Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0155 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥Áظí Á¶Á÷¿¡¼­ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ º¸¾È Áöħ
¿µ¹®Ç¥Áظí Security Guidelines for Personal Mobile Devices in Organizations
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº Á¶Á÷(ȸ»ç, ´Üü, ±â°ü)¿¡¼­ÀÇ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» ¾÷¹«¿¡ »ç¿ëÇÒ ¶§ ÇÊ¿äÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù. ÀÌ·¯ÇÑ º¸¾È ÁöħÀ» Á¤ÀÇÇϱâ À§ÇØ ÇöÀç »ç¿ëÇÏ°í ÀÖ´Â °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ °³¿ä¸¦ ¼³¸íÇÏ°í, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷¿¡¼­ »ç¿ëÇϴµ¥ À־ÀÇ º¸¾È ±â¼úÀ» Á¦½ÃÇÑ´Ù. ƯÈ÷, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷ ¾÷¹«¿¡ »ç¿ëÇÏ´Â µ¥ À־ÀÇ º¸¾È À§Çù°ú ±â¼úÀûÀÎ À§Ç輺À» Á¤¸®ÇÏ°í, ÀÌ·¯ÇÑ º¸¾È À§ÇùµéÀ» ¿ÏÈ­ÇÏ°í °¨¼Ò½ÃÅ°±â À§ÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes security guidelines for using Personal Mobile Devices in the organization such as company, institute, government agency, etc. to work. This document explains an overview of the mobile terminal, and proposes security technology at an organization to use mobile personal terminals. In particular, this document describes technical risks and security threats for using a mobile personal device in the organization of business, and it defines security guidelines to lesson those security threats and security vulnerabilities.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0155.pdf TTAK.KO-12.0155.pdf            

ÀÌÀü
ICÄ«µåÀÇ ±ÝÀ¶ ¼ÒÇÁÆ®¿þ¾î ¸ðµâÀ» À§ÇÑ º¸¾È ¿ä±¸ »çÇ×
´ÙÀ½
½ºÄÉÀÏ·¯ºí ºñµð¿À ÄÚµù ±â¹Ý ¹Ìµð¾î º¸¾È ÇÁ·¹ÀÓ¿öÅ©