½ÃÀ庸°í¼­
»óǰÄÚµå
1684162

·£¼¶¿þ¾î °ø°ÝÀÇ ³»ºÎ

Inside a Ransomware Attack

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: IDC | ÆäÀÌÁö Á¤º¸: ¿µ¹® 11 Pages | ¹è¼Û¾È³» : Áï½Ã¹è¼Û

    
    
    



¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.

ÀÌ IDC Perspective¿¡¼­´Â ·£¼¶¿þ¾î °ø°ÝÀÇ ½ÃÀÛºÎÅÍ ±³ÈÆ ¹× ¿ÏÈ­ Á¶Ä¡¿¡ À̸£±â±îÁö ·£¼¶¿þ¾î °ø°Ý¿¡ ´ëÇÑ °³¿ä¸¦ Á¦°øÇÕ´Ï´Ù. µ¥ÀÌÅÍ ¼Õ½Ç, Ä§ÇØ ¶Ç´Â ·£¼¶¿þ¾î °ø°ÝÀ» º¸°íÇÏ´Â Á¶Á÷ÀÇ ¼ö°¡ Áõ°¡Çϰí ÀÖ´Â °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. GenAIÀÇ µîÀåÀ¸·Î °ø°ÝÀÇ Á¤±³ÇÔÀÌ Áõ°¡Çϰí ÀÖ´Â °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. ÀÌ´Â °ø°ÝÀÌ ¼º°øÇÒ °¡´É¼ºÀÌ ³ô¾ÆÁ³´Ù´Â °ÍÀ» ÀǹÌÇÕ´Ï´Ù. ÃÖ±Ù ÇÑ Á¦Á¶ Á¶Á÷¿¡¼­ ·£¼¶¿þ¾î °ø°ÝÀÇ ½ÃÀÛºÎÅÍ ³¡±îÁö, ±×¸®°í ±× ÇØ°á °úÁ¤À» Á÷Á¢ ¸ñ°ÝÇß½À´Ï´Ù. "°ø°Ý À§ÇèÀ» ÁÙÀ̱â À§ÇØ Á¶Á÷ÀÌ ÃëÇÒ ¼ö ÀÖ´Â ½Ç¿ëÀûÀÎ Á¶Ä¡°¡ ÀÖ½À´Ï´Ù. °ø°Ý °¡´É¼ºÀÌ ³ô¾ÆÁú¼ö·Ï º¹±¸¿¡ ÁýÁßÇÏ¸é °ø°ÝÀÇ ¿µÇâÀ» ÃÖ¼ÒÈ­ÇÒ ¼ö ÀÖ½À´Ï´Ù."¶ó°í IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) °âÀÓ ¿¬±¸ °í¹®ÀÎ ´Ï¿¤ ´ÏÄݶóÀ̼¾(Niel Nickolaisen)Àº ¸»ÇÕ´Ï´Ù. "º¹±¸¿¡ °É¸®´Â ½Ã°£ÀÌ ÂªÀ»¼ö·Ï °ø°ÝÀ¸·Î ÀÎÇÑ ºñ¿ëµµ ³·¾ÆÁö°í °ø°ÝÀ¸·Î ÀÎÇÑ ¾÷¹« Áߴܵµ ÁÙ¾îµì´Ï´Ù."

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

  • ¼³Á¤
  • »ç°Ç
  • Áï°¢ÀûÀÎ Çൿ
  • 24½Ã°£ ÈÄ »óÅÂ
  • 1ÁÖÂ÷
  • 2ÁÖÂ÷
  • 3ÁÖÂ÷
  • 4ÁÖÂ÷
  • À̾߱âÀÇ ³¡

±â¼ú ±¸¸ÅÀÚ¸¦ À§ÇÑ Á¶¾ð

Âü°í ÀÚ·á

  • °ü·Ã Á¶»ç
  • ¿ä¾à
ksm 25.03.28

This IDC Perspective provides an overview of the ransomware attack from the onset of the attack to the lessons learned and mitigation. The number of organizations reporting a data loss, breach, or ransomware attack seems to be growing. With the advent of GenAI, the sophistication of attacks seems to be increasing. This points to an increasing likelihood of successful attacks. We recently had a front-row seat from the beginning to the end of a ransomware attack and its resolution at a manufacturing organization."There are pragmatic steps an organization can take that reduce the risk of an attack. As the likelihood of an attack increases, a focus on recovery can minimize the impact of an attack," says Niel Nickolaisen, adjunct research advisor for IDC's IT Executive Programs (IEP). "The shorter the time to recover, the lower the costs of an attack and the less disruption due to an attack."

Executive Snapshot

Situation Overview

  • The Setting
  • The Incident
  • Immediate Actions
  • Status After 24 Hours
  • Week 1
  • Week 2
  • Week 3
  • Week 4
  • The End of the Story

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
ºñ±³¸®½ºÆ®
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
»óǰ ºñ±³Çϱâ
Àüü»èÁ¦