Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0031/R1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑÆäÀÌÁö 41
ÇѱÛÇ¥ÁØ¸í ¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ Áöħ
¿µ¹®Ç¥Áظí Secure Use Guide of Wireless LAN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ¹«¼±·£ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ´Â ¹°¸®ÀûÀÎ ÈѼÕ, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© ÇØÅ·°ú ÀÌ·¯ÇÑ °ø°Ý ½Ãµµ Àü ´Ü°èÀÇ ÇÊ¿ä Á¤º¸ ¼öÁý¿¡ ´ëÇÑ ³»¿ëÀ» Æ÷ÇÔÇÏ´Â ´Ù¾çÇÑ °ø°Ý À¯ÇüÀ» ¼³¸íÇÑ´Ù. À̾ ¹«¼±·£ ¿î¿µ ÇöȲ ÆľÇ, Àåºñ ¹× ³×Æ®¿öÅ© °ü¸®, º¸¾È Á¡°Ë µîÀÇ º¸¾È Ãë¾à¼ºÀ» ±Øº¹ÇÏ°í °ø°ÝÀ» ¿¹¹æÇϱâ À§ÇØ ¹«¼±·£ °ü¸®ÀÚ¿Í »ç¿ëÀÚ°¡ ÁؼöÇÏ¿©¾ß ÇÒ Á¤º¸ º¸È£ °¡À̵带 ¼³¸íÇÑ´Ù. ¸¶Áö¸· ºÎ·Ï I.¿¡¼­´Â ±â¾÷, ¼ÒÈ£ ¹× °¡Á¤¿¡¼­ ¹«¼±·£À» È°¿ëÇÒ ¶§, Ãë¾à¼º¿¡ µû¸¥ Á¤º¸ º¸È£ °¡À̵带 ¼Õ½±°Ô Àû¿ëÇÒ ¼ö ÀÖµµ·Ï ¹«¼±·£ Á¤º¸ º¸È£ üũ¸®½ºÆ®¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes the relation among Vulnerabilities, Intrusion methods and security guide of Wireless LAN. This standard gives full details of Intrusion methods such as physical breakdown, system or network hacking, denial of services, etc. Then, this provides the security guide for wireless LAN managers and users.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0031_R1.pdf TTAK.KO-12.0031_R1.pdf            
Ç¥ÁØÀÌ·Â
±¸ºÐ ÀÏÀÚ Ç¥ÁعøÈ£ º¯°æ³»¿ª
°³Á¤ 2011-12-21 TTAK.KO-12.0031/R1 TTAS.KO-12.0031 À» º» Ç¥ÁØÀ¸·Î °³Á¤

ÀÌÀü
IMT-2000 3GPP - ¹°¸® ä³Î°ú ¹°¸®Ã¤³Î/Àü¼Ûä³Î ¸ÅÇÎ(FDD)(R5)
´ÙÀ½
IMT-2000 3GPP - È®»ê ¹× º¯Á¶(FDD)(R4)