Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0203 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2012-12-21 | ÃÑÆäÀÌÁö | 30 |
ÇѱÛÇ¥Áظí | ±â¾÷ ¹«¼± ·£ ȯ°æ¿¡¼ À§Çù ¹æÁö¸¦ À§ÇÑ º¸¾È ±â´É ¿ä±¸ »çÇ× | ||
¿µ¹®Ç¥Áظí | Functional Requirements for Threat Prevention in Business WLAN | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØ¿¡¼´Â ±â¾÷ ¹«¼± ·£ ȯ°æ¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, ¹«¼± º¸¾È ½Ã½ºÅÛµéÀÌ »óÈ£ Çù·ÂÇÏ¿© ´Ù¾çÇÑ À§ÇùÀ» ŽÁöÇÏ°í ¹æ¾îÇÒ ¼ö ÀÖ´Â À§Çù ¹æÁö ±â´É ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. ¹«¼± À§Çù ¹æÁö ±â´É ¿ä±¸ »çÇ×À» Å©°Ô »ç¿ëÀÚ/½Ã½ºÅÛ ÀÎÁõ, ¾ÈÀüÇÑ Á¤º¸ Àü´Þ, ¹«¼± °ø°Ý ŽÁö, ¹«¼± °ø°Ý ´ëÀÀ, º¸¾È °ü¸®, º¸¾È °¨»ç ÃßÀû, ±×¸®°í º¸¾È Á¤º¸ °øÀ¯ ±â´É ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard analyzes security threats that may occur in business WLAN and defines functional requirements for detecting and preventing various kinds of threats through cooperation among wireless security system. The functional requirements are classified into user/system authentication, safe information delivery, wireless attack detection, wireless attack reaction, security management, security audit trail, and security information sharing functions. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0203.pdf |