Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAE.IT-M3016.2 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2010-12-23 | ÃÑÆäÀÌÁö | 20 |
ÇѱÛÇ¥Áظí | ³×Æ®¿öÅ© °ü¸®¸¦ À§ÇÑ º¸¾È: º¸¾È ¼ºñ½º | ||
¿µ¹®Ç¥Áظí | Security for the management plane: Security services | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº Åë½Å¸Á¿¡¼ÀÇ Åë½Å Àåºñ ¹× °ü¸® ½Ã½ºÅÛÀ» À§ÇÑ º¸¾È Ãø¸é¿¡¼ º¸¾È ¼ºñ½º¸¦ Á¤ÀÇÇÑ´Ù. ¼ºñ½º´Â ½Ã½ºÅÛ °ü¸®¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ×ÀÎ ½Å¿ø °ËÁõ, Á¢±Ù Á¦¾î, ±ÇÇÑ °ü¸®, µ¥ÀÌÅÍ ±â¹Ð¼º, µ¥ÀÌÅÍ ¹«°á¼º, ÃßÀû °¨»ç, º¸¾È ¾Ë¸² ±â´É¿¡ ´ëÇÑ ¿ä±¸¿¡¼ µµÃâµÇ¾ú´Ù.
- ÀÎÁõ : ¼ºñ½º¸¦ ¿ä±¸ÇÏ´Â ÇàÀ§ÀÚ¿¡ ´ëÇÑ ½Å¿ø °ËÁõ - Á¢±Ù Á¦¾î : Àΰ¡¹ÞÁö ¾ÊÀº »ç¿ëÀÚ¿¡ ´ëÇÑ Á¢±Ù Á¦¾î - µ¥ÀÌÅÍ ¹«°á¼º/±â¹Ð¼º : ÀúÀåµÈ µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«°á¼º ¹× ±â¹Ð¼º º¸Àå - ºÎÀÎ ¹æÁö : À̺¥Æ®¿¡ ´ëÇÑ Ã¥ÀÓ º¸Àå - ÃßÀû °¨»ç : ÇàÀ§¿¡ ´ëÇÑ ·Î±× ÀúÀå - ¾Ë¶÷ º¸°í : ÁöÁ¤µÈ À̺¥Æ®¿¡ ´ëÇÑ ¾Ë¸² ±â´É |
||
¿µ¹®³»¿ë¿ä¾à | This Recommendation focuses on the security aspect of management plane for network elements and management system, which are part of the Telecommunication infrastructure. It derives ¡°security service¡± from ¡°service requirements¡± which are verification of identities, controlled access, authorization, data confidentiality, data integrity, audit trail and security alarm.
- Authentication : capabilities to verify the claimed identity of any actor. - Access control : prevent from gaining access to resources which are not authorized - Data confidentiality and integrity : ensure the confidentiality/integrity of stored data - Non-repudiation : cannot deny the responsibility - Audit tail : storing information about activities - Alarm reporting : generate alarm notifications on selected events |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAE.IT-M3016.2_2010-1147.pdf |