Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0205 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 27
ÇѱÛÇ¥Áظí Á¤º¸ º¸È£ °ü¸® ü°è ¹üÀ§ ¼³Á¤ Áöħ
¿µ¹®Ç¥Áظí A Guide for Establishing the Scope of Information Security Management System
Çѱ۳»¿ë¿ä¾à Á¶Á÷ÀÇ È¿°úÀûÀÎ Á¤º¸ º¸È£ È°µ¿ ¹× ¾÷¹« ¼öÇàÀ» À§Çؼ­´Â ÇØ´ç Á¶Á÷¿¡ ÀûÇÕÇÑ Á¤º¸ º¸È£ °ü¸® ü°è¸¦ ¼ö¸³ÇÏ¿© ¿î¿µÇØ¾ß Çϴµ¥, Á¤º¸ º¸È£ °ü¸® ü°èÀÇ ¹üÀ§¸¦ ¸íÈ®È÷ Á¤ÇÏ´Â °ÍÀº ¹«¾ùº¸´Ù Áß¿äÇÑ ¼±Çà ÀÛ¾÷À̶ó°í ÇÒ ¼ö ÀÖ´Ù.
º» Ç¥ÁØ¿¡¼­´Â Á¶Á÷¿¡¼­ Á¤º¸ º¸È£ °ü¸® ü°èÀÇ ¹üÀ§¸¦ °áÁ¤ÇÒ ¶§ À¯ÀÇÇØ¾ß ÇÒ »çÇ×À» ¼³¸íÇÏ°í, Á¶Á÷Àû, ±â¼úÀû, ¹°¸®Àû Ãø¸éÀ» °ËÅäÇÏ¿© ¹üÀ§¸¦ Á¤ÀÇÇÏ´Â ¹æ¹ýÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à Effective information security needs information security management system appropriate to the organization. Defining the scope of ISMS is one of the most important tasks for it.
This standard shows matters to be attended to when defining the scope of ISMS and scope definition method reviewing organizational, technical, physical aspects.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0205_ed15.pdf

ÀÌÀü
DRM ½Ã½ºÅÛ°ú À̹ÌÁö ÇΰÅÇÁ¸°Æà ½Ã½ºÅÛÀÇ ÅëÇÕ ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
URC ·Îº¿À» À§ÇÑ CAN Identifier ¼³Á¤ ¹× CAN ÇÁ·¹ÀÓ Åë½Å ¹æ¹ý