Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0172 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑÆäÀÌÁö 37
ÇѱÛÇ¥ÁØ¸í »çÀ̹öº¸¾È Á¤º¸ °øÀ¯ Çù»ó ÀýÂ÷
¿µ¹®Ç¥Áظí Procedure of Negotiation for Cybersecurity Information Sharing
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº »çÀ̹öº¸¾È Á¤º¸¸¦ Á¦°øÇϰųª Á¦°ø¹Þ´Â »çÀ̹öº¸¾È ¿£Æ¼Æ¼µéÀÌ ¾î¶»°Ô »çÀ̹öº¸¾È Á¤º¸¸¦ °øÀ¯ÇÒÁö¸¦ Çù»óÇÏ´Â »çÀ̹öº¸¾È Á¤º¸ °øÀ¯ Çù»ó ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. º» Ç¥ÁØ¿¡¼­´Â º¸¾È Á¤º¸ °øÀ¯ Çù»óÀ» À§ÇÑ ±â´ÉÀû ¿ä±¸ »çÇ×°ú ÂüÁ¶ ¸ðµ¨, º¸¾ÈÁ¤ º¸ °øÀ¯ Çù¾à¼­ÀÇ °³³äÀûÀÎ µ¥ÀÌÅÍ ¸ðµ¨, ±×¸®°í º¸¾È Á¤º¸ °øÀ¯ Çù¾à¼­ Çù»ó ÀýÂ÷¸¦ ¸í¼¼ÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines a procedure for negotiating agreement on security information sharing between cybersecurity entities such as information requester and information provider. Its scope includes functional requirements and reference model for security information sharing negotiation, conceptual data model of Security information Sharing Agreement (SSA) and SSA negotiation process.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0172.pdf TTAK.KO-12.0172.pdf            

ÀÌÀü
Çϵå¿þ¾î °ø±Þ¸Á º¸¾È °ËÁõÀ» À§ÇÑ °øÅë º¸¾È¿ä±¸»çÇ×
´ÙÀ½
IoT ±â¹Ý ¹ßÀü¼Ò ¾ÈÀü°ü¸® ¼­ºñ½º ÇÁ·ÎÆÄÀÏ ½ÃÇè±Ô°Ý - Á¦1ºÎ: ÀûÇÕ¼º ½ÃÇè