Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAE.IT-M3016.2 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2010-12-23 | ÃÑ ÆäÀÌÁö | 20 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ³×Æ®¿öÅ© °ü¸®¸¦ À§ÇÑ º¸¾È: º¸¾È ¼ºñ½º | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security for the management plane: Security services | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀº Åë½Å¸Á¿¡¼ÀÇ Åë½Å Àåºñ ¹× °ü¸® ½Ã½ºÅÛÀ» À§ÇÑ º¸¾È Ãø¸é¿¡¼ º¸¾È ¼ºñ½º¸¦ Á¤ÀÇÇÑ´Ù. ¼ºñ½º´Â ½Ã½ºÅÛ °ü¸®¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ×ÀÎ ½Å¿ø °ËÁõ, Á¢±Ù Á¦¾î, ±ÇÇÑ °ü¸®, µ¥ÀÌÅÍ ±â¹Ð¼º, µ¥ÀÌÅÍ ¹«°á¼º, ÃßÀû °¨»ç, º¸¾È ¾Ë¸² ±â´É¿¡ ´ëÇÑ ¿ä±¸¿¡¼ µµÃâµÇ¾ú´Ù.
- ÀÎÁõ : ¼ºñ½º¸¦ ¿ä±¸ÇÏ´Â ÇàÀ§ÀÚ¿¡ ´ëÇÑ ½Å¿ø °ËÁõ - Á¢±Ù Á¦¾î : Àΰ¡¹ÞÁö ¾ÊÀº »ç¿ëÀÚ¿¡ ´ëÇÑ Á¢±Ù Á¦¾î - µ¥ÀÌÅÍ ¹«°á¼º/±â¹Ð¼º : ÀúÀåµÈ µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«°á¼º ¹× ±â¹Ð¼º º¸Àå - ºÎÀÎ ¹æÁö : À̺¥Æ®¿¡ ´ëÇÑ Ã¥ÀÓ º¸Àå - ÃßÀû °¨»ç : ÇàÀ§¿¡ ´ëÇÑ ·Î±× ÀúÀå - ¾Ë¶÷ º¸°í : ÁöÁ¤µÈ À̺¥Æ®¿¡ ´ëÇÑ ¾Ë¸² ±â´É |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
This Recommendation focuses on the security aspect of management plane for network elements and management system, which are part of the Telecommunication infrastructure. It derives ¡°security service¡± from ¡°service requirements¡± which are verification of identities, controlled access, authorization, data confidentiality, data integrity, audit trail and security alarm.
- Authentication : capabilities to verify the claimed identity of any actor. - Access control : prevent from gaining access to resources which are not authorized - Data confidentiality and integrity : ensure the confidentiality/integrity of stored data - Non-repudiation : cannot deny the responsibility - Audit tail : storing information about activities - Alarm reporting : generate alarm notifications on selected events |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|