ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0338 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 40
ÇÑ±Û Ç¥ÁØ¸í ±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý (STIX 2.0)¿¡ ´ëÇÑ À¯½ºÄÉÀ̽º
¿µ¹® Ç¥Áظí Use Cases for Structured Threat Information eXpression (STIX 2.0)
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº »çÀ̹ö À§Çù Á¤º¸ ±³È¯À» À§ÇÑ ±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥ÁØ ±Ô°Ý(STIX)¿¡ ´ëÇÑ »ç¿ëÀÚÀÇ ÀÌÇØ¸¦ µ½±â À§ÇÏ¿© STIXÀÇ °³³ä°ú ±¸¼º, ±×¸®°í ÁÖ¿ä ±â´ÉÀ» ¼³¸íÇÑ´Ù. ¶ÇÇÑ, »çÀ̹ö À§Çù ºÐ¼®, Ä§ÇØ ´ëÀÀ Ȱµ¿, »çÀ̹ö À§Çù Á¤º¸ ±³È¯ µîÀÇ Àü¹ÝÀûÀÎ »çÀ̹ö À§Çù °ü¸® ü°è ¼ö¸³¿¡ Âü°íÇÒ ¼ö ÀÖ´Â STIX 2.0 À¯½ºÄÉÀ̽º¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard describes the concept, composition and main functions of STIX to help users understand the structured threat information standard for cyber threat information exchange. We also present STIX 2.0 use case, which can be used to establish an overall cyber threat management system such as cyber threat analysis, countermeasures activity, and exchange of cyber threat information.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0338.pdf TTAK.KO-12.0338.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý (STIX 2.0)¿¡ ´ëÇÑ À¯½ºÄÉÀ̽º TTAK.KO-12.0338 2018-12-19 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0338.pdf