Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0232 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑÆäÀÌÁö 27
ÇѱÛÇ¥ÁØ¸í ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í¿¡ ´ëÇÑ º¸¾È Áöħ
¿µ¹®Ç¥Áظí The Security Guideline for Financial Hacking Incidents in Smart Phone Device
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀÇ ³»¿ëÀº ´ÙÀ½°ú °°´Ù.

- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· °ø°Ý ±â¼ú
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ °¨¿° È®ÀÎ
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í º¸¾È ¹æ¹ý
- À̵¿Åë½Å»ç¿¡¼­ Á¦°øÇÏ´Â ÇÇÇØÀÚ º¸»ó ´ëÃ¥ ±âÁØ
- ºÎ·Ï
¿µ¹®³»¿ë¿ä¾à The summary of contents are as below:

- Security violation state of Smart Phone Device
- Financial Program state of Smart Phone Device
- Financial Hacking Incidents Security method of Smart Phone Device
- Victim compensation measures criteria to be provided fromMobile Service Provider
- Appendix
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0232_[3].pdf

ÀÌÀü
Ŭ¶ó¿ìµå °¡»ó ¸Ó½Å ȯ°æ¿¡¼­ °¡¿ë¼º °ø°Ý ¹æÁö ¹× ´ëÀÀÀ» À§ÇÑ °ü¸® ¿ä±¸»çÇ×
´ÙÀ½
°³ÀÎÀÎÁõÀ» À§ÇÑ »ýü½ÅÈ£ Á¤º¸ ½ÃÇè¿ë DB ±¸ÃàÁöħ