Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0280 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑÆäÀÌÁö 12
ÇѱÛÇ¥ÁØ¸í »çÀ̹ö ħÇØ»ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© µ¥ÀÌÅÍ ¼öÁý ¹× º¸Á¸ µµ±¸ ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Network Data Acquisition and Preservation Tool Requirements for Cyber Incident Analysis
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ħÇØ »ç°í¿¡ ´ëÇÑ ¿øÀÎ ºÐ¼®À» À§ÇØ ³×Æ®¿öÅ© Æ®·¡ÇÈÀ» ¼öÁýÇÏ°í ÀúÀåÇÒ »Ó ¾Æ´Ï¶ó, ÀúÀåµÈ µ¥ÀÌÅÍ°¡ º¯°æ ¾øÀÌ º¸Á¸µÊÀ» º¸ÀåÇÔÀ¸·Î½á ÇØ´ç µ¥ÀÌÅÍ°¡ ÃßÈÄ ¹ýÁ¤¿¡¼­ Áõ°Å·Î¼­ È¿·ÂÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï ÇÏ´Â µµ±¸¿¡ ´ëÇÑ ±â´ÉÀû ¸í¼¼¸¦ Á¦°øÇÑ´Ù. À̸¦ À§Çؼ­ ÇØ´ç µµ±¸´Â ȹµæÇÏ°íÀÚ ÇÏ´Â ³×Æ®¿öÅ© Æ®·¡ÇÈÀÇ ¿ÏÀüÇÏ°í Á¤È®ÇÑ ¼öÁýÀ» º¸ÀåÇØ¾ß Çϸç, ¼öÁý µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«°á¼º È®ÀÎ ¹× ¼öÁýµÈ µ¥ÀÌÅÍÀÇ º¸Á¸ ±â´ÉÀ» Á¦°øÇØ¾ß ÇÑ´Ù. ¶ÇÇÑ µµ±¸ÀÇ ½Å·Ú¼º È®º¸¸¦ À§ÇÑ ¿ä±¸ »çÇ×À» ¸¸Á·ÇØ¾ß ÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard presents functional specifications of the tool to acquire network data exactly and preserve it completely, as well as to ensure that the preserved data is not to be modified by verifying the integrity. It also includes requirements to give a guarantee against the tool, thereby being able to secure legal admissibility.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0280.pdf TTAK.KO-12.0280.pdf            

ÀÌÀü
´Ùº¯¼ö ÀÌÂ÷½Ä ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ – Á¦2ºÎ: HiMQ, ºÎ°¡Çü ÀüÀÚ¼­¸í ¾Ë°í¸®Áò
´ÙÀ½
SDN ±â¹ÝÀÇ ³×Æ®¿öÅ© º¸¾È ±â´ÉÀÇ ÀÎÅÍÆäÀ̽º(I2NSF) ÇÁ·¹ÀÓ¿öÅ© - Á¦7ºÎ : º¸¾È Á¤Ã¥ ¹ø¿ª±âÀÇ ±¸Á¶ ¹× ÀýÂ÷