Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0284 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2015-12-16 | ÃÑÆäÀÌÁö | 21 |
ÇѱÛÇ¥Áظí | Á¤º¸º¸È£ ¿ª·® ¼º¼÷µµ ¸ðµ¨ | ||
¿µ¹®Ç¥Áظí | Cybersecurity Capability Maturity | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀÇ ∙ÁÖ¿ä ³»¿ëÀº Á¤º¸º¸È£ ¿ª·® ¼º¼÷µµ¸¦ Æò°¡ÇÏ°í º¸¾È ´É·Â ¼öÁØÀ» °³¼±Çϱâ À§ÇØ ÇÊ¿äÇÑ ¼º¼÷µµ ¸ðµ¨À» Á¤ÀÇÇÑ´Ù. À̸¦ À§ÇØ, ¿ª·® ¼º¼÷µµ µî±Þ(capability maturity level), ¼º¼÷µµ ¸ðµ¨ ÇÁ·Î¼¼½º°¡ Àû¿ëµÇ´Â µµ¸ÞÀÎ(domain), µµ¸ÞÀÎ º° ¼¼ºÎ µî±Þ ±âÁØ µîÀ» ´Ù·é´Ù. º» Ç¥ÁØÀº [C2MM] ÀÇ °³³ä°ú ±âÁØÀ» ±¹³» ½ÇÁ¤¿¡ ÀûÇÕÇÏ°Ô Àû¿ëÇÏ¿´´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard describes information key components of security maturity model which improve the information security capability of an organization: definition of capability maturity model, maturity level, key process domains for the model and criteria for defining the maturity level in each domain of the model. The standard uses concept and criteria of [C2MM] to be applicable to domestic environment. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0284.pdf |