Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0102 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥ÁØ¸í ±â¾÷ÀÇ Á¤º¸º¸È£¸¦ À§ÇÑ ¾ÏÈ£Á¤Ã¥ ¼ö¸³ Áöħ
¿µ¹®Ç¥Áظí Guideline on Cryptography Policy in Enterprise Information Security
Çѱ۳»¿ë¿ä¾à ÁÖ¿ä ³»¿ëÀ¸·Î´Â ±¹³» ±â¾÷ÀÌ ¼ö¸³ÇÏ´Â ¾ÏÈ£Á¤Ã¥¿¡ Çʼö․¼±ÅÃÀûÀ¸·Î Æ÷ÇԵǾî¾ß ÇÏ´Â Ç׸ñÀ» Á¦½ÃÇÏ°í °¢ Ç׸ñÀÇ ¸ñÀû ¹× ÀÛ¼º¹æ¹ý¿¡ ´ëÇØ ¼³¸íÇÏ´Â °ÍÀ¸·Î ±¸¼ºµÇ¾î ÀÖ´Ù. Ãß°¡ÀûÀ¸·Î ¾ÏÈ£Á¤Ã¥ ¼ö¸³±âÁØ¿¡ µû¶ó °¡»óÀÇ ±â¾÷ÀÌ ÀÚ½ÅÀÇ ºñÁî´Ï½º ȯ°æ¿¡ ¸ÂÃç ¾ÏÈ£Á¤Ã¥À» ¼ö¸³ÇÑ ¿¹¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard specifies mandatory or optional items to be included in cryptographic policy of domestic enterprise. Each item is composed of its purpose and explanation. In addition to, This standard give an example of cryptographic policy for virtual enterprise which considered their IT environment.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0102.pdf TTAK.KO-12.0102.pdf            

ÀÌÀü
SYSLOG ÇÁ·ÎÅäÄÝ
´ÙÀ½
Á¦ 3ÀÚ ½Å·Ú ±â°ü(TTP)¼­ºñ½ºÀÇ Á¾´Ü °£ µ¥ÀÌÅÍ Åë½Å º¸¾È