Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAS.KO-12.0031 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2005-12-21 ÃÑÆäÀÌÁö 41
ÇѱÛÇ¥ÁØ¸í ¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ °¡À̵å
¿µ¹®Ç¥Áظí Secure Use Guide for Wireless LAN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ¹«¼±·£ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ´Â ¹°¸®ÀûÀÎ ÈѼÕ, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© ÇØÅ·°ú ÀÌ·¯ÇÑ °ø°Ý ½Ãµµ Àü´Ü°èÀÇ ÇÊ¿ä Á¤º¸ ¼öÁý¿¡ ´ëÇÑ ³»¿ëÀ» Æ÷ÇÔÇÏ´Â ´Ù¾çÇÑ °ø°Ý À¯ÇüÀ» ¼³¸íÇÑ´Ù.À̾ ¹«¼±·£ ¿î¿µÇöȲ ÆľÇ,Àåºñ ¹× ³×Æ®¿öÅ© °ü¸®, º¸¾ÈÁ¡°Ë µîÀÇ º¸¾È Ãë¾à¼ºÀ» ±Øº¹ÇÏ°í °ø°ÝÀ» ¿¹¹æÇϱâ À§ÇØ ¹«¼±·£ °ü¸®ÀÚ¿Í »ç¿ëÀÚ°¡ ÁؼöÇÏ¿©¾ß ÇÒ Á¤º¸º¸È£°¡À̵带 ¼³¸íÇÑ´Ù. ¸¶Áö¸· ºÎ·ÏÀ¸·Î´Â ±â¾÷¸Á°ú ¼ÒÈ£ ¹× °¡Á¤¿¡¼­ ¹«¼±·£À» È°¿ëÇÒ ¶§, Ãë¾à¼º¿¡ µû¸¥ Á¤º¸º¸È£ °¡À̵带 ¼Õ½±°Ô Àû¿ëÇÒ ¼öÀÖµµ·Ï ¹«¼±·£ Á¤º¸º¸È£ üũ¸®½ºÆ®¸¦ Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes the relation among Vulnerabilities, Intrusion methods and security guide of Wireless LAN. This standard gives full details of Intrusion methods such as physical breakdown, system or network hacking,denial of services, etc. Then, this provides the security guide for wireless LAN managers and users.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-12.0031.pdf
Ç¥ÁØÀÌ·Â
±¸ºÐ ÀÏÀÚ Ç¥ÁعøÈ£ º¯°æ³»¿ª
ÆóÁö 2011-12-21 TTAK.KO-12.0031/R1 ÁÂÃøÇ¥ÁØÀ¸·Î °³Á¤µÇ¾î º» Ç¥ÁØ ÆóÁö
°³Á¤ 2011-12-21 TTAK.KO-12.0031/R1

ÀÌÀü
°øµ¿ÁÖÅÃÀÇ ÃÊ°í¼ÓÁ¤º¸Åë½Å¼³ºñ ¼³Ä¡°ø°£ ±â¼úÇ¥ÁØ
´ÙÀ½
À̵¿ÀüÈ­¿ë ¹«¼±¼³ºñÀÇ RF Ç¥ÁØÃøÁ¤¹ý