Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0031/R1 | ±¸Ç¥ÁعøÈ£ | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Á¦°³Á¤ÀÏ | 2011-12-21 | ÃÑÆäÀÌÁö | 41 | ||||||||
ÇѱÛÇ¥Áظí | ¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ Áöħ | ||||||||||
¿µ¹®Ç¥Áظí | Secure Use Guide of Wireless LAN | ||||||||||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ¹«¼±·£ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ´Â ¹°¸®ÀûÀÎ ÈѼÕ, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© ÇØÅ·°ú ÀÌ·¯ÇÑ °ø°Ý ½Ãµµ Àü ´Ü°èÀÇ ÇÊ¿ä Á¤º¸ ¼öÁý¿¡ ´ëÇÑ ³»¿ëÀ» Æ÷ÇÔÇÏ´Â ´Ù¾çÇÑ °ø°Ý À¯ÇüÀ» ¼³¸íÇÑ´Ù. ÀÌ¾î¼ ¹«¼±·£ ¿î¿µ ÇöȲ ÆľÇ, Àåºñ ¹× ³×Æ®¿öÅ© °ü¸®, º¸¾È Á¡°Ë µîÀÇ º¸¾È Ãë¾à¼ºÀ» ±Øº¹ÇÏ°í °ø°ÝÀ» ¿¹¹æÇϱâ À§ÇØ ¹«¼±·£ °ü¸®ÀÚ¿Í »ç¿ëÀÚ°¡ ÁؼöÇÏ¿©¾ß ÇÒ Á¤º¸ º¸È£ °¡À̵带 ¼³¸íÇÑ´Ù. ¸¶Áö¸· ºÎ·Ï I.¿¡¼´Â ±â¾÷, ¼ÒÈ£ ¹× °¡Á¤¿¡¼ ¹«¼±·£À» È°¿ëÇÒ ¶§, Ãë¾à¼º¿¡ µû¸¥ Á¤º¸ º¸È£ °¡À̵带 ¼Õ½±°Ô Àû¿ëÇÒ ¼ö ÀÖµµ·Ï ¹«¼±·£ Á¤º¸ º¸È£ üũ¸®½ºÆ®¸¦ Á¦½ÃÇÑ´Ù. | ||||||||||
¿µ¹®³»¿ë¿ä¾à | This standard describes the relation among Vulnerabilities, Intrusion methods and security guide of Wireless LAN. This standard gives full details of Intrusion methods such as physical breakdown, system or network hacking, denial of services, etc. Then, this provides the security guide for wireless LAN managers and users. | ||||||||||
±¹Á¦Ç¥ÁØ | |||||||||||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0031_R1.pdf | ||||||||||
Ç¥ÁØÀÌ·Â |
|