ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0007/R1 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-08-28 ÃÑ ÆäÀÌÁö 41
ÇÑ±Û Ç¥Áظí IT ¼­ºñ½º À§ÇèºÐ¼® ¹æ¹ý
¿µ¹® Ç¥Áظí IT Service Risk Analysis Method
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº IT(Information Technology) ¼­ºñ½º °³¹ß ¹× ¿î¿µ°úÁ¤¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â Á¤º¸º¸È£ À§ÇùÀ» ºÐ¼®Çϰí, ÀûÀýÇÑ º¸È£´ëÃ¥À» ¸¶·ÃÇϵµ·Ï À§ÇèºÐ¼® ÀýÂ÷ ¹× ¹æ¹ýÀ» Á¤ÀÇÇÏ´Â °ÍÀ» ¸ñÀûÀ¸·Î ÇÑ´Ù.
º» Ç¥ÁØÀº ±â Á¦Á¤µÈ ¡°°ø°øÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀ» À§ÇÑ À§ÇèºÐ¼® Ç¥ÁØ(TTAS.KO-12.0007)¡±ÀÇ À§ÇèºÐ¼® °³³ä ¹× ÀýÂ÷¿Í Àϰü¼ºÀ» °¡ÁöµÇ IT ¼­ºñ½ºÁ¦°øÀÚ°¡ ¼Õ½±°Ô Ȱ¿ëÇÒ ¼ö ÀÖµµ·Ï ±¸Ã¼¼º°ú Ȱµ¿°£ ¿¬°ü¼ºÀ» º¸¿ÏÇÏ¿´´Ù.
º» Ç¥ÁØÀÇ Àû¿ë ´ë»óÀÎ IT¼­ºñ½º´Â VoIP, m-RFID, IPTV µî°ú °°ÀÌ Á¤º¸±â¼úÀ» ÀÀ¿ëÇÑ ¼­ºñ½º·Î¼­ ¼­¹ö, ³×Æ®¿öÅ©, µ¥ÀÌÅͺ£À̽º µî IT ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ©·Î ±¸¼ºµÈ´Ù.
µû¶ó¼­ IT ¼­ºñ½º À§ÇèºÐ¼®Àº ¼­ºñ½º¸¦ ±¸¼ºÇÏ´Â ¸ðµç Á¤º¸±â¼ú ¹× Åë½Å¿ä¼ÒÀÇ Ãë¾à¼º°ú À§ÇùÀÌ ¼­ºñ½º¿¡ ¹ÌÄ¡´Â ¿µÇâÀ» Åä´ë·Î À§ÇèºÐ¼®À» ¼öÇàÇÔÀ¸·Î½á IT ¼­ºñ½ºÁ¦°øÀÚÀÇ º¸È£´ëÃ¥ ¼ö¸³ Ȱµ¿À» Áö¿øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The purpose of this standard is to define the procedures and method of risk analysis which enable the analysis on the threats to information in the development and operation of IT services and development of appropriate countermeasures against such threats, so that IT service providers can provide safe and reliable services.
While maintaining the consistency with the existing concept and procedure of the risk analysis in the TTAS.KO-12.0007, Standards of the Risk Analysis for Public Information System Security, the details and the correlation between the activities were supplemented for the convenience of the service providers.
The IT services which are the objectives of this standard are implemented on the basis of IT, such as VoIP, m-RFID, and IPTV, and consist of IT systems and network, in more particular, servers, networks, and database. Therefore, since the risk analyses on the IT services include all the elements of the IT and communication which comprise the services and are executed comprehensively on the basis of the influences of the weakness and threats of each element on the services, they support service providers to develop effective and efficient information protection measures.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0007_R1.pdf TTAK.KO-12.0007_R1.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
IT ¼­ºñ½º À§ÇèºÐ¼® ¹æ¹ý TTAK.KO-12.0007/R1 2008-08-28 °³Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0007_R1.pdf
°ø°øÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀ» À§ÇÑ À§ÇèºÐ¼® Ç¥ÁØ - À§ÇèºÐ¼® ¹æ¹ý·Ð ¸ðµ¨ TTAS.KO-12.0007 2000-03-28 Á¦Á¤ À¯È¿ ¾øÀ½ TTAS_KO-12_0007.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2017-06-09 À¯Áö ¥ï º» Ç¥ÁØÀº ½Å±Ô ICT ¼­ºñ½º¿¡ ´ëÇÑ Á¤º¸º¸È£ »çÀü ¿µÇâÆò°¡ µî¿¡¼­ º¸ÆíÀûÀÎ À§ÇèºÐ¼® ¹æ¹ý·ÐÀ¸·Î Ȱ¿ëÇϰí ÀÖÀ¸¹Ç·Î ÇØ´ç Ç¥ÁØÀÇ À¯Áö°¡ ÇÊ¿äÇÔ. ´Ù¸¸ À§ÇèºÐ¼® ¿¹½Ã·Î Á¦½ÃµÈ WIBRO ¼­ºñ½º À§ÇèºÐ¼® »ùÇÃÀ» IOT µî ½Å±Ô ¼­ºñ½º, ÀÎÇÁ¶ó¸¦ ´ë»óÀ¸·Î ºÐ¼®, ¾÷µ¥ÀÌÆ® ÇÏ´Â °ÍÀ» °í·ÁÇØ º¼ Çʿ䰡 ÀÖÀ½