Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0294 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2016-12-27 ÃÑÆäÀÌÁö 25
ÇѱÛÇ¥ÁØ¸í »çÀ̹ö ħÇØ »ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Network Forensic Analysis Tool Requirements for Cyber Incident Analysis
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ³×Æ®¿öÅ© Æ®·¡ÇÈ ¼öÁý µµ±¸¸¦ ÅëÇØ È¹µæµÈ ³×Æ®¿öÅ© Æ®·¡ÇÈÀ¸·ÎºÎÅÍ Áõ°Å¸¦ ÃßÃâÇÏ°í ºÐ¼®ÇÔ¿¡ ÀÖ¾î ÇØ´ç µ¥ÀÌÅÍ°¡ ÃßÈÄ ¹ýÁ¤¿¡¼­ Áõ°Å·Î¼­ È¿·ÂÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï Çϱâ À§ÇØ ¸¸Á·ÇØ¾ß ÇÏ´Â ±â´ÉÀû ¸í¼¼¸¦ Á¦°øÇÑ´Ù. À̸¦ À§Çؼ­ º» Ç¥ÁØ¿¡¼­´Â ³×Æ®¿öÅ© Æ÷·»½ÄÀ» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ÀÇ ÀϹÝÀûÀÎ ¿ä±¸»çÇ×°ú ÇÊ¿ä ±â´ÉµéÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard presents functional specifications of the tool to extract and analyze the evidence from network traffic acquired by network traffic acquisition tools. It presents the general requirements and necessary functions of the network traffic analysis tools for network forensics.
By following the functional specifications defined in the standard, the tool for analyzing evidence from network traffic is expected to be improved in its capability and reliability. Also, it gives the users broader choice in selecting a reliable and proper tool.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0294.pdf TTAK.KO-12.0294.pdf            

ÀÌÀü
½º¸¶Æ®°øÀå¿¡¼­ÀÇ 5G MEC º¸¾È ¿ä±¸»çÇ×
´ÙÀ½
½º¸¶Æ®½ÃƼ Ç÷§Æû ¼ÒÇÁÆ®¿þ¾î º¸¾È¿ä±¸»çÇ×