![]() |
½ÃÀ庸°í¼
»óǰÄÚµå
1684162
·£¼¶¿þ¾î °ø°ÝÀÇ ³»ºÎInside a Ransomware Attack |
ÀÌ IDC Perspective¿¡¼´Â ·£¼¶¿þ¾î °ø°ÝÀÇ ½ÃÀÛºÎÅÍ ±³ÈÆ ¹× ¿ÏÈ Á¶Ä¡¿¡ À̸£±â±îÁö ·£¼¶¿þ¾î °ø°Ý¿¡ ´ëÇÑ °³¿ä¸¦ Á¦°øÇÕ´Ï´Ù. µ¥ÀÌÅÍ ¼Õ½Ç, Ä§ÇØ ¶Ç´Â ·£¼¶¿þ¾î °ø°ÝÀ» º¸°íÇÏ´Â Á¶Á÷ÀÇ ¼ö°¡ Áõ°¡Çϰí ÀÖ´Â °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. GenAIÀÇ µîÀåÀ¸·Î °ø°ÝÀÇ Á¤±³ÇÔÀÌ Áõ°¡Çϰí ÀÖ´Â °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. ÀÌ´Â °ø°ÝÀÌ ¼º°øÇÒ °¡´É¼ºÀÌ ³ô¾ÆÁ³´Ù´Â °ÍÀ» ÀǹÌÇÕ´Ï´Ù. ÃÖ±Ù ÇÑ Á¦Á¶ Á¶Á÷¿¡¼ ·£¼¶¿þ¾î °ø°ÝÀÇ ½ÃÀÛºÎÅÍ ³¡±îÁö, ±×¸®°í ±× ÇØ°á °úÁ¤À» Á÷Á¢ ¸ñ°ÝÇß½À´Ï´Ù. "°ø°Ý À§ÇèÀ» ÁÙÀ̱â À§ÇØ Á¶Á÷ÀÌ ÃëÇÒ ¼ö ÀÖ´Â ½Ç¿ëÀûÀÎ Á¶Ä¡°¡ ÀÖ½À´Ï´Ù. °ø°Ý °¡´É¼ºÀÌ ³ô¾ÆÁú¼ö·Ï º¹±¸¿¡ ÁýÁßÇÏ¸é °ø°ÝÀÇ ¿µÇâÀ» ÃÖ¼ÒÈÇÒ ¼ö ÀÖ½À´Ï´Ù."¶ó°í IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) °âÀÓ ¿¬±¸ °í¹®ÀÎ ´Ï¿¤ ´ÏÄݶóÀ̼¾(Niel Nickolaisen)Àº ¸»ÇÕ´Ï´Ù. "º¹±¸¿¡ °É¸®´Â ½Ã°£ÀÌ ÂªÀ»¼ö·Ï °ø°ÝÀ¸·Î ÀÎÇÑ ºñ¿ëµµ ³·¾ÆÁö°í °ø°ÝÀ¸·Î ÀÎÇÑ ¾÷¹« Áߴܵµ ÁÙ¾îµì´Ï´Ù."
This IDC Perspective provides an overview of the ransomware attack from the onset of the attack to the lessons learned and mitigation. The number of organizations reporting a data loss, breach, or ransomware attack seems to be growing. With the advent of GenAI, the sophistication of attacks seems to be increasing. This points to an increasing likelihood of successful attacks. We recently had a front-row seat from the beginning to the end of a ransomware attack and its resolution at a manufacturing organization."There are pragmatic steps an organization can take that reduce the risk of an attack. As the likelihood of an attack increases, a focus on recovery can minimize the impact of an attack," says Niel Nickolaisen, adjunct research advisor for IDC's IT Executive Programs (IEP). "The shorter the time to recover, the lower the costs of an attack and the less disruption due to an attack."