Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.OT-12.0019-Part2 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 76 |
ÇѱÛÇ¥Áظí | ±¸Á¶ÈµÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý(STIX) ¹öÀü 2.0 - Á¦2ºÎ: STIX °´Ã¼ | ||
¿µ¹®Ç¥Áظí | Structured Threat Information eXpression(STIX) Version 2.0 - Part2: STIX Objects | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº STIX µµ¸ÞÀÎ °´Ã¼(SDO, STIX Domain Objects)ÀÇ ÁýÇÕÀ» Á¤ÀÇÇϸç, °¢ SDO´Â ÀϹÝÀûÀ¸·Î CTI¿¡¼ ³Î¸® »ç¿ëµÇ´Â °³³ä¿¡ ÇØ´çÇÑ´Ù. SDOÀÇ ±¸¼º¿ä¼Ò(°ø°Ý ÆÐÅÏ, Ä·ÆäÀÎ, ´ëÀÀ ¹æ¹ý, ¾ÆÀ̵§Æ¼Æ¼, ħÇØ ÁöÇ¥, ħÅõ ÁýÇÕ, ¾Ç¼ºÄÚµå, °üÃø µ¥ÀÌÅÍ, ¸®Æ÷Æ®, À§Çù ÇàÀ§ÀÚ, µµ±¸, Ãë¾àÁ¡)¿Í STIX °ü°è(Relationships)¸¦ »ç¿ëÇÏ¿© °´Ã¼°£ÀÇ Æø ³Ð°í ´Ù¾çÇÑ CTI¸¦ »ý¼ºÇÏ°í °øÀ¯ÇÒ ¼ö ÀÖ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard defines the set of STIX Domain Objects, each of which corresponds to a unique concept commonly represented in CTI. Using SDO(Attack Pattern, Campaign, Course of Action, Identity, Indicator, Intrusion Set, Malware, Observed data, Report, Threat Actor, Tool, Vulnerability) and STIX relationships as building blocks, individuals can create and share broad and comprehensive cyber threat intelligence. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.OT-12.0019-Part2.pdf |
- ÀÌÀü
- 3rd Generation Partnership Project;Technical Specification Group Radio Access Network;NR; Integrated Access and Backhaul (IAB) Electromagnetic Compatibility (EMC)(Release 17)
- ´ÙÀ½
- 3rd Generation Partnership Project;Technical Specification Group Radio Access Network;NR; Integrated Access and Backhaul (IAB) conformance testing; Part 1: Conducted conformance testing(Release 17)