ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0294 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2016-12-27 ÃÑ ÆäÀÌÁö 25
ÇÑ±Û Ç¥ÁØ¸í »çÀ̹ö Ä§ÇØ »ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Network Forensic Analysis Tool Requirements for Cyber Incident Analysis
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ³×Æ®¿öÅ© Æ®·¡ÇÈ ¼öÁý µµ±¸¸¦ ÅëÇØ ȹµæµÈ ³×Æ®¿öÅ© Æ®·¡ÇÈÀ¸·ÎºÎÅÍ Áõ°Å¸¦ ÃßÃâÇÏ°í ºÐ¼®ÇÔ¿¡ ÀÖ¾î ÇØ´ç µ¥ÀÌÅͰ¡ ÃßÈÄ ¹ýÁ¤¿¡¼­ Áõ°Å·Î¼­ È¿·ÂÀ» ¹ßÈÖÇÒ ¼ö ÀÖµµ·Ï Çϱâ À§ÇØ ¸¸Á·ÇØ¾ß ÇÏ´Â ±â´ÉÀû ¸í¼¼¸¦ Á¦°øÇÑ´Ù. À̸¦ À§Çؼ­ º» Ç¥ÁØ¿¡¼­´Â ³×Æ®¿öÅ© Æ÷·»½ÄÀ» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ÀÇ ÀϹÝÀûÀÎ ¿ä±¸»çÇ×°ú ÇÊ¿ä ±â´ÉµéÀ» Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard presents functional specifications of the tool to extract and analyze the evidence from network traffic acquired by network traffic acquisition tools. It presents the general requirements and necessary functions of the network traffic analysis tools for network forensics.
By following the functional specifications defined in the standard, the tool for analyzing evidence from network traffic is expected to be improved in its capability and reliability. Also, it gives the users broader choice in selecting a reliable and proper tool.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0294.pdf TTAK.KO-12.0294.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
»çÀ̹ö Ä§ÇØ »ç°í ºÐ¼®À» À§ÇÑ ³×Æ®¿öÅ© Æ÷·»½Ä ºÐ¼® µµ±¸ ¿ä±¸»çÇ× TTAK.KO-12.0294 2016-12-27 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0294.pdf