Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0155 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥Áظí Á¶Á÷¿¡¼­ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ º¸¾È Áöħ
¿µ¹®Ç¥Áظí Security Guidelines for Personal Mobile Devices in Organizations
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº Á¶Á÷(ȸ»ç, ´Üü, ±â°ü)¿¡¼­ÀÇ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» ¾÷¹«¿¡ »ç¿ëÇÒ ¶§ ÇÊ¿äÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù. ÀÌ·¯ÇÑ º¸¾È ÁöħÀ» Á¤ÀÇÇϱâ À§ÇØ ÇöÀç »ç¿ëÇÏ°í ÀÖ´Â °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ °³¿ä¸¦ ¼³¸íÇÏ°í, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷¿¡¼­ »ç¿ëÇϴµ¥ À־ÀÇ º¸¾È ±â¼úÀ» Á¦½ÃÇÑ´Ù. ƯÈ÷, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷ ¾÷¹«¿¡ »ç¿ëÇÏ´Â µ¥ À־ÀÇ º¸¾È À§Çù°ú ±â¼úÀûÀÎ À§Ç輺À» Á¤¸®ÇÏ°í, ÀÌ·¯ÇÑ º¸¾È À§ÇùµéÀ» ¿ÏÈ­ÇÏ°í °¨¼Ò½ÃÅ°±â À§ÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes security guidelines for using Personal Mobile Devices in the organization such as company, institute, government agency, etc. to work. This document explains an overview of the mobile terminal, and proposes security technology at an organization to use mobile personal terminals. In particular, this document describes technical risks and security threats for using a mobile personal device in the organization of business, and it defines security guidelines to lesson those security threats and security vulnerabilities.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0155.pdf TTAK.KO-12.0155.pdf            

ÀÌÀü
IMT-2000 3GPP - Åë½Å °ü¸®; ±¸¼º °ü¸®; IRP ÅëÁö: ¿ä±¸»çÇ× (R9)
´ÙÀ½
IMT-2000 3GPP - Åë½Å °ü¸®, ±¸¼º °ü¸®; IRP ÅëÁö; CORBA ¼Ö·ç¼Ç ¼¼Æ® ¹öÀü 1:1 (R9)