Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAS.KO-12.0031 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2005-12-21 ÃÑÆäÀÌÁö 41
ÇѱÛÇ¥ÁØ¸í ¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ °¡À̵å
¿µ¹®Ç¥Áظí Secure Use Guide for Wireless LAN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ¹«¼±·£ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ´Â ¹°¸®ÀûÀÎ ÈѼÕ, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© ÇØÅ·°ú ÀÌ·¯ÇÑ °ø°Ý ½Ãµµ Àü´Ü°èÀÇ ÇÊ¿ä Á¤º¸ ¼öÁý¿¡ ´ëÇÑ ³»¿ëÀ» Æ÷ÇÔÇÏ´Â ´Ù¾çÇÑ °ø°Ý À¯ÇüÀ» ¼³¸íÇÑ´Ù.À̾ ¹«¼±·£ ¿î¿µÇöȲ ÆľÇ,Àåºñ ¹× ³×Æ®¿öÅ© °ü¸®, º¸¾ÈÁ¡°Ë µîÀÇ º¸¾È Ãë¾à¼ºÀ» ±Øº¹ÇÏ°í °ø°ÝÀ» ¿¹¹æÇϱâ À§ÇØ ¹«¼±·£ °ü¸®ÀÚ¿Í »ç¿ëÀÚ°¡ ÁؼöÇÏ¿©¾ß ÇÒ Á¤º¸º¸È£°¡À̵带 ¼³¸íÇÑ´Ù. ¸¶Áö¸· ºÎ·ÏÀ¸·Î´Â ±â¾÷¸Á°ú ¼ÒÈ£ ¹× °¡Á¤¿¡¼­ ¹«¼±·£À» È°¿ëÇÒ ¶§, Ãë¾à¼º¿¡ µû¸¥ Á¤º¸º¸È£ °¡À̵带 ¼Õ½±°Ô Àû¿ëÇÒ ¼öÀÖµµ·Ï ¹«¼±·£ Á¤º¸º¸È£ üũ¸®½ºÆ®¸¦ Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes the relation among Vulnerabilities, Intrusion methods and security guide of Wireless LAN. This standard gives full details of Intrusion methods such as physical breakdown, system or network hacking,denial of services, etc. Then, this provides the security guide for wireless LAN managers and users.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-12.0031.pdf
Ç¥ÁØÀÌ·Â
±¸ºÐ ÀÏÀÚ Ç¥ÁعøÈ£ º¯°æ³»¿ª
ÆóÁö 2011-12-21 TTAK.KO-12.0031/R1 ÁÂÃøÇ¥ÁØÀ¸·Î °³Á¤µÇ¾î º» Ç¥ÁØ ÆóÁö
°³Á¤ 2011-12-21 TTAK.KO-12.0031/R1

ÀÌÀü
DRM ½Ã½ºÅÛ°ú À̹ÌÁö ÇΰÅÇÁ¸°Æà ½Ã½ºÅÛÀÇ ÅëÇÕ ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
URC ·Îº¿À» À§ÇÑ CAN Identifier ¼³Á¤ ¹× CAN ÇÁ·¹ÀÓ Åë½Å ¹æ¹ý