Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0294 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2016-12-27 ÃÑÆäÀÌÁö 25
ÇѱÛÇ¥ÁØ¸í »çÀ̹ö ħÇØ »ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Network Forensic Analysis Tool Requirements for Cyber Incident Analysis
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ³×Æ®¿öÅ© Æ®·¡ÇÈ ¼öÁý µµ±¸¸¦ ÅëÇØ È¹µæµÈ ³×Æ®¿öÅ© Æ®·¡ÇÈÀ¸·ÎºÎÅÍ Áõ°Å¸¦ ÃßÃâÇÏ°í ºÐ¼®ÇÔ¿¡ ÀÖ¾î ÇØ´ç µ¥ÀÌÅÍ°¡ ÃßÈÄ ¹ýÁ¤¿¡¼­ Áõ°Å·Î¼­ È¿·ÂÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï Çϱâ À§ÇØ ¸¸Á·ÇØ¾ß ÇÏ´Â ±â´ÉÀû ¸í¼¼¸¦ Á¦°øÇÑ´Ù. À̸¦ À§Çؼ­ º» Ç¥ÁØ¿¡¼­´Â ³×Æ®¿öÅ© Æ÷·»½ÄÀ» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ÀÇ ÀϹÝÀûÀÎ ¿ä±¸»çÇ×°ú ÇÊ¿ä ±â´ÉµéÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard presents functional specifications of the tool to extract and analyze the evidence from network traffic acquired by network traffic acquisition tools. It presents the general requirements and necessary functions of the network traffic analysis tools for network forensics.
By following the functional specifications defined in the standard, the tool for analyzing evidence from network traffic is expected to be improved in its capability and reliability. Also, it gives the users broader choice in selecting a reliable and proper tool.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0294.pdf TTAK.KO-12.0294.pdf            

ÀÌÀü
Àç³­¾ÈÀüÅë½Å¸Á Áö·ÉÀåÄ¡ ±âº» ¼­ºñ½º ½ÃÇè±Ô°Ý
´ÙÀ½
¼öÁß À½ÆÄ Åë½Å ³×Æ®¿öÅ©ÀÇ ¾ÖÇø®ÄÉÀÌ¼Ç ±â¹Ý ºÎºÐ ÃʱâÈ­ ¹æ¹ý ¹× ¿ä±¸»çÇ×