Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0421 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2024-12-06 | ÃÑÆäÀÌÁö | 19 |
ÇѱÛÇ¥Áظí | ¾ÈÀüÇÑ È»óȸÀÇ ÁøÇàÀ» À§ÇÑ º¸¾È Áöħ | ||
¿µ¹®Ç¥Áظí | Security Guidelines for Conducting Secure Video Conferencing | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØ¿¡¼´Â È»óȸÀÇ º¸¾È µî±Þº° Á¡°Ë Ç׸ñÀ» Á¦½ÃÇÑ´Ù. È»óȸÀÇ º¸¾È µî±ÞÀº ȸÀÇ ³»¿ëÀÇ Á߿䵵¿¡ µû¶ó ±Øºñ(Top Secret), ºñ¹Ð(Secret), ´ë¿Üºñ(Confidential), ÀϹÝ(Unclassified)À¸·Î ºÐ·ùµÇ¸ç, °¢ ȸÀÇÀÇ º¸¾È µî±ÞÀº È»óȸÀÇ »ç¿ëó°¡ Á¤ÀÇÇÏ´Â º¸¾È ±âÁØ¿¡ µû¶ó ȸÀÇ ÁøÇàÀÚ°¡ °áÁ¤ÇÑ´Ù.
Á¡°ËÇ¥ ³»ÀÇ Á¡°Ë Ç׸ñÀº °¢ º¸¾È µî±Þº° ÃÖ¼Ò ¿ä±¸ Á¶°ÇÀÌ´Ù. µû¶ó¼ ´ë»ó È»óȸÀǰ¡ ¿ä±¸ÇÏ´Â º¸¾È µî±Þ°ú ±× ÇÏÀ§ º¸¾È µî±ÞÀÇ Ç׸ñÀ» ¸ðµÎ ¸¸Á·Çϸé ÇØ´ç ȸÀǸ¦ ¾ÈÀüÇÑ È¸ÀÇ·Î Æò°¡ÇÒ ¼ö ÀÖ´Ù. À̶§, ȸÀÇ º¸¾È µî±Þº¸´Ù »óÀ§ º¸¾È µî±ÞÀÇ Á¡°Ë Ç׸ñÀº ±Ç°í »çÇ×ÀÌ´Ù. ¾ÈÀüÇÑ È»óȸÀÇ ÁøÇà ÁöħÀº ¡°È»óȸÀÇ ¼ºñ½ºÀÇ º¸¾È ±â´É Á¡°ËÇ¥¡±¿Í ¡°È»óȸÀÇ Âü¼®ÀÚÀÇ È¸ÀÇ ÁøÇà Á¡°ËÇ¥¡±·Î ±¸¼ºµÈ´Ù. ¡°È»óȸÀÇ ¼ºñ½ºÀÇ º¸¾È ±â´É Á¡°ËÇ¥¡±´Â È»óȸÀÇ ¼ºñ½º¸¦ µµÀÔÇÏ¿© »ç¿ëÇÏ´Â ±â°ü, ±â¾÷, ¶Ç´Â °³ÀÎÀÌ ¾ÈÀüÇÑ È»óȸÀÇ ÁøÇàÀ» À§ÇØ ÇÊ¿äÇÑ È»óȸÀÇ ¼ºñ½ºÀÇ º¸¾È ±â´ÉÀ» Æò°¡ÇÏ´Â ÁöħÀ̸ç, ¡°È»óȸÀÇ Âü¼®ÀÚÀÇ È¸ÀÇ ÁøÇà Á¡°ËÇ¥¡±´Â ȸÀÇ Âü¼®ÀÚ ÀÔÀå¿¡¼ ȸÀǸ¦ ¾ÈÀüÇÏ°Ô ÁøÇàÇϱâ À§ÇÑ ÁöħÀÌ´Ù. |
||
¿µ¹®³»¿ë¿ä¾à | This standard clearly defines the checklist items for each security level of video conferencing. The security levels for video conferencing are classified based on the importance of the meeting content into top secret, secret, confidential, and unclassified. The meeting host determines the security level of each meeting according to the security standards defined by the user of the video conferencing service.
The checklist items represent the minimum requirements for each security level. Therefore, if a video conference meets the requirements of the specified security level and those of lower levels, it is considered a secure meeting. Checklist items for higher security levels than the meeting¡¯s designated level are recommended but not mandatory. The guidelines for conducting secure video conferences consist of the ¡°Security Features Checklist for Video Conferencing Services¡± and the ¡°Meeting Conduct Checklist for Video Conference Participants.¡± The ¡°Security Features Checklist for Video Conferencing Services¡± is a guide for organizations, companies, or individuals using video conferencing services to evaluate the security features that are needed for conducting secure video conferences. The ¡°Meeting Conduct Checklist for Video Conference Participants¡± provides guidelines for participants to ensure the secure conduct of the meeting. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ |
![]() |