Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-12.0232 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2013-12-18 | ÃÑÆäÀÌÁö | 27 |
ÇѱÛÇ¥Áظí | ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í¿¡ ´ëÇÑ º¸¾È Áöħ | ||
¿µ¹®Ç¥Áظí | The Security Guideline for Financial Hacking Incidents in Smart Phone Device | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀÇ ³»¿ëÀº ´ÙÀ½°ú °°´Ù.
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· °ø°Ý ±â¼ú - ½º¸¶Æ®Æù ´Ü¸»±âÀÇ °¨¿° È®ÀÎ - ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í º¸¾È ¹æ¹ý - À̵¿Åë½Å»ç¿¡¼ Á¦°øÇÏ´Â ÇÇÇØÀÚ º¸»ó ´ëÃ¥ ±âÁØ - ºÎ·Ï |
||
¿µ¹®³»¿ë¿ä¾à | The summary of contents are as below:
- Security violation state of Smart Phone Device - Financial Program state of Smart Phone Device - Financial Hacking Incidents Security method of Smart Phone Device - Victim compensation measures criteria to be provided fromMobile Service Provider - Appendix |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0232_[3].pdf |