ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAS.KO-10.0074/R1 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2007-06-22 ÃÑ ÆäÀÌÁö 69
ÇÑ±Û Ç¥Áظí ÀÚ·á º¸¾È°ü¸® Áöħ
¿µ¹® Ç¥Áظí A Guide for Data Security Management
ÇÑ±Û ³»¿ë¿ä¾à º» Áöħ¿¡¼­´Â Àü»ê¸Á ½Ã½ºÅÛ¿¡ ÀúÀåµÈ ÀÚ·áÀÇ È¿°úÀûÀÎ °ü¸®¿Í º¸È£¸¦ À§ÇØ °í·ÁÇØ¾ß ÇÒ º¸¾È »çÇ×À» ÀÚ·áºÐ·ù ¹× Á¢±ÙÁ¦¾î, ÀÀ¿ë ÇÁ·Î±×·¥ º¸¾ÈÁ¦¾î, µ¥ÀÌÅͺ£À̽º °ü¸®½Ã½ºÅÛ º¸¾ÈÁ¦¾î ¼¼°¡Áö °üÁ¡¿¡¼­ ¾ð±ÞÇÏ¿´À¸¸ç, ºÎ·ÏÀ¸·Î ÀÚ·á º¸¾È ¹æÄ§ ¼ö¸³½Ã ÂüÁ¶ÇÒ ¼ö ÀÖ´Â Á¦¾îµéÀ» ÀÏ¹Ý Á¦¾î¿Í ÀÀ¿ë Á¦¾î·Î ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This guide describes three views on data security and management which are stored on computer network systems: data category & access control, application program security control, database management system security control. Appendix describes control lists which can be used as a reference of data security policy build-up.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAS.KO-10.0074_R1.pdf TTAS.KO-10.0074_R1.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
ÀÚ·á º¸¾È°ü¸® Áöħ TTAS.KO-10.0074/R1 2007-06-22 °³Á¤ À¯È¿ ¾øÀ½ TTAS.KO-10.0074_R1.pdf