Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0338 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 40
ÇѱÛÇ¥ÁØ¸í ±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý (STIX 2.0)¿¡ ´ëÇÑ À¯½ºÄÉÀ̽º
¿µ¹®Ç¥Áظí Use Cases for Structured Threat Information eXpression (STIX 2.0)
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº »çÀ̹ö À§Çù Á¤º¸ ±³È¯À» À§ÇÑ ±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥ÁØ ±Ô°Ý(STIX)¿¡ ´ëÇÑ »ç¿ëÀÚÀÇ ÀÌÇظ¦ µ½±â À§ÇÏ¿© STIXÀÇ °³³ä°ú ±¸¼º, ±×¸®°í ÁÖ¿ä ±â´ÉÀ» ¼³¸íÇÑ´Ù. ¶ÇÇÑ, »çÀ̹ö À§Çù ºÐ¼®, ħÇØ ´ëÀÀ È°µ¿, »çÀ̹ö À§Çù Á¤º¸ ±³È¯ µîÀÇ Àü¹ÝÀûÀÎ »çÀ̹ö À§Çù °ü¸® ü°è ¼ö¸³¿¡ Âü°íÇÒ ¼ö ÀÖ´Â STIX 2.0 À¯½ºÄÉÀ̽º¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes the concept, composition and main functions of STIX to help users understand the structured threat information standard for cyber threat information exchange. We also present STIX 2.0 use case, which can be used to establish an overall cyber threat management system such as cyber threat analysis, countermeasures activity, and exchange of cyber threat information.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0338.pdf TTAK.KO-12.0338.pdf            

ÀÌÀü
°Å¿ï¼¼°è ±â¹Ý ¸ÞŸ¹ö½º ½Ã½ºÅÛ - Á¦1ºÎ: ÂüÁ¶ ¾ÆÅ°ÅØó
´ÙÀ½
½Ç°¨ µðÁöÅÐ ÈÞ¸Õ Ç°ÁúÆò°¡ ÇÁ·¹ÀÓ¿öÅ© - Á¦2ºÎ: Æò°¡ ¹æ¹ý