Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0294 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2016-12-27 | ÃÑÆäÀÌÁö | 25 |
ÇѱÛÇ¥Áظí | »çÀ̹ö ħÇØ »ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Network Forensic Analysis Tool Requirements for Cyber Incident Analysis | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ³×Æ®¿öÅ© Æ®·¡ÇÈ ¼öÁý µµ±¸¸¦ ÅëÇØ È¹µæµÈ ³×Æ®¿öÅ© Æ®·¡ÇÈÀ¸·ÎºÎÅÍ Áõ°Å¸¦ ÃßÃâÇÏ°í ºÐ¼®ÇÔ¿¡ ÀÖ¾î ÇØ´ç µ¥ÀÌÅÍ°¡ ÃßÈÄ ¹ýÁ¤¿¡¼ Áõ°Å·Î¼ È¿·ÂÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï Çϱâ À§ÇØ ¸¸Á·ÇØ¾ß ÇÏ´Â ±â´ÉÀû ¸í¼¼¸¦ Á¦°øÇÑ´Ù. À̸¦ À§Çؼ º» Ç¥ÁØ¿¡¼´Â ³×Æ®¿öÅ© Æ÷·»½ÄÀ» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ÀÇ ÀϹÝÀûÀÎ ¿ä±¸»çÇ×°ú ÇÊ¿ä ±â´ÉµéÀ» Á¦½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard presents functional specifications of the tool to extract and analyze the evidence from network traffic acquired by network traffic acquisition tools. It presents the general requirements and necessary functions of the network traffic analysis tools for network forensics.
By following the functional specifications defined in the standard, the tool for analyzing evidence from network traffic is expected to be improved in its capability and reliability. Also, it gives the users broader choice in selecting a reliable and proper tool. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0294.pdf |