Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAE.IT-X.1570 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2012-12-21 | ÃÑÆäÀÌÁö | 33 |
ÇѱÛÇ¥Áظí | »çÀ̹ö º¸¾È Á¤º¸ ±³È¯¿¡¼ÀÇ Å½»ö ¸ÞÄ¿´ÏÁò | ||
¿µ¹®Ç¥Áظí | Discovery Mechanisms in the Exchange of Cyber Security Information | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº »çÀ̹ö º¸¾È Á¤º¸ÀÇ Á¦°øÀÚ¸¦ ã°í, µ¥ÀÌÅÍ À¯ÇüÀ» ½Äº°Çϱâ À§ÇÑ ¹æ¹ý ¹× ÇÁ·¹ÀÓ¿öÅ©¸¦ ¼³¸íÇÏ°í ÀÖÀ¸¸ç, »çÀ̹ö º¸¾È Á¤º¸ÀÇ À¯Çü, ¼öÁØ ¹× Á¢±Ù ¹æ¹ý º°·Î º¸¾È Á¤º¸ÀÇ ½Äº°ÀÚ¸¦ Á¤ÀÇÇÏ°í ÀÖ´Ù. ¶ÇÇÑ, Ž»ö ¸ÞÄ¿´ÏÁòÀ¸·Î½á °´Ã¼ ½Äº°ÀÚ(OID) ±â¹ÝÀÇ ¸ÞÄ¿´ÏÁò°ú ÀÚ¿ø Ç¥½Ã ÇÁ·¹ÀÓ¿öÅ©(RDF) ±â¹ÝÀÇ ¸ÞÄ¿´ÏÁòÀ» ¼Ò°³ÇÏ°í ÀÖÀ¸¸ç, RDF±â¹ÝÀÇ ¸ÞÄ¿´ÏÁò¿¡ ´ëÇÑ ±¸Á¶ ¹× ±¸Çö ¿¹Á¦¸¦ ºÎ·Ï¿¡¼ ¼³¸íÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard is to provide a framework for discovering cybersecurity information and the mechanism that enables this. Discovery can be seen as a stage of the cybersecurity information lifecycle adjacent to information publishing and acquisition. The framework covers how to publish cybersecurity information, obtain the candidate list, and acquire the needed information. A discovery scheme may be implemented with arbitrary mechanisms so long as they comply with the framework. Among these mechanisms are object identifier(OID)-based discovery and resource description framework(RDF)-based discovery, which are also elaborated on in the appendix. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.IT-X.1570.pdf |
- ÀÌÀü
- HMAC ±â¹Ý Å° À¯µµ ÇÔ¼ö
- ´ÙÀ½
- Çؽà ÇÔ¼ö LSH