Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0288 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2015-12-16 | ÃÑÆäÀÌÁö | 11 |
ÇѱÛÇ¥Áظí | È£½ºÆ® ÄÄÇ»ÅÍ °³ÀÎ Á¤º¸ º¸È£ Á¦Ç° º¸¾È¼º Æò°¡¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ× | ||
¿µ¹®Ç¥Áظí | Security Requirements for the Security Evaluation of the Personal Information Protection Application in Host Computers | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº È£½ºÆ® ÄÄÇ»ÅÍÀÇ °³ÀÎ Á¤º¸ º¸È£¸¦ À§ÇÑ Á¦Ç°¿¡¼ Á¦°øÇØ¾ß ÇÏ´Â °³ÀÎ Á¤º¸ °ËÃâ ¹× Á¤º¸ È帧 ÅëÁ¦, Àü¼Û µ¥ÀÌÅÍ º¸È£, ½Äº° ¹× ÀÎÁõ, °¨»ç±â·Ï »ý¼º µîÀÇ º¸¾È ¿ä±¸ »çÇ×À» ±â¼úÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard describes security requirements provided by the personal information protection application in host computers such as personal information extraction and traffic flow control, transmitted data protection, identification and authentication, and generation of audit data. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0288.pdf |