Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-12.0046 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2020-10-23 | ÃÑ ÆäÀÌÁö | 24 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | µðÁöÅк´¿ø Á¤º¸º¸È£ Áöħ - Á¦2ºÎ: À§Çù ¸ðµ¨°ú º¸¾È °í·Á »çÇ×(±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | Guidance of Digital Hospital Security - Part 2: Threats Model and Security Considerations(Technical Report) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ ±â¼úº¸°í¼´Â ´ÙÀ½°ú °°Àº »çÇ×À» Á¦°øÇÑ´Ù.
- À§Çù ¸ðµ¨ÀÌ »ý¼ºµÉ ¶§ÀÇ °¡Á¤°ú ¹üÀ§¸¦ ¹®¼È - µðÁöÅÐ º´¿øÀÇ º¸¾È ±â´ÉµéÀÌ ¾î¶² Àǵµ·Î °ø°ÝÀ» ¾àÈÇÏ´ÂÁö¸¦ ±â¼ú - µðÁöÅÐ º´¿ø¿¡ ´ëÇÑ Á¾ÇÕÀûÀÎ À§Çù ¸ðµ¨À» Á¦½ÃÇϰí, Á¦½ÃÇÑ À§Çù ¸ðµ¨µéÀ» ¾àÈÇÏ´Â °³º°Àû ¹æ¾È¿¡ ´ëÇÑ ¼³¸í |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
The standard contains the following content:
- Documents any assumptions and scope considered when creating the threat model. - Describes the security features built into the Digital hospital are intended to thwart attacks. - Gives a comprehensive threat model for digital hospitals and explaining individual ways to weaken the threat models presented |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|