ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0203 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑ ÆäÀÌÁö 30
ÇÑ±Û Ç¥ÁØ¸í ±â¾÷ ¹«¼± ·£ ȯ°æ¿¡¼­ À§Çù ¹æÁö¸¦ À§ÇÑ º¸¾È ±â´É ¿ä±¸ »çÇ×
¿µ¹® Ç¥Áظí Functional Requirements for Threat Prevention in Business WLAN
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ±â¾÷ ¹«¼± ·£ ȯ°æ¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â º¸¾È À§ÇùÀ» ºÐ¼®Çϰí, ¹«¼± º¸¾È ½Ã½ºÅÛµéÀÌ »óÈ£ Çù·ÂÇÏ¿© ´Ù¾çÇÑ À§ÇùÀ» ŽÁöÇÏ°í ¹æ¾îÇÒ ¼ö ÀÖ´Â À§Çù ¹æÁö ±â´É ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. ¹«¼± À§Çù ¹æÁö ±â´É ¿ä±¸ »çÇ×À» Å©°Ô »ç¿ëÀÚ/½Ã½ºÅÛ ÀÎÁõ, ¾ÈÀüÇÑ Á¤º¸ Àü´Þ, ¹«¼± °ø°Ý ŽÁö, ¹«¼± °ø°Ý ´ëÀÀ, º¸¾È °ü¸®, º¸¾È °¨»ç ÃßÀû, ±×¸®°í º¸¾È Á¤º¸ °øÀ¯ ±â´É ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard analyzes security threats that may occur in business WLAN and defines functional requirements for detecting and preventing various kinds of threats through cooperation among wireless security system. The functional requirements are classified into user/system authentication, safe information delivery, wireless attack detection, wireless attack reaction, security management, security audit trail, and security information sharing functions.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0203.pdf TTAK.KO-12.0203.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
±â¾÷ ¹«¼± ·£ ȯ°æ¿¡¼­ À§Çù ¹æÁö¸¦ À§ÇÑ º¸¾È ±â´É ¿ä±¸ »çÇ× TTAK.KO-12.0203 2012-12-21 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0203.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2016-06-08 À¯Áö -