ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-11.0259/R1 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-12-06 ÃÑ ÆäÀÌÁö 16
ÇÑ±Û Ç¥ÁØ¸í ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î º¸¾ÈÃë¾àÁ¡ °ü¸® Áöħ
¿µ¹® Ç¥Áظí Open Source Software Management Guideline for Security Vulnerability
ÇÑ±Û ³»¿ë¿ä¾à ÃÖ±Ù ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î °³¹ß ¹× »ç¿ëÀÌ »ê¾÷ Àü¹Ý¿¡ °ÉÃÄ ±ÞÁõÇϰí ÀÖ´Â ¹Ý¸é ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î º¸¾ÈÃë¾àÁ¡À¸·Î ÀÎÇÑ ÇÇÇØ ¹× À̽´ ¶ÇÇÑ Áõ°¡Çϰí ÀÖ´Ù. º» Ç¥ÁØÀº ÀÌ·¯ÇÑ ¾î·Á¿òÀ» ÇØ¼ÒÇÏ°í »ê¾÷¿¡¼­ ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î¸¦ º¸´Ù ¾ÈÀüÇϰí À¯¿¬ÇÏ°Ô °³¹ß ¹× »ç¿ëÇÒ ¼ö ÀÖµµ·Ï ¸ÕÀú ¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î º¸¾ÈÃë¾àÁ¡ÀÇ °³¿ä ¹× Ư¡°ú ÇÔ²² º¸¾ÈÃë¾àÁ¡À¸·Î ÀÎÇÑ ÇÇÇØ»ç·Ê, Á¶Ä¡¹æ¹ý ¹× °ü¸®ÀýÂ÷¿¡ ´ëÇÑ ±âÁØÀ» Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à Recently, the development and use of open software has increased rapidly throughout the industry, while the damage and issues caused by open software security vulnerabilities are also increasing. In order to solve these difficulties and to develop and use open software more securely and flexibly in the industry, the standard first provides an outline and characteristics of open software vulnerabilities, as well as the criteria for damage cases caused by security vulnerabilities.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-11.0259_R1.pdf TTAK.KO-11.0259_R1.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¿ÀǼҽº ¼ÒÇÁÆ®¿þ¾î º¸¾ÈÃë¾àÁ¡ °ü¸® Áöħ TTAK.KO-11.0259/R1 2024-12-06 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-11.0259_R1.pdf
°ø°³¼ÒÇÁÆ®¿þ¾î º¸¾ÈÃë¾àÁ¡ °ü¸® Áöħ TTAK.KO-11.0259 2019-12-11 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-11.0259.pdf