Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0421 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-12-06 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥ÁØ¸í ¾ÈÀüÇÑ È­»óȸÀÇ ÁøÇàÀ» À§ÇÑ º¸¾È Áöħ
¿µ¹®Ç¥Áظí Security Guidelines for Conducting Secure Video Conferencing
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØ¿¡¼­´Â È­»óȸÀÇ º¸¾È µî±Þº° Á¡°Ë Ç׸ñÀ» Á¦½ÃÇÑ´Ù. È­»óȸÀÇ º¸¾È µî±ÞÀº ȸÀÇ ³»¿ëÀÇ Á߿䵵¿¡ µû¶ó ±Øºñ(Top Secret), ºñ¹Ð(Secret), ´ë¿Üºñ(Confidential), ÀϹÝ(Unclassified)À¸·Î ºÐ·ùµÇ¸ç, °¢ ȸÀÇÀÇ º¸¾È µî±ÞÀº È­»óȸÀÇ »ç¿ëó°¡ Á¤ÀÇÇÏ´Â º¸¾È ±âÁØ¿¡ µû¶ó ȸÀÇ ÁøÇàÀÚ°¡ °áÁ¤ÇÑ´Ù.
Á¡°ËÇ¥ ³»ÀÇ Á¡°Ë Ç׸ñÀº °¢ º¸¾È µî±Þº° ÃÖ¼Ò ¿ä±¸ Á¶°ÇÀÌ´Ù. µû¶ó¼­ ´ë»ó È­»óȸÀǰ¡ ¿ä±¸ÇÏ´Â º¸¾È µî±Þ°ú ±× ÇÏÀ§ º¸¾È µî±ÞÀÇ Ç׸ñÀ» ¸ðµÎ ¸¸Á·Çϸé ÇØ´ç ȸÀǸ¦ ¾ÈÀüÇÑ È¸ÀÇ·Î Æò°¡ÇÒ ¼ö ÀÖ´Ù. À̶§, ȸÀÇ º¸¾È µî±Þº¸´Ù »óÀ§ º¸¾È µî±ÞÀÇ Á¡°Ë Ç׸ñÀº ±Ç°í »çÇ×ÀÌ´Ù.
¾ÈÀüÇÑ È­»óȸÀÇ ÁøÇà ÁöħÀº ¡°È­»óȸÀÇ ¼­ºñ½ºÀÇ º¸¾È ±â´É Á¡°ËÇ¥¡±¿Í ¡°È­»óȸÀÇ Âü¼®ÀÚÀÇ È¸ÀÇ ÁøÇà Á¡°ËÇ¥¡±·Î ±¸¼ºµÈ´Ù. ¡°È­»óȸÀÇ ¼­ºñ½ºÀÇ º¸¾È ±â´É Á¡°ËÇ¥¡±´Â È­»óȸÀÇ ¼­ºñ½º¸¦ µµÀÔÇÏ¿© »ç¿ëÇÏ´Â ±â°ü, ±â¾÷, ¶Ç´Â °³ÀÎÀÌ ¾ÈÀüÇÑ È­»óȸÀÇ ÁøÇàÀ» À§ÇØ ÇÊ¿äÇÑ È­»óȸÀÇ ¼­ºñ½ºÀÇ º¸¾È ±â´ÉÀ» Æò°¡ÇÏ´Â ÁöħÀ̸ç, ¡°È­»óȸÀÇ Âü¼®ÀÚÀÇ È¸ÀÇ ÁøÇà Á¡°ËÇ¥¡±´Â ȸÀÇ Âü¼®ÀÚ ÀÔÀå¿¡¼­ ȸÀǸ¦ ¾ÈÀüÇÏ°Ô ÁøÇàÇϱâ À§ÇÑ ÁöħÀÌ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard clearly defines the checklist items for each security level of video conferencing. The security levels for video conferencing are classified based on the importance of the meeting content into top secret, secret, confidential, and unclassified. The meeting host determines the security level of each meeting according to the security standards defined by the user of the video conferencing service.
The checklist items represent the minimum requirements for each security level. Therefore, if a video conference meets the requirements of the specified security level and those of lower levels, it is considered a secure meeting. Checklist items for higher security levels than the meeting¡¯s designated level are recommended but not mandatory.
The guidelines for conducting secure video conferences consist of the ¡°Security Features Checklist for Video Conferencing Services¡± and the ¡°Meeting Conduct Checklist for Video Conference Participants.¡± The ¡°Security Features Checklist for Video Conferencing Services¡± is a guide for organizations, companies, or individuals using video conferencing services to evaluate the security features that are needed for conducting secure video conferences. The ¡°Meeting Conduct Checklist for Video Conference Participants¡± provides guidelines for participants to ensure the secure conduct of the meeting.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0421.pdf TTAK.KO-12.0421.pdf            

ÀÌÀü
¼ÒÇÁÆ®¿þ¾î Á¤ÀÇ Â÷·®(SDV)À» À§ÇÑ º¸¾È ÇÁ·¹ÀÓ¿öÅ© - Á¦1ºÎ: °³¿ä
´ÙÀ½
°Ëü Á¤º¸ °ü¸® ½Ã½ºÅÛ ±¸ÃàÀ» À§ÇÑ º¸¾È Áöħ