Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | [ÆóÁö] TTAE.IT-X.1570 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2012-12-21 | ÃÑ ÆäÀÌÁö | 33 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | »çÀ̹ö º¸¾È Á¤º¸ ±³È¯¿¡¼ÀÇ Å½»ö ¸ÞÄ¿´ÏÁò | ||||||||||||||||
¿µ¹® Ç¥Áظí | Discovery Mechanisms in the Exchange of Cyber Security Information | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀº »çÀ̹ö º¸¾È Á¤º¸ÀÇ Á¦°øÀÚ¸¦ ã°í, µ¥ÀÌÅÍ À¯ÇüÀ» ½Äº°Çϱâ À§ÇÑ ¹æ¹ý ¹× ÇÁ·¹ÀÓ¿öÅ©¸¦ ¼³¸íÇϰí ÀÖÀ¸¸ç, »çÀ̹ö º¸¾È Á¤º¸ÀÇ À¯Çü, ¼öÁØ ¹× Á¢±Ù ¹æ¹ý º°·Î º¸¾È Á¤º¸ÀÇ ½Äº°ÀÚ¸¦ Á¤ÀÇÇϰí ÀÖ´Ù. ¶ÇÇÑ, Ž»ö ¸ÞÄ¿´ÏÁòÀ¸·Î½á °´Ã¼ ½Äº°ÀÚ(OID) ±â¹ÝÀÇ ¸ÞÄ¿´ÏÁò°ú ÀÚ¿ø Ç¥½Ã ÇÁ·¹ÀÓ¿öÅ©(RDF) ±â¹ÝÀÇ ¸ÞÄ¿´ÏÁòÀ» ¼Ò°³Çϰí ÀÖÀ¸¸ç, RDF±â¹ÝÀÇ ¸ÞÄ¿´ÏÁò¿¡ ´ëÇÑ ±¸Á¶ ¹× ±¸Çö ¿¹Á¦¸¦ ºÎ·Ï¿¡¼ ¼³¸íÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This standard is to provide a framework for discovering cybersecurity information and the mechanism that enables this. Discovery can be seen as a stage of the cybersecurity information lifecycle adjacent to information publishing and acquisition. The framework covers how to publish cybersecurity information, obtain the candidate list, and acquire the needed information. A discovery scheme may be implemented with arbitrary mechanisms so long as they comply with the framework. Among these mechanisms are object identifier(OID)-based discovery and resource description framework(RDF)-based discovery, which are also elaborated on in the appendix. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
ÆóÁöÀÏ | 2021-12-08 | ||||||||||||||||
ÆóÁö»çÀ¯ |
´ëü Ç¥ÁØ Á¸Àç
(STIX ¹öÀü 2.0 TTAE.OT-12.0019-Part1~5) |
||||||||||||||||
°ü·ÃÆÄÀÏ | TTAE.IT-X.1570.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|