Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0338 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 40
ÇѱÛÇ¥ÁØ¸í ±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý (STIX 2.0)¿¡ ´ëÇÑ À¯½ºÄÉÀ̽º
¿µ¹®Ç¥Áظí Use Cases for Structured Threat Information eXpression (STIX 2.0)
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº »çÀ̹ö À§Çù Á¤º¸ ±³È¯À» À§ÇÑ ±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥ÁØ ±Ô°Ý(STIX)¿¡ ´ëÇÑ »ç¿ëÀÚÀÇ ÀÌÇظ¦ µ½±â À§ÇÏ¿© STIXÀÇ °³³ä°ú ±¸¼º, ±×¸®°í ÁÖ¿ä ±â´ÉÀ» ¼³¸íÇÑ´Ù. ¶ÇÇÑ, »çÀ̹ö À§Çù ºÐ¼®, ħÇØ ´ëÀÀ È°µ¿, »çÀ̹ö À§Çù Á¤º¸ ±³È¯ µîÀÇ Àü¹ÝÀûÀÎ »çÀ̹ö À§Çù °ü¸® ü°è ¼ö¸³¿¡ Âü°íÇÒ ¼ö ÀÖ´Â STIX 2.0 À¯½ºÄÉÀ̽º¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes the concept, composition and main functions of STIX to help users understand the structured threat information standard for cyber threat information exchange. We also present STIX 2.0 use case, which can be used to establish an overall cyber threat management system such as cyber threat analysis, countermeasures activity, and exchange of cyber threat information.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0338.pdf TTAK.KO-12.0338.pdf            

ÀÌÀü
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G(Release 18)
´ÙÀ½
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes(Release 16)