ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0111 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑ ÆäÀÌÁö 29
ÇÑ±Û Ç¥Áظí ÀÎÅͳÝÀüÈ­¸Á ±¸ÃàÀ» À§ÇÑ º¸¾È Áöħ
¿µ¹® Ç¥Áظí Security Guide for Constructing VoIP Network
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ÀÎÅͳÝÀüÈ­¸Á ¹× ÀÎÅÍ³Ý ÀüÈ­¸Á ±¸¼º¿ä¼Ò, ÀÎÅͳÝÀüÈ­¼­ºñ½º º¸¾È À§Çù ¹× ±ä±Þ±¸Á¶ ¼­ºñ½º º¸¾ÈÀ§Çù, ±×¸®°í ÀÎÅÍ³Ý ÀüÈ­¸Á ±¸ÃàÀ» À§ÇÑ Á¤º¸º¸È£ °í·Á»çÇ× µî ¾ÈÀüÇÑ ÀÎÅÍ³Ý ÀüÈ­ ³×Æ®¿öÅ© ȯ°æ ±¸Ãà¿¡ ÇÊ¿äÇÑ º¸¾È °¡À̵带 ¼³¸íÇÑ´Ù. ¶ÇÇÑ ¸¶Áö¸· ºÎ·Ï¿¡¼­´Â ÀÎÅͳÝÀüÈ­ ¼­ºñ½º¸Á ±¸Ãà ½Ã º¸¾È´ã´çÀÚµéÀÌ ÀÎÅͳÝÀüÈ­ ¼­ºñ½ºÀÇ ¾ÈÀü¼ºÀ» ÀÚü Á¡°ËÇÒ ¼ö Àִ üũ¸®½ºÆ®¸¦ Á¦°øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard describes security guide for constructing VoIP network. It contains VoIP Network Structure and components, VoIP Vulnerabilities and emergency call service, security considerations, and checklists for service operators
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0111.pdf TTAK.KO-12.0111.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÀÎÅͳÝÀüÈ­¸Á ±¸ÃàÀ» À§ÇÑ º¸¾È Áöħ TTAK.KO-12.0111 2009-12-22 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0111.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2018-05-31 À¯Áö