ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0031/R1 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2011-12-21 ÃÑ ÆäÀÌÁö 41
ÇÑ±Û Ç¥ÁØ¸í ¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ Áöħ
¿µ¹® Ç¥Áظí Secure Use Guide of Wireless LAN
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ¹«¼±·£ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ´Â ¹°¸®ÀûÀÎ ÈѼÕ, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© ÇØÅ·°ú ÀÌ·¯ÇÑ °ø°Ý ½Ãµµ Àü ´Ü°èÀÇ ÇÊ¿ä Á¤º¸ ¼öÁý¿¡ ´ëÇÑ ³»¿ëÀ» Æ÷ÇÔÇÏ´Â ´Ù¾çÇÑ °ø°Ý À¯ÇüÀ» ¼³¸íÇÑ´Ù. À̾ ¹«¼±·£ ¿î¿µ ÇöȲ ÆÄ¾Ç, Àåºñ ¹× ³×Æ®¿öÅ© °ü¸®, º¸¾È Á¡°Ë µîÀÇ º¸¾È Ãë¾à¼ºÀ» ±Øº¹ÇÏ°í °ø°ÝÀ» ¿¹¹æÇϱâ À§ÇØ ¹«¼±·£ °ü¸®ÀÚ¿Í »ç¿ëÀÚ°¡ ÁؼöÇÏ¿©¾ß ÇÒ Á¤º¸ º¸È£ °¡À̵带 ¼³¸íÇÑ´Ù. ¸¶Áö¸· ºÎ·Ï I.¿¡¼­´Â ±â¾÷, ¼ÒÈ£ ¹× °¡Á¤¿¡¼­ ¹«¼±·£À» Ȱ¿ëÇÒ ¶§, Ãë¾à¼º¿¡ µû¸¥ Á¤º¸ º¸È£ °¡À̵带 ¼Õ½±°Ô Àû¿ëÇÒ ¼ö ÀÖµµ·Ï ¹«¼±·£ Á¤º¸ º¸È£ üũ¸®½ºÆ®¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard describes the relation among Vulnerabilities, Intrusion methods and security guide of Wireless LAN. This standard gives full details of Intrusion methods such as physical breakdown, system or network hacking, denial of services, etc. Then, this provides the security guide for wireless LAN managers and users.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0031_R1.pdf TTAK.KO-12.0031_R1.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ Áöħ TTAK.KO-12.0031/R1 2011-12-21 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0031_R1.pdf
¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ °¡À̵å TTAS.KO-12.0031 2005-12-21 ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2015-06-03 À¯Áö -