Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0280 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2015-12-16 | ÃÑÆäÀÌÁö | 12 |
ÇѱÛÇ¥Áظí | »çÀ̹ö Ä§ÇØ»ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© µ¥ÀÌÅÍ ¼öÁý ¹× º¸Á¸ µµ±¸ ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Network Data Acquisition and Preservation Tool Requirements for Cyber Incident Analysis | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº Ä§ÇØ »ç°í¿¡ ´ëÇÑ ¿øÀÎ ºÐ¼®À» À§ÇØ ³×Æ®¿öÅ© Æ®·¡ÇÈÀ» ¼öÁýÇϰí ÀúÀåÇÒ »Ó ¾Æ´Ï¶ó, ÀúÀåµÈ µ¥ÀÌÅͰ¡ º¯°æ ¾øÀÌ º¸Á¸µÊÀ» º¸ÀåÇÔÀ¸·Î½á ÇØ´ç µ¥ÀÌÅͰ¡ ÃßÈÄ ¹ýÁ¤¿¡¼ Áõ°Å·Î¼ È¿·ÂÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â µµ±¸¿¡ ´ëÇÑ ±â´ÉÀû ¸í¼¼¸¦ Á¦°øÇÑ´Ù. À̸¦ À§Çؼ ÇØ´ç µµ±¸´Â ȹµæÇϰíÀÚ ÇÏ´Â ³×Æ®¿öÅ© Æ®·¡ÇÈÀÇ ¿ÏÀüÇϰí Á¤È®ÇÑ ¼öÁýÀ» º¸ÀåÇØ¾ß Çϸç, ¼öÁý µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«°á¼º È®ÀÎ ¹× ¼öÁýµÈ µ¥ÀÌÅÍÀÇ º¸Á¸ ±â´ÉÀ» Á¦°øÇØ¾ß ÇÑ´Ù. ¶ÇÇÑ µµ±¸ÀÇ ½Å·Ú¼º È®º¸¸¦ À§ÇÑ ¿ä±¸ »çÇ×À» ¸¸Á·ÇØ¾ß ÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard presents functional specifications of the tool to acquire network data exactly and preserve it completely, as well as to ensure that the preserved data is not to be modified by verifying the integrity. It also includes requirements to give a guarantee against the tool, thereby being able to secure legal admissibility. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ |
![]() |