Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0007/R1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-08-28 ÃÑÆäÀÌÁö 41
ÇѱÛÇ¥Áظí IT ¼­ºñ½º À§ÇèºÐ¼® ¹æ¹ý
¿µ¹®Ç¥Áظí IT Service Risk Analysis Method
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº IT(Information Technology) ¼­ºñ½º °³¹ß ¹× ¿î¿µ°úÁ¤¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â Á¤º¸º¸È£ À§ÇùÀ» ºÐ¼®ÇÏ°í, ÀûÀýÇÑ º¸È£´ëÃ¥À» ¸¶·ÃÇϵµ·Ï À§ÇèºÐ¼® ÀýÂ÷ ¹× ¹æ¹ýÀ» Á¤ÀÇÇÏ´Â °ÍÀ» ¸ñÀûÀ¸·Î ÇÑ´Ù.
º» Ç¥ÁØÀº ±â Á¦Á¤µÈ ¡°°ø°øÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀ» À§ÇÑ À§ÇèºÐ¼® Ç¥ÁØ(TTAS.KO-12.0007)¡±ÀÇ À§ÇèºÐ¼® °³³ä ¹× ÀýÂ÷¿Í ÀÏ°ü¼ºÀ» °¡ÁöµÇ IT ¼­ºñ½ºÁ¦°øÀÚ°¡ ¼Õ½±°Ô È°¿ëÇÒ ¼ö ÀÖµµ·Ï ±¸Ã¼¼º°ú È°µ¿°£ ¿¬°ü¼ºÀ» º¸¿ÏÇÏ¿´´Ù.
º» Ç¥ÁØÀÇ Àû¿ë ´ë»óÀÎ IT¼­ºñ½º´Â VoIP, m-RFID, IPTV µî°ú °°ÀÌ Á¤º¸±â¼úÀ» ÀÀ¿ëÇÑ ¼­ºñ½º·Î¼­ ¼­¹ö, ³×Æ®¿öÅ©, µ¥ÀÌÅͺ£À̽º µî IT ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ©·Î ±¸¼ºµÈ´Ù.
µû¶ó¼­ IT ¼­ºñ½º À§ÇèºÐ¼®Àº ¼­ºñ½º¸¦ ±¸¼ºÇÏ´Â ¸ðµç Á¤º¸±â¼ú ¹× Åë½Å¿ä¼ÒÀÇ Ãë¾à¼º°ú À§ÇùÀÌ ¼­ºñ½º¿¡ ¹ÌÄ¡´Â ¿µÇâÀ» Åä´ë·Î À§ÇèºÐ¼®À» ¼öÇàÇÔÀ¸·Î½á IT ¼­ºñ½ºÁ¦°øÀÚÀÇ º¸È£´ëÃ¥ ¼ö¸³ È°µ¿À» Áö¿øÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The purpose of this standard is to define the procedures and method of risk analysis which enable the analysis on the threats to information in the development and operation of IT services and development of appropriate countermeasures against such threats, so that IT service providers can provide safe and reliable services.
While maintaining the consistency with the existing concept and procedure of the risk analysis in the TTAS.KO-12.0007, Standards of the Risk Analysis for Public Information System Security, the details and the correlation between the activities were supplemented for the convenience of the service providers.
The IT services which are the objectives of this standard are implemented on the basis of IT, such as VoIP, m-RFID, and IPTV, and consist of IT systems and network, in more particular, servers, networks, and database. Therefore, since the risk analyses on the IT services include all the elements of the IT and communication which comprise the services and are executed comprehensively on the basis of the influences of the weakness and threats of each element on the services, they support service providers to develop effective and efficient information protection measures.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0007_R1.pdf TTAK.KO-12.0007_R1.pdf            
Ç¥ÁØÀÌ·Â
±¸ºÐ ÀÏÀÚ Ç¥ÁعøÈ£ º¯°æ³»¿ª
Á¦Á¤ 2000-03-28 TTAS.KO-12.0007
°³Á¤ 2008-08-28 TTAK.KO-12.0007/R1

ÀÌÀü
IMT-2000 3GPP - ¿¬°á»óÅ¿¡¼­ÀÇ °èÃþ°£ÀÇ ÀýÂ÷ Ç¥ÁØ¾È (R6)
´ÙÀ½
IMT-2000 3GPP - ¹°¸®°èÃþ¿¡¼­ Á¦°øÇÏ´Â ¼­ºñ½º (R7)