Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAS.KO-12.0031 | ±¸Ç¥ÁعøÈ£ | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Á¦°³Á¤ÀÏ | 2005-12-21 | ÃÑÆäÀÌÁö | 41 | ||||||||||||
ÇѱÛÇ¥Áظí | ¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ °¡À̵å | ||||||||||||||
¿µ¹®Ç¥Áظí | Secure Use Guide for Wireless LAN | ||||||||||||||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ¹«¼±·£ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ´Â ¹°¸®ÀûÀÎ ÈѼÕ, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© ÇØÅ·°ú ÀÌ·¯ÇÑ °ø°Ý ½Ãµµ Àü´Ü°èÀÇ ÇÊ¿ä Á¤º¸ ¼öÁý¿¡ ´ëÇÑ ³»¿ëÀ» Æ÷ÇÔÇÏ´Â ´Ù¾çÇÑ °ø°Ý À¯ÇüÀ» ¼³¸íÇÑ´Ù.ÀÌ¾î¼ ¹«¼±·£ ¿î¿µÇöȲ ÆÄ¾Ç,Àåºñ ¹× ³×Æ®¿öÅ© °ü¸®, º¸¾ÈÁ¡°Ë µîÀÇ º¸¾È Ãë¾à¼ºÀ» ±Øº¹ÇÏ°í °ø°ÝÀ» ¿¹¹æÇϱâ À§ÇØ ¹«¼±·£ °ü¸®ÀÚ¿Í »ç¿ëÀÚ°¡ ÁؼöÇÏ¿©¾ß ÇÒ Á¤º¸º¸È£°¡À̵带 ¼³¸íÇÑ´Ù. ¸¶Áö¸· ºÎ·ÏÀ¸·Î´Â ±â¾÷¸Á°ú ¼ÒÈ£ ¹× °¡Á¤¿¡¼ ¹«¼±·£À» Ȱ¿ëÇÒ ¶§, Ãë¾à¼º¿¡ µû¸¥ Á¤º¸º¸È£ °¡À̵带 ¼Õ½±°Ô Àû¿ëÇÒ ¼öÀÖµµ·Ï ¹«¼±·£ Á¤º¸º¸È£ üũ¸®½ºÆ®¸¦ Á¦½ÃÇÏ¿´´Ù. | ||||||||||||||
¿µ¹®³»¿ë¿ä¾à | This standard describes the relation among Vulnerabilities, Intrusion methods and security guide of Wireless LAN. This standard gives full details of Intrusion methods such as physical breakdown, system or network hacking,denial of services, etc. Then, this provides the security guide for wireless LAN managers and users. | ||||||||||||||
±¹Á¦Ç¥ÁØ | |||||||||||||||
°ü·ÃÆÄÀÏ | TTAS.KO-12.0031.pdf | ||||||||||||||
Ç¥ÁØÀÌ·Â |
|
- ÀÌÀü
- 3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Telecommunication management; Subscriber and equipment trace; Trace control and configuration management(Release 17)
- ´ÙÀ½
- 3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Telecommunication management; Subscriber and equipment trace; Trace control and configuration management(Release 19)