Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0340 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 65 |
ÇѱÛÇ¥Áظí | »çÀ̹ö °ø°Ý ´ëÀÀÀ» À§ÇÑ Áß¼Ò±â¾÷ Á¤º¸½Ã½ºÅÛ ¹é¾÷ Áöħ | ||
¿µ¹®Ç¥Áظí | Small or Medium Enterprise Business Information system backup guideline for cyber attack response | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ¹é¾÷ Á¶Á÷À» Á¤ÀÇÇÏ°í, ¹é¾÷ Á¶Á÷ÀÌ Ã¼°èÀûÀ¸·Î ¹é¾÷À» ¼öÇàÇÒ ¼ö ÀÖµµ·Ï ¹é¾÷ °ü¸® ÀýÂ÷¸¦ ¼³¸íÇÑ´Ù. ¶ÇÇÑ, ¾Ç¼ºÄÚµå, ·£¼¶¿þ¾î °¨¿° µî ħÇØ»ç°í ¹ß»ý½Ã ½Å¼ÓÇÑ ´ëÀÀ¿¡ ÇÊ¿äÇÑ ÀýÂ÷¸¦ Á¦½ÃÇÑ´Ù. ¹é¾÷½Ã½ºÅÛ ±¸¼º¿¡¼´Â ±â¾÷ÀÌ ÀϹÝÀûÀ¸·Î »ç¿ëÇÒ ¼ö ÀÖ´Â ¹é¾÷ ±¸¼º°ú µ¥ÀÌÅ͸¦ ¾ÈÀüÇÏ°Ô º¸°üÇϱâ À§ÇÑ ½Ã½ºÅÛ ±¸¼º ¹æ¹ýÀ» ¼³¸íÇÑ´Ù. ¹é¾÷ Á¤Ã¥Àº ¹é¾÷ ¼öÇà ½Ã ÇÊ¿äÇÑ Á¤Ã¥°ú ÀýÂ÷¸¦ Á¦½ÃÇÏ°í ¸¶Áö¸·À¸·Î ¹é¾÷ µ¥ÀÌÅ͸¦ »çÀ̹ö °ø°ÝÀ¸·ÎºÎÅÍ ¿¹¹æÇϱâ À§ÇØ ÇÊ¿äÇÑ º¸¾È üũ¸®½ºÆ®¿¡ ´ëÇÏ¿© ¼³¸íÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard defines backup organization and explaines backup management procedure so that backup organization can systematically perform backup. It also provides the procedures for rapid cyber incident response.
The main contents of the backup system configuration chapter describes the general backup system and backup system configuration method to prevent from cyber attacks. The backup policy chapter describes the remote backup policy for various backup methods. Finally, It describes the security checklists of backup system necessary to prevent cyber attacks. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0340.pdf |
- ÀÌÀü
- 3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)(Release 18)
- ´ÙÀ½
- 3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Study on security aspects of satellite access(Release 18)