Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0232 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑÆäÀÌÁö 27
ÇѱÛÇ¥ÁØ¸í ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í¿¡ ´ëÇÑ º¸¾È Áöħ
¿µ¹®Ç¥Áظí The Security Guideline for Financial Hacking Incidents in Smart Phone Device
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀÇ ³»¿ëÀº ´ÙÀ½°ú °°´Ù.

- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· °ø°Ý ±â¼ú
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ °¨¿° È®ÀÎ
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í º¸¾È ¹æ¹ý
- À̵¿Åë½Å»ç¿¡¼­ Á¦°øÇÏ´Â ÇÇÇØÀÚ º¸»ó ´ëÃ¥ ±âÁØ
- ºÎ·Ï
¿µ¹®³»¿ë¿ä¾à The summary of contents are as below:

- Security violation state of Smart Phone Device
- Financial Program state of Smart Phone Device
- Financial Hacking Incidents Security method of Smart Phone Device
- Victim compensation measures criteria to be provided fromMobile Service Provider
- Appendix
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0232_[3].pdf

ÀÌÀü
¼±¹Ú º¸¾È ÀÌ´õ³Ý ¿¬°á ÀÎÅÍÆäÀ̽º - Á¦3ºÎ: ±â´É ½ÃÇè ¹æ¹ý ¹× ¿ä±¸ °á°ú
´ÙÀ½
Æнº¿öµå¿Í IBC(ID ±â¹Ý ¾ÏÈ£½Ã½ºÅÛ)¸¦ ÀÌ¿ëÇÑ Å° ±³È¯ ÇÁ·ÎÅäÄÝ - Á¦1ºÎ ID ±â¹Ý ¾ÏÈ£ ÀÌ¿ë