Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0338 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 40 |
ÇѱÛÇ¥Áظí | ±¸Á¶ÈµÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý (STIX 2.0)¿¡ ´ëÇÑ À¯½ºÄÉÀ̽º | ||
¿µ¹®Ç¥Áظí | Use Cases for Structured Threat Information eXpression (STIX 2.0) | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº »çÀ̹ö À§Çù Á¤º¸ ±³È¯À» À§ÇÑ ±¸Á¶ÈµÈ À§Çù Á¤º¸ Ç¥ÁØ ±Ô°Ý(STIX)¿¡ ´ëÇÑ »ç¿ëÀÚÀÇ ÀÌÇظ¦ µ½±â À§ÇÏ¿© STIXÀÇ °³³ä°ú ±¸¼º, ±×¸®°í ÁÖ¿ä ±â´ÉÀ» ¼³¸íÇÑ´Ù. ¶ÇÇÑ, »çÀ̹ö À§Çù ºÐ¼®, ħÇØ ´ëÀÀ È°µ¿, »çÀ̹ö À§Çù Á¤º¸ ±³È¯ µîÀÇ Àü¹ÝÀûÀÎ »çÀ̹ö À§Çù °ü¸® ü°è ¼ö¸³¿¡ Âü°íÇÒ ¼ö ÀÖ´Â STIX 2.0 À¯½ºÄÉÀ̽º¸¦ Á¦½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard describes the concept, composition and main functions of STIX to help users understand the structured threat information standard for cyber threat information exchange. We also present STIX 2.0 use case, which can be used to establish an overall cyber threat management system such as cyber threat analysis, countermeasures activity, and exchange of cyber threat information. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0338.pdf |
- ÀÌÀü
- 3rd Generation Partnership Project;Technical Specification Group Radio Access Network;User Equipment (UE) conformance specification for UE positioning; Part 5: Test scenarios and assistance data(Release 17)
- ´ÙÀ½
- 3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Overall description of Radio Access Network (RAN) aspects for Vehicle-to-everything (V2X) based on LTE and NR(Release 16)