã³ª ±ÝÀ¶ Á¤º¸ÀÇ ÀáÀçÀû µµ³­ÀÌ ¾Æ´Ï´Ù. »ç¹°ÀÎÅͳÝÀÇ Ãë¾àÇÑ º¸¾È ÇÁ·ÎÅäÄÝ·Î °¡´ÉÇÑ °ø°ÝÀÌ Àΰ£ÀÇ »ý¸íÀ» ÀÒ°Ô ÇÒ ¼öµµ ÀÖ´Ù.


¡¸ZDNET¡¹ÀÇ ÇÑ Æ÷½ºÆ®¿¡ µû¸£¸é, ÀÎÅÍ³Ý º¸¾È Àü¹®°¡ ºê·ç½º ½´³ªÀ̾î(Bruce Schneier)°¡ ÃÖ±Ù ÀÎÆ÷½ÃÅ¥·¯Æ¼ À¯·´(InfoSecurity Europe) ÄÁÆÛ·±½º¿¡¼­ Ä¿³ØƼµå Ä«(connected cars)ÀÇ Ãë¾à¼º¿¡ ´ëÇØ °æ°íÇß´Ù.


"¿ì¸®°¡ ÀÚµ¿Â÷¸¦ »ý°¢Çϸé, ±× Ãë¾à¼ºÀÇ À§ÇùÀÌ ÈξÀ ´õ ½É°¢ÇÏ´Ù´Â »ç½ÇÀ» ¾Ë°Ô µÈ´Ù. ÀÌ°ÍÀº »ý¸í°ú Àç»ê¿¡ ´ëÇÑ ½ÇÁúÀûÀÎ À§±âÀ̱⵵ ÇÏ´Ù."


ºê·ç½º ½´³ªÀ̾î´Â ÇØÄ¿µéÀÌ ¿îÀüÀÚÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ ħÇØÇÏ´Â °Íµµ ³ª»ÚÁö¸¸ ´õ Å©°í ³ª»Û À§Çù¿¡ ´ëÇØ ¹àÈ÷°í ÀÖ´Ù.


"ºê·¹ÀÌÅ©¸¦ ºÒ´É »óÅ·Π¸¸µç´Ù¸é? 1³âÀ̳ª 2³â¿¡ ÇÑ ¹ø Á¤µµ¶óµµ ÀÚµ¿Â÷ CPU¿¡ ·£¼¶¿þ¾î(ransomeware)¸¦ ¼³Ä¡ÇÏ´Â ¹æ¹ýÀ» ´©±º°¡°¡ ÆľÇÇß´Ù¸é? ÀÌ°ÍÀº ¿ôÀ» ÀÏÀÌ ¾Æ´Ï¶ó ÄÄÇ»ÅÍ°¡ Á¸ÀçÇÏ´Â ÇÑ »óÁ¸ÇÏ´Â À§ÇùÀÌ µÈ´Ù."


·£¼¶¿þ¾î´Â ÇØÄ¿ °ø°ÝÀÇ ÇÑ ÇüÅ·Î, ħÀÔÀÚ°¡ Èñ»ýÀÚÀÇ ÄÄÇ»ÅÍ, ÀüÈ­, ÀÚµ¿Â÷ µîÀ» ÀÛµ¿ ºÒ´É »óÅ·Π¸¸µå´Â °ÍÀÌ´Ù. °¨¿°µÈ ÄÄÇ»ÅÍ´Â ½Ã½ºÅÛ¿¡ ´ëÇÑ Á¢±ÙÀÌ Á¦ÇѵǸç À̸¦ ÇØÁ¦ÇÏ·Á¸é ÇØÄ¿°¡ ¿ä±¸ÇÏ´Â ±ÝÀüÀ» Á¦°øÇØ¾ß ÇÑ´Ù. ÀÚµ¿Â÷ ÇÚµéÀ̳ª ºê·¹ÀÌÅ©°¡ ´Ù½Ã ÀÛµ¿Çϵµ·Ï ÇÏ´Â °Íµµ ¸¶Âù°¡Áö´Ù. ½Ã¸ÇÅØ(Symantec)»ç´Â ÀÌ·¯ÇÑ ¹üÁËÀÚµéÀÌ ¸Å³â Èñ»ýÀÚµé·ÎºÎÅÍ 5¹é¸¸ ´Þ·¯ ÀÌ»óÀ» °¥ÃëÇÏ°í ÀÖÁö¸¸, µ·À» ¹Þ¾Ò´Ù°í ¾à¼ÓÀ» ÀÌÇàÇÏ´Â °Íµµ ¾Æ´Ï¶ó°í ¸»ÇÑ´Ù.


ÀÌ·¯ÇÑ À§ÇùÀÌ ÀÚ½ÅÀÇ ÀÚµ¿Â÷¿¡´Â ÇØ´çµÇÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ÇÑ´Ù¸é ¼øÁøÇÏ°í ¾î¸®¼®Àº »ý°¢ÀÌ´Ù. ÇØÄ¿µéÀº ÀÚµ¿Â÷ ºê·¹ÀÌÅ©³ª ¾×¼¿¿¡ ´ëÇÑ ÅëÁ¦±ÇÀ» ½±°Ô Àå¾ÇÇÒ ¼ö ÀÖ°í, ÀÏ´Ü ÇÇÇظ¦ ÀÔÈ÷¸é »ç°í¸¦ ´çÇÒ ¼ö ÀÖ´Ù´Â Çù¹ÚÀ¸·Î µ·À» Áï°¢ º¸³¾ °ÍÀ» ¿ä±¸ÇÏ°í ÀÖ´Ù.


ÀÌ°ÍÀº ÀüÇô Ưº°ÇÑ ÀÏÀÌ ¾Æ´Ï´Ù. ÄÄÇ»ÅÍ Àü¹®°¡µéÀÇ Á¶»ç¿¡ µû¸£¸é ÀÌ¹Ì ÀÌ·¯ÇÑ ÀÏÀº ÃæºÐÈ÷ °¡´ÉÇÑ °ÍÀ¸·Î Áõ¸íµÇ¾ú´Ù. ½ÇÁ¦·Î 2011³â, Ķ¸®Æ÷´Ï¾Æ ´ëÇб³¿Í ¿ö½ÌÅÏ ´ëÇб³ÀÇ ¿¬±¸ÁøµéÀº ½¦º¸¶ó ÀÓÆȶóÀÇ µµ¾î¶ô ±â´É°ú ºê·¹ÀÌÅ© ±â´ÉÀ» ¿ø°ÝÀ¸·Î ºÒ´É »óÅ·Π¸¸µé ¼ö ÀÖ¾ú´Ù.


2015³â, ¡¸¿ÍÀ̾îµå(Wired)¡¹Áö´Â Å©¸®½º ¹ß¶ó¼¼Å©(Chris Valasek)¿Í Âû¸® ¹Ð·¯(Charlie Miller)¶ó´Â È­ÀÌÆ® ÇØÄ¿¸¦ ÅëÇØ ÁöÇÁ ü·ÎÅ°¸¦ ¿ø°ÝÀ¸·Î ÅëÁ¦ÇÒ ¼ö ÀÖÀ½À» º¸µµÇß´Ù. ±âÀÚ Áß ÇÑ ¸íÀÌ ¼¼ÀÎÆ® ·çÀ̽º °í¼Óµµ·Î¿¡¼­ ÇØ´ç ü·ÎÅ°¸¦ ¿îÀüÇß°í, ÇØÄ¿µéÀº ÀÚ½ÅÀÇ Áý¿¡¼­ ¿ø°ÝÀ¸·Î ÀÌ SUVÀÇ ¿¡¾îÄÁ°ú ¶óµð¿À, ¿ÍÀÌÆÛ µîÀ» Á¶ÀÛÇß´Ù. ¿îÀüÀÚ°¡ ÇÒ ¼ö ÀÖ´Â °ÍÀº ¾Æ¹« °Íµµ ¾ø¾ú´Ù.


ÀÌ Á¶ÀÛÀº À̵é ÇØÄ¿µéÀÌ ´ÙÀ½¿¡ ½ÃµµÇÑ Á¶ÀÛ¿¡ ºñÇÏ¸é ¾Æ¹« °Íµµ ¾Æ´Ï¾ú´Ù. À̵éÀº ü·ÎÅ°ÀÇ º¯¼Ó±â¸¦ ¸¶ºñ½ÃÄ×°í, ¾×¼¿ ±â´ÉÀ» ¹«·ÂÈ­ÇÔÀ¸·Î½á ÀÚµ¿Â÷ ¼Óµµ¸¦ ÇöÀúÇÏ°Ô °¨¼Ó½ÃÄ×´Ù. 18ÀÎÄ¡ ÇÚµéÀº Á¦´ë·Î ÀÛµ¿µÇÁö ¾Ê¾Æ ÀÚµ¿Â÷´Â ÅëÁ¦ ºÒ´É »óÅ°¡ µÇ¾ú´Ù. ÇØÄ¿µéÀº ÁöÇÁÀÇ ºê·¹ÀÌÅ© ±â´Éµµ ¸¶ºñ½ÃÄÑ ¿îÀüÀÚ°¡ ºê·¹ÀÌÅ©¸¦ ¹â¾Æµµ ±â´ÉÀÌ ¹ßÈÖµÇÁö ¾Ê°Ô ¸¸µé¾ú´Ù.


µÎ ÇØÄ¿´Â ±×µéÀÌ CAN bus¶ó ºÒ¸®´Â ¿£Áø°ú ºê·¹ÀÌÅ©, ŸÀ̾ ¸í·ÉÀ» ÁÖ°üÇÏ´Â ÄÄÇ»ÅÍ ³×Å©¿öÅ©ÀÇ Ãë¾à¼ºÀ» °ø°ÝÇß´Ù°í ¹àÇû´Ù. ÀÌ º¸µµ°¡ ³ª°£ µÚ, ÇǾÆƮũ¶óÀ̽½·¯(FiatChrysler)´Â ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇØ 140¸¸´ëÀÇ ÀÚµ¿Â÷¸¦ ¸®ÄÝÇØ¾ß Çß´Ù. ±×·¯³ª ¸ðµç Â÷ÁÖ°¡ ¸®ÄÝ¿¡ ÀÀ´äÇÑ °ÍÀº ¾Æ´Ï±â ¶§¹®¿¡, ÇöÀç µµ·Î À§¿¡´Â ÀÌ·¯ÇÑ À§Çù¿¡ ³ëÃâµÈ ÀÚµ¿Â÷µéÀÌ ¿©ÀüÈ÷ ¿îÇà ÁßÀÌ´Ù.


ÃÖ±Ù ¿ì¹ö(Uber)ÀÇ Ã·´Ü±â¼ú¼¾ÅÍ(Advanced Technology Center)¿¡ ä¿ëµÈ ¹ß¶ó»çÅ©¿Í ¹Ð·¯´Â ¿¬ÀÌ¾î ¾×¼¿À» ÀÛµ¿½ÃÅ°°Å³ª ¿îÀü´ë¸¦ ÅëÁ¦ÇÏ´Â ¹æ¹ýÀ» ÅëÇØ ÁöÇÁ¸¦ 180µµ ȸÀü½ÃÅ°´Â µî ¾Æ¹« °Íµµ ÇÒ ¼ö ¾ø´Â ¿îÀüÀÚ¿Í µ¿½ÂÀÚ¿¡°Ô Ä¡¸íÀûÀÎ °á°ú¸¦ ÃÊ·¡ÇÒ ¼ö ÀÖ´Â °¡´É¼ºµµ ¹àÇô³Â´Ù.


ÇÑÆí 2016³â 8¿ù, ¹Ì½Ã°Ç ´ëÇб³ °úÇÐ ÆÀÀº ±×µéÀÌ Æ®·°À» ÇØÅ·ÇØ ´ë½Ãº¸µå ÆгÎÀÇ µð½ºÇ÷¹À̸¦ º¯È­½ÃÄÑ ÅÖ ºó ¿¬·á ÅÊÅ©°¡ °¡µæÂù °Íó·³ º¸ÀÌ°Ô ¸¸µé ¼ö ÀÖ´Ù°í ¹àÇû´Ù. °¨¼ÓÀ» ÇÏ·Á´Â ¿îÀüÀÚÀÇ Àǵµ¿Í ´Þ¸® Æ®·°À» °¡¼Ó½Ãų ¼öµµ, Æ®·°ÀÇ ºê·¹ÀÌÅ© ½Ã½ºÅÛÀÇ Çϳª¸¦ ºñÈ°¼ºÈ­½ÃÅ°´Â °Íµµ °¡´ÉÇß´Ù.


¹Ì½Ã°Ç ¿¬±¸Áø Áß ÇÑ ¸íÀÎ ºô ÇϽº(Bill Hass)´Â "Æ®·°µéÀº À§ÇèÇÑ È­Çй°Áú°ú ¸¹Àº ¾çÀÇ È­¹°À» ¼ö¼ÛÇϸç, ±¹°¡ °æÁ¦ÀÇ ±Ù°£À» ´ã´çÇÏ°í ÀÖ´Ù. ±×·±µ¥ ´©±º°¡°¡ Æ®·°À» ÇØÅ·ÇØ ÀǵµÄ¡ ¾Ê°Ô °¡¼ÓÀ» ½ÃŲ´Ù¸é... ¾ó¸¶³ª ³ª»Û ÀϵéÀÌ ¹ß»ýÇÒ °ÍÀÎÁö¸¦ »ý°¢ÇÏ´Â °ÍÀÌ ¾î·ÆÁö ¾ÊÀ» °ÍÀÌ¶ó º»´Ù"°í ¹àÇû´Ù.


Æ®·°À» ÇØÅ·ÇÏ´Â ÀÏÀº ½Â¿ëÂ÷¸¦ °ø°ÝÇÏ´Â °Íº¸´Ù ´õ ½±´Ù. ½Â¿ëÂ÷´Â ´Ù¾çÇÑ È¸»çµéÀÌ ´Ù¾çÇÑ ÇüÅÂÀÇ ½Ã½ºÅÛÀ» »ç¿ëÇÏÁö¸¸, ¸ðµç Æ®·°°ú ½ºÄð ¹ö½º´Â J1939¶ó´Â Ç¥ÁØ ½Ã½ºÅÛÀ» °øÀ¯Çϱ⠶§¹®ÀÌ´Ù. µû¶ó¼­ ¹üÁËÀÚ³ª Å×·¯ Á¶Á÷ÀÌ ÀÌ ¼ÒÇÁÆ®¿þ¾î¿¡ ħÅõÇÏ´Â ¹æ¹ýÀ» ¹è¿î´Ù¸é, ¼öõ ´ëÀÇ Æ®·°µéÀÌ ÅëÁ¦ ºÒ´É »óÅ¿¡ ºüÁö´Â Àç¾ÓÀÌ ¹ß»ýÇÒ ¼ö ÀÖ´Ù.


ÀÌ·¯ÇÑ Çö º¸¾È À§±â¸¦ °í·ÁÇϸé, ¿ì¸®´Â ¾ÕÀ¸·Î 4°¡ÁöÀÇ ¹Ì·¡¸¦ ¿¹ÃøÇÒ ¼ö ÀÖ´Ù.


ù°, Á¦Á¶»ç¿Í ¼ÒºñÀÚµéÀÌ ¿¬°á¼º(connectivity)¿¡ ´ëÇÑ ´ÏÁî¿Í º¸¾È¿¡ ´ëÇÑ ´ÏÁî »çÀÌ¿¡¼­ ±ÕÇüÀ» ãÀ» °ÍÀÌ´Ù. ¹®Á¦´Â Á¦Á¶»çµéÀÌ Ä¿³ØƼµå Á¦Ç°À» ½ÃÀå¿¡ ¸ÕÀú ¼±º¸ÀÌ·Á´Â °æÀïÀ» ÇÏ°í ÀÖ´Ù´Â Á¡ÀÌ´Ù. ÀÌ·¯´Ù º¸´Ï ´ëºÎºÐÀÇ °æ¿ì, Á¦Á¶»çµéÀº º¸¾ÈÀ̳ª ¼ÒºñÀÚ ÇÁ¶óÀ̹ö½Ã¿¡ ´ëÇÑ ¾ÈÀüÀ» ¸ÕÀú °í·ÁÇÏ´Â ½Ã°£À» ÇÒ¾ÖÇÏÁö ¸øÇÏ°í ÀÖ´Ù. ½ÉÁö¾î Á¶ÀâÇÑ º¸¾È ÇÁ·ÎÅäÄÝÀÌ ±× ÀÚ¸®¸¦ ´ëüÇÏ°í ±×¸¶Àúµµ ÃÖÁ¾ ¼ÒºñÀÚµéÀÇ ¹«°ü½ÉÀÇ ´ë»óÀÌ µÇ±âµµ ÇÑ´Ù.


½ÇÁ¦·Î, Ä¿³ØƼµå Á¦Ç°ÀÇ ±¸¸ÅÀÚ ´ëºÎºÐÀÌ µðÆúÆ® Æнº¿öµå¿¡ ´ëÇÑ Àç¼³Á¤¿¡ ¼­Åõ¸£°í, ÀÌ·Î ÀÎÇØ Çö°ü¹®ÀÌ ¹ã³·À¸·Î ¿­·Á ÀÖ´Â °Íó·³ ħÀÔÀÚ¿¡°Ô ¹«¹æºñ·Î °³¹æµÇ¾î ÀÖ´Ù. ÀÚµ¿Â÷ÀÇ °æ¿ì, Ä̸® ºí·ç ºÏ(Kelly Blue Book)°¡ Á¶»çÇÑ ¼­º£ÀÌ´Â »ç¿ëÀÚÀÇ 42%, ¹Ð·¹´Ï¾ó ¼¼´ëÀÇ 60%°¡ ±×µé ÀÚµ¿Â÷°¡ Ä¿³ØƼµåµÇ±â¸¦ Èñ¸ÁÇÏ´Â °ÍÀ» º¸¿©ÁØ´Ù. ±×·¯³ª 2/3´Â ±×·¯ÇÑ ÀÚµ¿Â÷°¡ ½±°Ô »çÀ̹ö ¹üÁËÀÚµéÀÇ Ç¥ÀûÀÌ µÇ¸®¶ó°ï »ý°¢ÇÏÁö ¸øÇÏ°í ÀÖ´Ù.


µÑ°, »ç¹°ÀÎÅÍ³Ý ±â±â¿¡ ´ëÇÑ ÃÖ°í ¼öÁØÀÇ º¸¾ÈÀ» Á¦°øÇÏ´Â ±â¾÷µéÀº ¾ÕÀ¸·Î Å« ¼öÀÍÀ» ¾òÀ» °ÍÀÌ´Ù. ÀÎÅÍ³Ý º¸¾È¿¡ ÀÖ¾î Àüü ½ÃÀå ±Ô¸ð´Â 2020³â±îÁö 1õ700¾ï ´Þ·¯·Î ¼ºÀåÇÒ °ÍÀ¸·Î º¸ÀδÙ. »ç¹°ÀÎÅÍ³Ý º¸¾ÈÀº Çö Àüü ½ÃÀåÀÇ 9%¸¦ Â÷ÁöÇÏÁö¸¸, 2020³â±îÁö ¸Å³â ÃÖ¼Ò 16%¾¿ ¼ºÀåÇÒ °ÍÀÌ´Ù. Á¶»ç Àü¹® ±â¾÷ ¸¶ÄÏ&¸¶ÄÏ(Markets&Markets)»ç°¡ ¼öÇàÇÑ ¿¬±¸´Â »ç¹°ÀÎÅÍ³Ý ½ÃÀåÀÌ 2015³â 68¾ï9õ¸¸ ´Þ·¯¿¡¼­ 2020³âÀÌ µÇ¸é 280¾ï9õ¸¸ ´Þ·¯·Î ¼ºÀåÇÒ °ÍÀ¸·Î ¿¹ÃøÇÑ´Ù. 2015³â¿¡¼­ 2020³â±îÁö ¿¬Æò±Õ 33.2%ÀÇ ¼ºÀåÀÌ´Ù.


ÀÌ·¯ÇÑ ½ÃÀåÀ» ¼±µµÇÏ°í ÀÖ´Â µÎ ±â¾÷À¸·Î Áª¾ËÅä(Gemalto)¿Í ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®°¡ ÀÖ´Ù. Áª¾ËÅä »ç´Â ¸ð¹ÙÀÏ °áÁ¦ º¸¾ÈÀ» Á¦°øÇÏ´Â ±â¾÷ÀÌ´Ù. ÀÌ ±â¾÷Àº ±×µéÀÇ ½ÃÅ¥¾î ¿¤·¹¸ÕÆ®(Secure Element) Ç÷§ÆûÀ» ÀÚµ¿Â÷ Á¦Á¶»ç¿Í À¯Æ¿¸®Æ¼ ȸ»ç±îÁö È®´ëÇÏ°í ÀÖ´Ù. ½±°Ô Á¶ÀÛµÉ ¼ö ¾ø´Â Áª¾ËÅäÀÇ ±â¼úÀÌ ±â±â¿¡ ÀåÂøµÇ¾î, µ¥ÀÌÅ͸¦ ¾ÏȣȭÇÏ°í ±â±â °£ Á¢±ÙÀ» Á¦ÇÑÇÔÀ¸·Î½á ¾ÈÁ¤Àû º¸¾ÈÀ» Á¦°øÇÒ ¼ö ÀÖ´Ù. ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®´Â ºñÆ®¶óÄ¿(BitLocker) ¾Ïȣȭ¿Í ½ÃÅ¥¾î ºÎÆ®(Secure Boot) ±â¼úÀ» À©µµ¿ì 10 »ç¹°ÀÎÅÍ³Ý ¿î¿µ ½Ã½ºÅÛ¿¡ žÀçÇÏ°í ÀÖ´Ù. ºñÆ®¶óÄ¿´Â ħÀÔÀڷκÎÅÍ µ¥ÀÌÅ͸¦ º¸È£ÇÒ ¼ö ÀÖµµ·Ï Àüü µð½ºÅ© º¼·ýÀ» ¾ÏȣȭÇÒ ¼ö ÀÖ´Ù. ½ÃÅ¥¾î ºÎÆ®´Â ½Å·ÚÇÒ ¸¸ÇÑ ¼ÒÇÁÆ®¿þ¾î¸¸À¸·Î ºÎÆÃÀ» ÇÏ°Ô ÇÔÀ¸·Î½á PC¸¦ ÇØÅ·À¸·ÎºÎÅÍ º¸È£ÇØÁØ´Ù.


¼Â°, ºñÁî´Ï½º »ç¾÷ÀÚ¿Í °³ÀεéÀº ±×µé ½º½º·Î ÀÎÅͳݿ¡ ¿¬°áÇÏ´Â ¸ðµç »ç¹°ÀÇ º¸¾È¿¡ ÁÖÀǸ¦ ±â¿ïÀÌÁö ¾Ê´Â´Ù¸é »ç¹°ÀÎÅÍ³Ý ±â±â¿¡ ´ëÇÑ ÇØÅ·À¸·Î Å« °íÅëÀ» ¹ÞÀ» °ÍÀÌ´Ù. FBI´Â ´ÙÀ½°ú °°Àº Á¶Ä¡¸¦ ÃëÇÒ °ÍÀ» ±Ç°íÇÑ´Ù.


- ÀÚü º¸È£ ³×Æ®¿öÅ©¿¡¼­ »ç¹°ÀÎÅÍ³Ý ±â±â¸¦ °³º°È­Ç϶ó

- ¶ó¿ìÅÍ¿¡¼­ UPnP¸¦ ÇØÁ¦Ç϶ó

- »ç¹°ÀÎÅÍ³Ý ±â±â°¡ ÀǵµµÈ ¸ñÀû¿¡ ¸Â´ÂÁö °í·ÁÇ϶ó

- º¸¾È ½Ã½ºÅÛÀ» Á¦°øÇÏ´Â Á¦Á¶»çÀÇ »ç¹°ÀÎÅÍ³Ý ±â±â¸¦ ±¸¸ÅÇ϶ó

- °¡´ÉÇÏ´Ù¸é, »ç¹°ÀÎÅÍ³Ý ±â±âÀÇ º¸¾È ÆÐÄ¡¸¦ ¾÷µ¥ÀÌÆ® Ç϶ó

- °¡Á¤°ú ºñÁî´Ï½º ³» ÀåÂøµÈ ±â±âÀÇ ¼º´ÉÀ» ÀÎÁöÇ϶ó µðÆúÆ® Æнº¿öµå¸¦ º¯°æÇÏ°í º¸¾È ¿ÍÀÌÆÄÀÌ ³×Æ®¿öÅ© ÇÏ¿¡¼­¸¸ ¿î¿ëµÇ°Ô Ç϶ó

- »ç¹° ÀÎÅÍ³Ý ±â±â¸¦ ¹«¼± ³×Æ®¿öÅ©¿¡ ¿¬°áÇÒ ¶§, ±×¸®°í ¿ø°ÝÀ¸·Î »ç¹°ÀÎÅÍ³Ý ±â±â¿¡ Á¢¼ÓÇÒ ¶§, ÇöÀç ÃÖ»óÀÇ º¸¾È ¿î¿ë Á¶°ÇÀ» ÁؼöÇ϶ó.

- ¿ø°Ý ÀÇ·á °ü·Ã ±â±âÀÇ ¼º´É¿¡ ´ëÇØ ÀÎÁöÇÏ°í, µ¥ÀÌÅÍ Àü¼Û ȤÀº ¿ø°Ý Áø·á°¡ °¡´ÉÇÑ ±â±âÀϼö·Ï ÇØÄ¿ÀÇ Ç¥ÀûÀÌ µÉ ¼ö ÀÖÀ½¿¡ ÁÖÀÇÇ϶ó

- ¸ðµç µðÆúÆ® Æнº¿öµå´Â º¸¾ÈÀ» »ý°¢ÇÏ¿© °­·ÂÇÑ Æнº¿öµå·Î º¯°æÇ϶ó. ±â±â Á¦Á¶»ç°¡ ¼³Á¤ÇÑ µðÆúÆ® Æнº¿öµå¸¦ °è¼Ó »ç¿ëÇÏÁö ¸¶¶ó


³Ý°, Ä¿³ØƼµå ÀÚµ¿Â÷ ½ÃÀåÀÌ È®´ëµÉ¼ö·Ï, ÀÚµ¿Â÷¿Í Æ®·° Á¦Á¶»çµéÀº »ç¹°ÀÎÅÍ³Ý º¸¾È¿¡ ´õ Å« ÁÖÀǸ¦ ±â¿ïÀÏ °ÍÀÌ´Ù. "I AM the Cavelry"·Î ºÒ¸®´Â »ç¹°ÀÎÅÍ³Ý º¸¾È ´ÜüÀÇ °øµ¿ ¼³¸³ÀÚ Á¶½Ã ÄÚ¸¸(Josh Corman)Àº ÀÚµ¿Â÷ Á¦Á¶»çµéÀÌ °³¼± ³ë·Âº¸´Ù »óȲÀÌ ´õ ºü¸£°Ô ¾ÇÈ­µÇ°í ÀÖÀ½À» °æ°íÇÏ°í ÀÖ´Ù. ÇØÅ·ÀÌ °¡´ÉÇÑ ½ÅÁ¦Ç°À» Ãâ½ÃÇÏ´Â µ¥ 1³âÀÌ °É¸°´Ù¸é, ±×°ÍÀ» º¸È£ÇÏ´Â Á¶Ä¡¸¦ ÃëÇÏ´Â µ¥´Â ÇöÀç 4¡­5³âÀÌ ¼Ò¿äµÈ´Ù´Â °ÍÀÌ´Ù.


¡¸¿ÍÀ̾îµå(Wired)¡¹Áö¿¡ µû¸£¸é, ÀÌ ´Üü´Â ÀÚµ¿Â÷ Á¦Á¶»çµé¿¡°Ô 5°¡Áö¸¦ ±Ç°íÇÑ´Ù.


- °ø°Ý ¿©Áö¸¦ ÁÙÀÌ´Â ´õ ¾ÈÀüÇÑ ¼³°è

- °´°üÀûÀÎ Á¦3ÀÚ Å×½ºÆ®

- ³»ºÎ ¸ð´ÏÅ͸µ ½Ã½ºÅÛ ±¸Ãà

- ¾î¶°ÇÑ °ø°Ý¿¡µµ ÇÇÇظ¦ ÃÖ¼ÒÈ­ÇÏ´Â ºÐÇÒµÈ ¾ÆÄÉÅØó ±¸Ãà

- º¸¾È ¼ÒÇÁÆ®¿þ¾î ¾÷µ¥ÀÌÆ®


´ÙÇàÈ÷µµ, ÀϺΠÁ¦Á¶»çµéÀÌ °³¼± ÀÛ¾÷À» ½ÃÀÛÇÏ°í ÀÖ´Ù. Æ÷µå¿Í BMW´Â ÀÚµ¿Â÷ ±¸¸ÅÀÚ¸¦ µô·¯³ª Á¤ºñ¼Ò¿¡ ¹æ¹®½ÃÅ°±âº¸´Ù´Â ÀÎÅͳÝÀ» ÅëÇØ º¸¾È ¼ÒÇÁÆ®¿þ¾î ¾÷µ¥ÀÌÆ®¸¦ Àü¼ÛÇØÁֱ⠽ÃÀÛÇÏ°í ÀÖ´Ù. Å©¶óÀ̽½·¯´Â ÃÖ±Ù ¹ö±× Æ÷»ó(bug bounty) ÇÁ·Î±×·¥À» ¼±¾ðÇß´Ù. ÀÌ°ÍÀº ÀÚµ¿Â÷ÀÇ Ãë¾àÁ¡À» ¾Ë·ÁÁÖ´Â ÇØÄ¿µé¿¡°Ô Çö±ÝÀ» ÁöºÒÇÏ´Â º¸»ó ÇÁ·Î±×·¥ÀÌ´Ù.


***

±Û·Î¹ú Æ®·»µå DB ¼­ºñ½º´Â Ú¸ Trend MagazineÞä°ú Á¤½Ä°è¾àÀ¸·Î Á¦°øµÇ´Â Áö½Ä Á¤º¸ ÄÜÅÙÃ÷ÀÔ´Ï´Ù.


±Û·Î¹ú Æ®·»µå DB ¼­ºñ½º´Â Àü ¼¼°è 2¸¸¿© ¸íÀÇ °¢ »ê¾÷º° Àü¹®°¡µéÀÌ Çõ½Å ±â¼ú, ¹®È­, °æÁ¦, IT, ¹ÙÀÌ¿À, ³ª³ëÅ×Å©, ÀÎÅÍ³Ý µî °¢ ºÐ¾ß¿¡¼­ ¼¼°è °æÁ¦ Áöµµ¸¦ ¹Ù²Ù´Â Æ®·»µå¸¦ ¼±Á¤ÇÏ°í, Áö½Ä°ú Á¤º¸, ¿ÀÇǴϾðÀ» ÇϳªÀÇ ÄÜÅÙÃ÷·Î ¹­¾î, ¼¼°èÀÇ ÇöÀç¿Í ¹Ì·¡¸¦ ¾Ë°í ºÐ¼®, ¿¹ÃøÇÒ ¼ö ÀÖµµ·Ï ¾È³»ÇÏ´Â ÇÁ¸®¹Ì¾ö ¼­ºñ½ºÀÔ´Ï´Ù.


º» ±Û·Î¹ú Æ®·»µå ÄÜÅÙÃ÷´Â ÀúÀ۱ǹýÀÇ º¸È£¸¦ ¹Þ´Â ÄÜÅÙÃ÷ÀÔ´Ï´Ù.

(ÀÌ¿ë¹®ÀÇ - ³×¿À³ÝÄÚ¸®¾Æ, 02-539-3233)






Managing the Internet of (Hackable) Things


The Internet of Things (IoT) promises to revolutionize our businesses and lives. According to tech research firm Gartner Inc.; on an average day this year, 5.5 million new products of all types will be connected to the Internet. By the end of the year, 6.4 billion devices will be networked, an increase of 30 percent from last year, with the number jumping to a staggering 20.8 billion by the end of the decade.

What types of ¡°things¡± are being connected to the Internet of Things? The list includes baby monitors, wearable fitness trackers, medical devices, closed-circuit security cameras, burglar alarms, smart thermostats, cars, toasters, refrigerators, dishwashers, smart TVs, smart watches, digital cameras, pet collars, electronic gadgets, factory equipment, power grids, water filters, and more.

McKinsey & Company¡¯s Global Institute found that the total economic benefit of IoT in 2025 could be from $3.9 trillion to $11.1 trillion per year.1

While this technology will open many opportunities for wealth creation, not all of those opportunities will be legal ones. Just as legitimate businesses and entrepreneurs are working on ways to make money from the Internet of Things, cyber thieves are equally enthusiastic about its potential.

Clearly, the risk is not that criminals will hack into your appliances in order to burn your toast or melt your ice cream, although they will certainly have that capability. The real threat is that they will use weakly protected appliances as portals into your home network, where they will steal personal and financial information stored on your laptop to commit identity theft and banking fraud.

________________________________________

As the FBI recently announced:

¡°Deficient security capabilities and difficulties for patching vulnerabilities in [IoT] devices, as well as a lack of consumer security awareness, provide cyber actors with opportunities to exploit these devices.2 Criminals can use these opportunities to remotely facilitate attacks on other systems, send malicious and spam emails, steal personal information, or interfere with physical safety. The main IoT risks include:

- An exploitation of the Universal Plug and Play protocol (UPnP) to gain access to many IoT devices. [This protocol] describes the process when a device remotely connects and communicates on a network automatically without authentication. UPnP is designed to self-configure when attached to an IP address, making it vulnerable to exploitation. Cyber actors can change the configuration, and run commands on the devices, potentially enabling the devices to harvest sensitive information or conduct attacks against homes and businesses, or engage in digital eavesdropping.

- An exploitation of default passwords to send malicious and spam emails, or steal personally identifiable information or credit card information.

- Compromising the IoT device to cause physical harm.

- Overloading the devices to render the device inoperable.

? Interfering with business transactions.¡±

Even a seemingly benign technology like the motion sensor within a smart watch can be subverted from tracking your fitness goals to monitoring the movements of your hand as you enter a password that unlocks access to your credit card.

Also, hackers can gain control over IoT devices to create a botnet?defined as ¡°a network of private computers infected with malicious software and controlled as a group without the owners¡¯ knowledge,¡± which can be used to distribute spam emails or launch a denial of service attack.

Two years ago, the security firm Proofpoint identified what it called the ¡°first IoT botnet,¡± in which more than one-fourth of the devices were baby monitors, televisions, and other nontraditional computing devices.3

This year, Sucuri Security discovered a botnet consisting of more than 25,500 hacked closed-circuit security cameras that were being used to target business websites with denial of service attacks.4

Such cameras are particularly tempting targets to hackers because nearly 250 million professionally installed units were in use last year, with countless other cameras deployed by consumers?and since the default passwords are rarely changed, anyone can access them.

But the biggest threat isn¡¯t the potential loss of privacy or financial information. Attacks enabled by the IoT¡¯s weak security protocols could cause the loss of human lives.

According to a post on ZDNet, Internet security expert Bruce Schneier warned about the vulnerabilities of connected cars at a recent InfoSecurity Europe conference: ¡°When you start thinking about a car, you quickly realize the integrity and vulnerability threats are much worse than confidentiality threats and there¡¯s real risks to life and property here.¡±5 He pointed out that even though it would be bad for hackers to invade the privacy of drivers, ¡°It¡¯d be really bad if they could disable the brakes. It¡¯d be really bad?and it¡¯ll happen in a year or two?when someone figures out how to apply ransomware to the CPUs of cars. That¡¯s not going to be fun, but as long as there are computers it¡¯ll happen.¡±

Ransomware is a type of hacker attack in which the intruder disables the victim¡¯s computer, phone, or car, demanding payment of hundreds or thousands of dollars to restore access to the victim¡¯s data or control of the brakes and steering wheel. Symantec estimates that extortionists collect more than $5 million each year from victims, and in many instances, they don¡¯t hold up their end of the bargain and unlock the data.6

But if you think this type of threat doesn¡¯t apply to your car, you¡¯re wrong. Hackers could easily seize control of a car¡¯s brakes or acceleration and demand an immediate payment to prevent a collision.

This isn¡¯t just speculation; experiments by computer experts outside the automobile industry have proven that it can be done. In 2011, researchers from the University of California at San Diego and the University of Washington demonstrated that they were able to remotely disable the locks and the brakes on a Chevrolet Impala.

________________________________________

Last year, Wired reported that a pair of ¡°white hat¡± hackers, Chris Valasek and Charlie Miller, had figured out how to remotely control a Jeep Cherokee.7 One of its reporters drove the Cherokee on a St. Louis highway while the hackers sat on their couch and cranked up the SUV¡¯s air conditioning, blasted rap music on its sound system, and turned on the windshield wipers, while the driver sat helpless to override their commands.

Those were minor annoyances compared to the hackers¡¯ next stunt: They shut down the Cherokee¡¯s transmission, disabling the driver¡¯s accelerator so that it slowed to a crawl, while an 18-wheel semi behind it narrowly averted slamming into the disabled vehicle. They also disconnected the Jeep¡¯s brakes, causing the driver to pump the brakes in vain as it skidded into a ditch.

Valasek and Miller say they exploited a vulnerability in the computer network, called a CAN bus, that is used to issue commands to the engines, brakes, and tires. After the breach became public, FiatChrysler responded by recalling 1.4 million vehicles to fix the problem. But because not every owner responds to a recall, many of the vulnerable vehicles are likely still on the road.

Valasek and Miller, who were recently hired by Uber¡¯s Advanced Technology Center, subsequently figured out how to trigger the acceleration or seize control of the steering wheel, allowing them to whip the Jeep into a 180-degree turn in traffic, with potentially fatal consequences for the helpless driver and passengers.

Meanwhile, in August 2016, a team of scientists from the University of Michigan announced that they had hacked into a truck to change the displays on the dashboard instrument panel so that they could make an empty fuel tank appear to be full; speed up the truck despite the driver¡¯s attempts to slow it down; and turn off one of the truck¡¯s braking systems.8

According to Michigan researcher Bill Hass, ¡°These trucks carry hazard chemicals and large loads. And they¡¯re the backbone of our economy. If you can cause them to have unintended acceleration¡¦I don¡¯t think it¡¯s too hard to figure out how many bad things could happen with this.¡±

________________________________________

Hacking into trucks is actually simpler than attacking cars because different car manufacturers use different types of communications systems. However, all trucks and school buses use a shared communication standard called J1939, so once a criminal or terrorist organization learns how to penetrate the software, it could cause a catastrophe by causing thousands of trucks to accelerate and plow into vehicles in front of them, or it could shut down a fleet of trucks in traffic while issuing a demand for ransom.

Based on our analysis of this trend, we offer the following forecasts:

First, manufacturers and consumers will balance the desire for connectivity with the need for security.

The problem is that manufacturers are racing each other to push connected products onto the market. In most cases, they¡¯re not taking the time to worry about security or consumer privacy?and even the flimsy security protocols that are in place are frequently ignored by end users: In fact, most purchasers of connected products fail to reset the default password, leaving the entire home just as vulnerable to intruders as if the front door were left wide open all day and all night. In the case of vehicles, a survey by Kelley Blue Book found that 42 percent of its users, and 60 percent of Millennials, want their cars to become more connected. Yet, about two-thirds believe that those cars will be easy targets for cyber criminals.

Second, companies that provide top-notch security for IoT devices will reap big profits.

The entire market for Internet security is expected to grow to $170 billion by 2020. Security for the Internet of Things accounts for 9 percent of the total market, and by 2020 it is likely to reach at least 16 percent. Projections by the research firm MarketsandMarkets reveal that the IoT security market is expected to grow from $6.89 billion in 2015 to $28.9 billion by 2020, at a compound annual growth rate of 33.2 percent from 2015 to 2020. Two companies to watch in this space are Gemalto and Microsoft. Gemalto is a company that provides security for mobile payments. It is extending its Secure Element platform to car manufacturers and utility companies. The supposedly tamper-proof technology is embedded in devices to provide security by encrypting data and limiting access from one connected device to another. Microsoft is including BitLocker encryption and Secure Boot technology into its Windows 10 IoT operating system for IoT devices. BitLocker can encrypt entire disk volumes to keep data protected from intrusions, while Secure Boot prevents PCs from being hijacked by ensuring that they boot only with trusted software.

Third, businesses and individuals will suffer breaches via IoT devices unless they make an effort to focus on the security of every object they connect to the Internet.

The FBI recommends that people take the following precautions:

- ¡°Isolate IoT devices on their own protected networks.

- Disable UPnP on routers.

- Consider whether IoT devices are ideal for their intended purpose.

- Purchase IoT devices from manufacturers with a track record of providing secure devices.

- When available, update IoT devices with security patches.

- Consumers should be aware of the capabilities of the devices and appliances installed in their homes and businesses. If a device comes with a default password or an open Wi-Fi connection, consumers should change the password and only allow it to operate on a home network with a secured Wi-Fi router.

- Use current best practices when connecting IoT devices to wireless networks, and when connecting remotely to an IoT device.

- Patients should be informed about the capabilities of any medical devices prescribed for at-home use. If the device is capable of remote operation or transmission of data, it could be a target for a malicious actor.

- [The FBI recommends] all default passwords [be] changed to strong passwords. Do not use the default password determined by the device manufacturer.

Fourth, car and truck manufacturers will place a major emphasis on IoT security as the market for connected vehicles explodes.

Josh Corman, co-founder of an IoT security organization called I Am the Cavalry, cautions that vehicle manufacturers are ¡°getting worse faster than they¡¯re getting better. If it takes a year to introduce a new hackable feature, then it takes them four to five years to protect it.¡± According to Wired, the organization recommends that manufacturers follow five recommendations: ¡°safer design to reduce attack points, third-party testing, internal monitoring systems, segmented architecture to limit the damage from any successful penetration, and the same internet-enabled security software updates that PCs now receive.¡±9 Fortunately, some manufacturers are starting to make progress. Ford and BMW are now starting to send software updates over the Internet, rather than requiring car owners to visit dealers or mechanics. Chrysler recently announced a ¡°bug bounty¡± program that offers cash rewards to hackers who tell the company about vulnerabilities that can be hacked in its vehicles.

References
1. To access the McKinsey Global Institute report ¡°The Internet of Things: Mapping the Value Beyond the Hype¡±, visit their website at: http://www.mckinsey.com/business-functions/business-technology/our-insights/the-internet-of-things-the-value-of-digitizing-the-physical-world2. DarkReading.com, January 14, 2016, ¡°IoT Security: $1-Per-Thing to Protect Connected Devices,¡± by Steve Morgan. ¨Ï 2016 UBM. All rights reserved. http://www.darkreading.com/vulnerabilities---threats/iot-security-%241-per-thing-to-protect-connected-devices/a/d-id/13239213. TechTarget, September 2015, ¡°IoT Security (Internet of Things Security),¡± by Margaret Rouse. ¨Ï 2015 Tech Target. All rights reserved. http://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security4. PCWorld, June 28, 2016, ¡°Thousands of Hacked CCTV Devices Used in DDoS Attacks,¡± by Lucian Constantin. ¨Ï 2016 IDG Consumer & SMB. All rights reserved, http://www.pcworld.com/article/3089346/security/thousands-of-hacked-cctv-devices-used-in-ddos-attacks.html5. ZDNet, July 1, 2016, ¡°The First Big Internet of Things Security Breach Is Just Around the Corner,¡± by Danny Palmer. 2016 CBS Interactive. All rights reserved. http://www.zdnet.com/article/the-first-big-internet-of-things-security-breach-is-just-around-the-corner/6. Wired, September 17, 2015, ¡°Hacker Lexicon: A Guide to Ransomware, the Scary Hack That¡¯s on the Rise,¡± by Kim Zetter. ¨Ï 2015 Conde Nast. All rights reserved. https://www.wired.com/2015/09/hacker-lexicon-guide-ransomware-scary-hack-thats-rise/7. Wired, July 21, 2015, ¡°Hackers Remotely Kill a Jeep on the Highway?with Me in It,¡± by Andy Greenberg ¨Ï 2015 Conde Nast. All rights reserved. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/8. Wired, August 2, 2016, ¡°Hackers Hijack a Big Rig Truck¡¯s Accelerator and Brakes,¡± by Andy Greenberg. ¨Ï 2016 Conde Nast. All rights reserved. https://www.wired.com/2016/08/researchers-hack-big-rig-truck-hijack-accelerator-brakes/9. Wired, July 21, 2015, ¡°Hackers Remotely Kill a Jeep on the Highway?with Me in It,¡± by Andy Greenberg ¨Ï 2015 Conde Nast. All rights reserved. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/