Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0288 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑÆäÀÌÁö 11
ÇѱÛÇ¥Áظí È£½ºÆ® ÄÄÇ»ÅÍ °³ÀÎ Á¤º¸ º¸È£ Á¦Ç° º¸¾È¼º Æò°¡¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ×
¿µ¹®Ç¥Áظí Security Requirements for the Security Evaluation of the Personal Information Protection Application in Host Computers
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº È£½ºÆ® ÄÄÇ»ÅÍÀÇ °³ÀÎ Á¤º¸ º¸È£¸¦ À§ÇÑ Á¦Ç°¿¡¼­ Á¦°øÇØ¾ß ÇÏ´Â °³ÀÎ Á¤º¸ °ËÃâ ¹× Á¤º¸ È帧 ÅëÁ¦, Àü¼Û µ¥ÀÌÅÍ º¸È£, ½Äº° ¹× ÀÎÁõ, °¨»ç±â·Ï »ý¼º µîÀÇ º¸¾È ¿ä±¸ »çÇ×À» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard describes security requirements provided by the personal information protection application in host computers such as personal information extraction and traffic flow control, transmitted data protection, identification and authentication, and generation of audit data.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0288.pdf TTAK.KO-12.0288.pdf            

ÀÌÀü
À̱âÁ¾ »ç¹°ÀÎÅͳݿ¡¼­ÀÇ »óÈ£¿¬µ¿À» À§ÇÑ ¼­ºñ½º ¹× µð¹ÙÀ̽º Ž»ö ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
¸ÖƼ Ŭ¶ó¿ìµå – Á¦1ºÎ: °³¿ä ¹× °í¼öÁØ ¿ä±¸»çÇ×