Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAS.KO-10.0074/R1 | ±¸Ç¥ÁعøÈ£ | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Á¦°³Á¤ÀÏ | 2007-06-22 | ÃÑÆäÀÌÁö | 69 | ||||||||
ÇѱÛÇ¥Áظí | ÀÚ·á º¸¾È°ü¸® Áöħ | ||||||||||
¿µ¹®Ç¥Áظí | A Guide for Data Security Management | ||||||||||
Çѱ۳»¿ë¿ä¾à | º» Áöħ¿¡¼´Â Àü»ê¸Á ½Ã½ºÅÛ¿¡ ÀúÀåµÈ ÀÚ·áÀÇ È¿°úÀûÀÎ °ü¸®¿Í º¸È£¸¦ À§ÇØ °í·ÁÇØ¾ß ÇÒ º¸¾È »çÇ×À» ÀÚ·áºÐ·ù ¹× Á¢±ÙÁ¦¾î, ÀÀ¿ë ÇÁ·Î±×·¥ º¸¾ÈÁ¦¾î, µ¥ÀÌÅͺ£À̽º °ü¸®½Ã½ºÅÛ º¸¾ÈÁ¦¾î ¼¼°¡Áö °üÁ¡¿¡¼ ¾ð±ÞÇÏ¿´À¸¸ç, ºÎ·ÏÀ¸·Î ÀÚ·á º¸¾È ¹æħ ¼ö¸³½Ã ÂüÁ¶ÇÒ ¼ö ÀÖ´Â Á¦¾îµéÀ» ÀÏ¹Ý Á¦¾î¿Í ÀÀ¿ë Á¦¾î·Î ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù. | ||||||||||
¿µ¹®³»¿ë¿ä¾à | This guide describes three views on data security and management which are stored on computer network systems: data category & access control, application program security control, database management system security control. Appendix describes control lists which can be used as a reference of data security policy build-up. | ||||||||||
±¹Á¦Ç¥ÁØ | |||||||||||
°ü·ÃÆÄÀÏ | TTAS.KO-10.0074_R1.pdf | ||||||||||
Ç¥ÁØÀÌ·Â |
|