Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-12.0087 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2008-12-19 | ÃÑÆäÀÌÁö | 20 |
ÇѱÛÇ¥Áظí | ¸ð¹ÙÀÏ ´Ü¸» º¸¾È°È¸¦ À§ÇÑ Åë½Å ÀÎÅÍÆäÀ̽º Á¦¾î °¡À̵å | ||
¿µ¹®Ç¥Áظí | Communication Interface Control Guide for Mobile Device Security | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ¸ð¹ÙÀÏ ´Ü¸» Åë½Å ÀÎÅÍÆäÀ̽º¸¦ ÅëÇÑ ¿ÜºÎ·ÎºÎÅÍÀÇ °ø°ÝÀ¸·ÎºÎÅÍ ¸ð¹ÙÀÏ ´Ü¸»À» º¸È£Çϱâ À§ÇØ ¸ð¹ÙÀÏ ´Ü¸» Åë½Å ÀÎÅÍÆäÀ̽º¿¡ ´ëÇÑ ºÒ¹ýÀûÀÎ Á¢±Ù ¹× »ç¿ëÀ» Á¦¾îÇÏ´Â ¹æ¾ÈÀ» ±â¼úÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | In recent years, mobile phone has evolved toward a form of mobile device offering the flexibility and facility of a hand-held computer as well as the traditional voce communication. Mobile device is expected to support variable communication interfaces (CDMA Modem, Wireless LAN, Bluetooth, USB and DMB) and this means that mobile device can be attacked through communication interface.
Therefore, this standard defines mobile device threat through communication interface and specifies communication interface control method for mobile device security. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0087.pdf |