Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0244 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2014-12-17 | ÃÑÆäÀÌÁö | 16 |
ÇѱÛÇ¥Áظí | ÀüÀÚ°Å·¡ ´Ü°èº° À§Çè¼öÁØ¿¡ ´ëÇÑ ÀÎÁõ¼ºñ½º Áöħ | ||
¿µ¹®Ç¥Áظí | Authentication service guideline for the layered risk level in online transaction | ||
Çѱ۳»¿ë¿ä¾à | ÀüÀÚ°Å·¡ÀÇ º¸¾È À§ÇùÀ» »ç¿ëÀÚ Ãø¸é, »ç¿ëÀÚ ±â±â Ãø¸é, Åë½Å °úÁ¤, ÀüÀÚ°Å·¡ ¼ºñ½º Ãø¸éÀ¸·Î ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀüÀÚ°Å·¡¸¦ °Å·¡ Áغñ ´Ü°è, °Å·¡ Áö½Ã ´Ü°è, °Å·¡ ¼º¸³ ´Ü°è, °Å·¡ ¸ð´ÏÅ͸µ ´Ü°è·Î ºÐ·ùÇÏ°í °¢ °Å·¡ ´Ü°èº° º¸¾È À§ÇùÀ» Á¤ÀÇÇÏ¿©, ÀÌ¿¡ ´ëÀÀ °¡´ÉÇÑ ÀÎÁõ ¼ºñ½ºÀÇ ÁöħÀ» Á¤ÀÇÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The security threat of online transactions is defined by classifying the user side, the user equipment side, the communication process, the online-transactions service side.
Furthermore, this standard defines each online-transaction step which is divided into step of transaction preparation, step of transaction request, step of dealmaking, step of transaction monitoring andprovides the guidelines of the authentication service as respond. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0244.pdf |