ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ TTAR-12.0046 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-10-23 ÃÑ ÆäÀÌÁö 24
ÇÑ±Û Ç¥ÁØ¸í µðÁöÅк´¿ø Á¤º¸º¸È£ Áöħ - Á¦2ºÎ: À§Çù ¸ðµ¨°ú º¸¾È °í·Á »çÇ×(±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí Guidance of Digital Hospital Security - Part 2: Threats Model and Security Considerations(Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ ±â¼úº¸°í¼­´Â ´ÙÀ½°ú °°Àº »çÇ×À» Á¦°øÇÑ´Ù.
- À§Çù ¸ðµ¨ÀÌ »ý¼ºµÉ ¶§ÀÇ °¡Á¤°ú ¹üÀ§¸¦ ¹®¼­È­
- µðÁöÅÐ º´¿øÀÇ º¸¾È ±â´ÉµéÀÌ ¾î¶² Àǵµ·Î °ø°ÝÀ» ¾àÈ­ÇÏ´ÂÁö¸¦ ±â¼ú
- µðÁöÅÐ º´¿ø¿¡ ´ëÇÑ Á¾ÇÕÀûÀÎ À§Çù ¸ðµ¨À» Á¦½ÃÇϰí, Á¦½ÃÇÑ À§Çù ¸ðµ¨µéÀ» ¾àÈ­ÇÏ´Â °³º°Àû ¹æ¾È¿¡ ´ëÇÑ ¼³¸í
¿µ¹® ³»¿ë¿ä¾à The standard contains the following content:
- Documents any assumptions and scope considered when creating the threat model.
- Describes the security features built into the Digital hospital are intended to thwart attacks.
- Gives a comprehensive threat model for digital hospitals and explaining individual ways to weaken the threat models presented
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAR-12.0046.pdf TTAR-12.0046.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
µðÁöÅк´¿ø Á¤º¸º¸È£ Áöħ - Á¦2ºÎ: À§Çù ¸ðµ¨°ú º¸¾È °í·Á »çÇ×(±â¼úº¸°í¼­) TTAR-12.0046 2020-10-23 Á¦Á¤ À¯È¿ ¾øÀ½ TTAR-12.0046.pdf