Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0369 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2021-06-30 | ÃÑÆäÀÌÁö | 19 |
ÇѱÛÇ¥Áظí | ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ÀÌ¿ëÇÑ ÀüÀÚÃâÀÔ¸íºÎ ±â·Ï ÀýÂ÷ | ||
¿µ¹®Ç¥Áظí | Digital Entry Logging Procedures Using Beacon-Based Dynamic Authentication Information | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ½Ã¼³À» ¹æ¹®ÇÏ´Â ÀÌ¿ëÀÚ°¡ ÀÚ½ÅÀÇ ½º¸¶Æ®Æù¿¡¼ ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ¼ö½ÅÇÏ¿© ¹æ¹® ½Ã¼³ Á¤º¸¸¦ È®ÀÎÇÑ ÈÄ ¹æ¹® ±â·ÏÀ» »ý¼ºÇÏ´Â ºñÄÁ ±â¹Ý ÀüÀÚÃâÀÔ¸íºÎ ½Ã½ºÅÛÀÇ ±â·Ï ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀÌ¿Í °ü·ÃÇÏ¿© ¹ß»ýÇÒ ¼ö ÀÖ´Â ÀáÀçÀûÀÎ º¸¾È À§Çù°ú ÀÌ¿¡ ´ëÀÀµÇ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÏ°í, º¸¾È ¿ä±¸»çÇ׿¡ ºÎÇÕÇÏ´Â Á¤º¸º¸È£ ¹× °³ÀÎÁ¤º¸º¸È£ °ü¸®Ã¼°è(ISMS-P) ÀÎÁõ±âÁØ Ç׸ñ°úÀÇ ´ëÀÀ °ü°è¸¦ ±â¼úÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | This standard defines logging procedures of beacon-based digital entry log system which users visiting facilities create entry logs after confirming the facility information on their smart phones by receiving beacon-based dynamic authentication information. In addition, it describes potential security threats that may occur regarding the system and security requirements against those threats. It also describes the relation between the security requirements and the conforming items in the Personal Information & Information Security Management System(ISMS-P) requirements. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0369.pdf |