Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0244 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2014-12-17 ÃÑÆäÀÌÁö 16
ÇѱÛÇ¥Áظí ÀüÀÚ°Å·¡ ´Ü°èº° À§Çè¼öÁØ¿¡ ´ëÇÑ ÀÎÁõ¼­ºñ½º Áöħ
¿µ¹®Ç¥Áظí Authentication service guideline for the layered risk level in online transaction
Çѱ۳»¿ë¿ä¾à ÀüÀÚ°Å·¡ÀÇ º¸¾È À§ÇùÀ» »ç¿ëÀÚ Ãø¸é, »ç¿ëÀÚ ±â±â Ãø¸é, Åë½Å °úÁ¤, ÀüÀÚ°Å·¡ ¼­ºñ½º Ãø¸éÀ¸·Î ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀüÀÚ°Å·¡¸¦ °Å·¡ Áغñ ´Ü°è, °Å·¡ Áö½Ã ´Ü°è, °Å·¡ ¼º¸³ ´Ü°è, °Å·¡ ¸ð´ÏÅ͸µ ´Ü°è·Î ºÐ·ùÇÏ°í °¢ °Å·¡ ´Ü°èº° º¸¾È À§ÇùÀ» Á¤ÀÇÇÏ¿©, ÀÌ¿¡ ´ëÀÀ °¡´ÉÇÑ ÀÎÁõ ¼­ºñ½ºÀÇ ÁöħÀ» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The security threat of online transactions is defined by classifying the user side, the user equipment side, the communication process, the online-transactions service side.
Furthermore, this standard defines each online-transaction step which is divided into step of transaction preparation, step of transaction request, step of dealmaking, step of transaction monitoring andprovides the guidelines of the authentication service as respond.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0244.pdf TTAK.KO-12.0244.pdf            

ÀÌÀü
Á¤º¸º¸È£ ¿ª·® ¼º¼÷µµ ¸ðµ¨
´ÙÀ½
ÀÚµ¿Â÷ ÀüÀÚ Á¦¾î ÀåÄ¡ °£ÀÇ Åë½Å º¸¾È ¿ä±¸ »çÇ×