ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAE.OT-12.0019-Part3 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 49
ÇÑ±Û Ç¥ÁØ¸í ±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý(STIX) ¹öÀü 2.0 - Á¦3ºÎ: »çÀ̹ö °üÃø ÄÚ¾î °³³ä
¿µ¹® Ç¥Áظí Structured Threat Information eXpression(STIX) Version 2.0 - Part3: Cyber Observable Core Concepts
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¸Ö¿þ¾î Ư¼º, ħÀÔ Å½Áö, »ç°í ´ëÀÀ ¹× °ü¸®, µðÁöÅÐ Æ÷·»½Ä¿¡ Àû¿ëÇϵµ·Ï °üÃø °¡´É °´Ã¼¿Í »çÀ̹ö µµ¸ÞÀÎÀÇ ¼Ó¼º¿¡ ´ëÇÑ ±¸Á¶È­ µÈ Ç¥ÇöÀ» Á¤ÀÇÇÑ´Ù. ÀÌ Ç¥ÁØÀº »çÀ̹ö °üÃø Ç¥Çö°ú °ü·ÃµÈ µ¥ÀÌÅÍ Å¸ÀÔ°ú ¾Ïȣȭ ¾Ë°í¸®Áò¿¡ ´ëÇÑ °øÅë ¿ë¾î¸¦ Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ °üÃø °¡´É °´Ã¼ÀÇ °øÅë ¼Ó¼º ¹× µ¿ÀÛÀ» ¼³¸íÇÑ´Ù. »çÀ̹ö °üÃø °´Ã¼¸¦ Ä¿½ºÅ͸¶ÀÌ¡ÇÏ´Â ¹æ¹ýÀÇ ¿ä±¸»çÇ×À» ±â¼úÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard defines representations for observable objects and their properties in the cyber domain to apply malware characterization, intrusion detection, incident response and management, and digital forensics. It defines the data type specific to the representation of Cyber Observables, and common vocabulary regarding encryption algorithms. Furthermore, the standard outlines the common properties and behavior across all Cyber Observable Objects. It specifies the requirements of the means to customize Cyber Observable Objects.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAE.OT-12.0019-Part3.pdf TTAE.OT-12.0019-Part3.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
±¸Á¶È­µÈ À§Çù Á¤º¸ Ç¥Çö ±Ô°Ý(STIX) ¹öÀü 2.0 - Á¦3ºÎ: »çÀ̹ö °üÃø ÄÚ¾î °³³ä TTAE.OT-12.0019-Part3 2018-12-19 Á¦Á¤ À¯È¿ ¾øÀ½ TTAE.OT-12.0019-Part3.pdf