Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0280 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑÆäÀÌÁö 12
ÇѱÛÇ¥ÁØ¸í »çÀ̹ö Ä§ÇØ»ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© µ¥ÀÌÅÍ ¼öÁý ¹× º¸Á¸ µµ±¸ ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Network Data Acquisition and Preservation Tool Requirements for Cyber Incident Analysis
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº Ä§ÇØ »ç°í¿¡ ´ëÇÑ ¿øÀÎ ºÐ¼®À» À§ÇØ ³×Æ®¿öÅ© Æ®·¡ÇÈÀ» ¼öÁýÇϰí ÀúÀåÇÒ »Ó ¾Æ´Ï¶ó, ÀúÀåµÈ µ¥ÀÌÅͰ¡ º¯°æ ¾øÀÌ º¸Á¸µÊÀ» º¸ÀåÇÔÀ¸·Î½á ÇØ´ç µ¥ÀÌÅͰ¡ ÃßÈÄ ¹ýÁ¤¿¡¼­ Áõ°Å·Î¼­ È¿·ÂÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â µµ±¸¿¡ ´ëÇÑ ±â´ÉÀû ¸í¼¼¸¦ Á¦°øÇÑ´Ù. À̸¦ À§Çؼ­ ÇØ´ç µµ±¸´Â ȹµæÇϰíÀÚ ÇÏ´Â ³×Æ®¿öÅ© Æ®·¡ÇÈÀÇ ¿ÏÀüÇϰí Á¤È®ÇÑ ¼öÁýÀ» º¸ÀåÇØ¾ß Çϸç, ¼öÁý µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«°á¼º È®ÀÎ ¹× ¼öÁýµÈ µ¥ÀÌÅÍÀÇ º¸Á¸ ±â´ÉÀ» Á¦°øÇØ¾ß ÇÑ´Ù. ¶ÇÇÑ µµ±¸ÀÇ ½Å·Ú¼º È®º¸¸¦ À§ÇÑ ¿ä±¸ »çÇ×À» ¸¸Á·ÇØ¾ß ÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard presents functional specifications of the tool to acquire network data exactly and preserve it completely, as well as to ensure that the preserved data is not to be modified by verifying the integrity. It also includes requirements to give a guarantee against the tool, thereby being able to secure legal admissibility.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0280.pdf TTAK.KO-12.0280.pdf            

ÀÌÀü
º¸¾È Á¤º¸ ¸Þ½ÃÁö ±³È¯ ÇÁ·ÎÅäÄÝ
´ÙÀ½
À¯¹«¼± IP °øÀ¯±â Á¦Á¶ ½Ã º¸¾È ¿ä±¸»çÇ×