Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
| Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-12.0232 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
| Á¦°³Á¤ÀÏ | 2013-12-18 | ÃÑ ÆäÀÌÁö | 27 | ||||||||||||||
| ÇÑ±Û Ç¥Áظí | ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· Ä§ÇØ »ç°í¿¡ ´ëÇÑ º¸¾È Áöħ | ||||||||||||||||
| ¿µ¹® Ç¥Áظí | The Security Guideline for Financial Hacking Incidents in Smart Phone Device | ||||||||||||||||
| ÇÑ±Û ³»¿ë¿ä¾à | º» Ç¥ÁØÀÇ ³»¿ëÀº ´ÙÀ½°ú °°´Ù.
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· °ø°Ý ±â¼ú - ½º¸¶Æ®Æù ´Ü¸»±âÀÇ °¨¿° È®ÀÎ - ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· Ä§ÇØ »ç°í º¸¾È ¹æ¹ý - À̵¿Åë½Å»ç¿¡¼ Á¦°øÇÏ´Â ÇÇÇØÀÚ º¸»ó ´ëÃ¥ ±âÁØ - ºÎ·Ï |
||||||||||||||||
| ¿µ¹® ³»¿ë¿ä¾à |
The summary of contents are as below:
- Security violation state of Smart Phone Device - Financial Program state of Smart Phone Device - Financial Hacking Incidents Security method of Smart Phone Device - Victim compensation measures criteria to be provided fromMobile Service Provider - Appendix |
||||||||||||||||
| °ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
| ÆóÁöÀÏ | 2022-12-07 | ||||||||||||||||
| ÆóÁö»çÀ¯ | »ê¾÷ ÇöÀå¿¡¼ Ȱ¿ëµÇÁö ¾Ê¾Æ¼ ÆóÁö | ||||||||||||||||
| °ü·ÃÆÄÀÏ | TTAK.KO-12.0232_[3].pdf | ||||||||||||||||
| Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
| Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|
||||||||||||||||

