·£¼¶¿þ¾î °ø°ÝÀÇ ³»ºÎ
Inside a Ransomware Attack
»óǰÄÚµå : 1684162
¸®¼­Ä¡»ç : IDC
¹ßÇàÀÏ : 2025³â 03¿ù
ÆäÀÌÁö Á¤º¸ : ¿µ¹® 11 Pages
 ¶óÀ̼±½º & °¡°Ý (ºÎ°¡¼¼ º°µµ)
US $ 7,500 £Ü 10,734,000
PDF (Single User License) help
PDF º¸°í¼­¸¦ 1¸í¸¸ ÀÌ¿ëÇÒ ¼ö ÀÖ´Â ¶óÀ̼±½ºÀÔ´Ï´Ù. Àμâ´Â °¡´ÉÇϸç Àμ⹰ÀÇ ÀÌ¿ë ¹üÀ§´Â PDF ÀÌ¿ë ¹üÀ§¿Í µ¿ÀÏÇÕ´Ï´Ù.


Çѱ۸ñÂ÷

ÀÌ IDC Perspective¿¡¼­´Â ·£¼¶¿þ¾î °ø°ÝÀÇ ½ÃÀÛºÎÅÍ ±³ÈÆ ¹× ¿ÏÈ­ Á¶Ä¡¿¡ À̸£±â±îÁö ·£¼¶¿þ¾î °ø°Ý¿¡ ´ëÇÑ °³¿ä¸¦ Á¦°øÇÕ´Ï´Ù. µ¥ÀÌÅÍ ¼Õ½Ç, Ä§ÇØ ¶Ç´Â ·£¼¶¿þ¾î °ø°ÝÀ» º¸°íÇÏ´Â Á¶Á÷ÀÇ ¼ö°¡ Áõ°¡Çϰí ÀÖ´Â °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. GenAIÀÇ µîÀåÀ¸·Î °ø°ÝÀÇ Á¤±³ÇÔÀÌ Áõ°¡Çϰí ÀÖ´Â °ÍÀ¸·Î º¸ÀÔ´Ï´Ù. ÀÌ´Â °ø°ÝÀÌ ¼º°øÇÒ °¡´É¼ºÀÌ ³ô¾ÆÁ³´Ù´Â °ÍÀ» ÀǹÌÇÕ´Ï´Ù. ÃÖ±Ù ÇÑ Á¦Á¶ Á¶Á÷¿¡¼­ ·£¼¶¿þ¾î °ø°ÝÀÇ ½ÃÀÛºÎÅÍ ³¡±îÁö, ±×¸®°í ±× ÇØ°á °úÁ¤À» Á÷Á¢ ¸ñ°ÝÇß½À´Ï´Ù. "°ø°Ý À§ÇèÀ» ÁÙÀ̱â À§ÇØ Á¶Á÷ÀÌ ÃëÇÒ ¼ö ÀÖ´Â ½Ç¿ëÀûÀÎ Á¶Ä¡°¡ ÀÖ½À´Ï´Ù. °ø°Ý °¡´É¼ºÀÌ ³ô¾ÆÁú¼ö·Ï º¹±¸¿¡ ÁýÁßÇÏ¸é °ø°ÝÀÇ ¿µÇâÀ» ÃÖ¼ÒÈ­ÇÒ ¼ö ÀÖ½À´Ï´Ù."¶ó°í IDCÀÇ IT ÀÓ¿ø ÇÁ·Î±×·¥(IEP) °âÀÓ ¿¬±¸ °í¹®ÀÎ ´Ï¿¤ ´ÏÄݶóÀ̼¾(Niel Nickolaisen)Àº ¸»ÇÕ´Ï´Ù. "º¹±¸¿¡ °É¸®´Â ½Ã°£ÀÌ ÂªÀ»¼ö·Ï °ø°ÝÀ¸·Î ÀÎÇÑ ºñ¿ëµµ ³·¾ÆÁö°í °ø°ÝÀ¸·Î ÀÎÇÑ ¾÷¹« Áߴܵµ ÁÙ¾îµì´Ï´Ù."

ÁÖ¿ä ¿ä¾à

»óȲ °³¿ä

±â¼ú ±¸¸ÅÀÚ¸¦ À§ÇÑ Á¶¾ð

Âü°í ÀÚ·á

ksm
¿µ¹® ¸ñÂ÷

¿µ¹®¸ñÂ÷

This IDC Perspective provides an overview of the ransomware attack from the onset of the attack to the lessons learned and mitigation. The number of organizations reporting a data loss, breach, or ransomware attack seems to be growing. With the advent of GenAI, the sophistication of attacks seems to be increasing. This points to an increasing likelihood of successful attacks. We recently had a front-row seat from the beginning to the end of a ransomware attack and its resolution at a manufacturing organization."There are pragmatic steps an organization can take that reduce the risk of an attack. As the likelihood of an attack increases, a focus on recovery can minimize the impact of an attack," says Niel Nickolaisen, adjunct research advisor for IDC's IT Executive Programs (IEP). "The shorter the time to recover, the lower the costs of an attack and the less disruption due to an attack."

Executive Snapshot

Situation Overview

Advice for the Technology Buyer

Learn More

(ÁÖ)±Û·Î¹úÀÎÆ÷¸ÞÀÌ¼Ç 02-2025-2992 kr-info@giikorea.co.kr
¨Ï Copyright Global Information, Inc. All rights reserved.
PC¹öÀü º¸±â