Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAE.IT-X.1570 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 33
ÇѱÛÇ¥ÁØ¸í »çÀ̹ö º¸¾È Á¤º¸ ±³È¯¿¡¼­ÀÇ Å½»ö ¸ÞÄ¿´ÏÁò
¿µ¹®Ç¥Áظí Discovery Mechanisms in the Exchange of Cyber Security Information
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº »çÀ̹ö º¸¾È Á¤º¸ÀÇ Á¦°øÀÚ¸¦ ã°í, µ¥ÀÌÅÍ À¯ÇüÀ» ½Äº°Çϱâ À§ÇÑ ¹æ¹ý ¹× ÇÁ·¹ÀÓ¿öÅ©¸¦ ¼³¸íÇÏ°í ÀÖÀ¸¸ç, »çÀ̹ö º¸¾È Á¤º¸ÀÇ À¯Çü, ¼öÁØ ¹× Á¢±Ù ¹æ¹ý º°·Î º¸¾È Á¤º¸ÀÇ ½Äº°ÀÚ¸¦ Á¤ÀÇÇÏ°í ÀÖ´Ù. ¶ÇÇÑ, Ž»ö ¸ÞÄ¿´ÏÁòÀ¸·Î½á °´Ã¼ ½Äº°ÀÚ(OID) ±â¹ÝÀÇ ¸ÞÄ¿´ÏÁò°ú ÀÚ¿ø Ç¥½Ã ÇÁ·¹ÀÓ¿öÅ©(RDF) ±â¹ÝÀÇ ¸ÞÄ¿´ÏÁòÀ» ¼Ò°³ÇÏ°í ÀÖÀ¸¸ç, RDF±â¹ÝÀÇ ¸ÞÄ¿´ÏÁò¿¡ ´ëÇÑ ±¸Á¶ ¹× ±¸Çö ¿¹Á¦¸¦ ºÎ·Ï¿¡¼­ ¼³¸íÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard is to provide a framework for discovering cybersecurity information and the mechanism that enables this. Discovery can be seen as a stage of the cybersecurity information lifecycle adjacent to information publishing and acquisition. The framework covers how to publish cybersecurity information, obtain the candidate list, and acquire the needed information. A discovery scheme may be implemented with arbitrary mechanisms so long as they comply with the framework. Among these mechanisms are object identifier(OID)-based discovery and resource description framework(RDF)-based discovery, which are also elaborated on in the appendix.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-X.1570.pdf

ÀÌÀü
ÀüÀÚÆÄ ÀÎü ³ëÃâ·® ÃøÁ¤, Æò°¡ ¹× ¸ð´ÏÅ͸µ Áöħ
´ÙÀ½
40 ±â°¡±Þ ¼öµ¿Çü ±¤Åë½Å¸Á (NG-PON2): Àü¼Û¼ö·Å °èÃþ