Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0172 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑÆäÀÌÁö 37
ÇѱÛÇ¥ÁØ¸í »çÀ̹öº¸¾È Á¤º¸ °øÀ¯ Çù»ó ÀýÂ÷
¿µ¹®Ç¥Áظí Procedure of Negotiation for Cybersecurity Information Sharing
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº »çÀ̹öº¸¾È Á¤º¸¸¦ Á¦°øÇϰųª Á¦°ø¹Þ´Â »çÀ̹öº¸¾È ¿£Æ¼Æ¼µéÀÌ ¾î¶»°Ô »çÀ̹öº¸¾È Á¤º¸¸¦ °øÀ¯ÇÒÁö¸¦ Çù»óÇÏ´Â »çÀ̹öº¸¾È Á¤º¸ °øÀ¯ Çù»ó ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. º» Ç¥ÁØ¿¡¼­´Â º¸¾È Á¤º¸ °øÀ¯ Çù»óÀ» À§ÇÑ ±â´ÉÀû ¿ä±¸ »çÇ×°ú ÂüÁ¶ ¸ðµ¨, º¸¾ÈÁ¤ º¸ °øÀ¯ Çù¾à¼­ÀÇ °³³äÀûÀÎ µ¥ÀÌÅÍ ¸ðµ¨, ±×¸®°í º¸¾È Á¤º¸ °øÀ¯ Çù¾à¼­ Çù»ó ÀýÂ÷¸¦ ¸í¼¼ÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines a procedure for negotiating agreement on security information sharing between cybersecurity entities such as information requester and information provider. Its scope includes functional requirements and reference model for security information sharing negotiation, conceptual data model of Security information Sharing Agreement (SSA) and SSA negotiation process.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0172.pdf TTAK.KO-12.0172.pdf            

ÀÌÀü
û°¢´É·ÂÀ» °í·ÁÇÑ »ç¿ëÀÚ Á¤º¸ ¼­¼úü°è
´ÙÀ½
»ç¹°ÀÎÅÍ³Ý ±â¹Ý Àú°íµµ ¹«ÀÎ Ç×°ø±â °ü¸® ¹× ¿î¿µ½Ã½ºÅÛ – Á¦1ºÎ: ¿ä±¸»çÇ×