ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0155 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑ ÆäÀÌÁö 21
ÇÑ±Û Ç¥Áظí Á¶Á÷¿¡¼­ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ º¸¾È Áöħ
¿µ¹® Ç¥Áظí Security Guidelines for Personal Mobile Devices in Organizations
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº Á¶Á÷(ȸ»ç, ´Üü, ±â°ü)¿¡¼­ÀÇ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» ¾÷¹«¿¡ »ç¿ëÇÒ ¶§ ÇÊ¿äÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù. ÀÌ·¯ÇÑ º¸¾È ÁöħÀ» Á¤ÀÇÇϱâ À§ÇØ ÇöÀç »ç¿ëÇÏ°í ÀÖ´Â °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ °³¿ä¸¦ ¼³¸íÇÏ°í, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷¿¡¼­ »ç¿ëÇϴµ¥ À־ÀÇ º¸¾È ±â¼úÀ» Á¦½ÃÇÑ´Ù. ƯÈ÷, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷ ¾÷¹«¿¡ »ç¿ëÇÏ´Â µ¥ À־ÀÇ º¸¾È À§Çù°ú ±â¼úÀûÀÎ À§Ç輺À» Á¤¸®ÇÏ°í, ÀÌ·¯ÇÑ º¸¾È À§ÇùµéÀ» ¿ÏÈ­ÇÏ°í °¨¼Ò½ÃÅ°±â À§ÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard describes security guidelines for using Personal Mobile Devices in the organization such as company, institute, government agency, etc. to work. This document explains an overview of the mobile terminal, and proposes security technology at an organization to use mobile personal terminals. In particular, this document describes technical risks and security threats for using a mobile personal device in the organization of business, and it defines security guidelines to lesson those security threats and security vulnerabilities.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0155.pdf TTAK.KO-12.0155.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Á¶Á÷¿¡¼­ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ º¸¾È Áöħ TTAK.KO-12.0155 2010-12-23 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0155.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç È°¿ëµÇ°í Àִ ǥÁØÀ̹ǷΠÀ¯Áö°¡ ÇÊ¿äÇÔ