Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-12.0039 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2019-10-25 | ÃÑ ÆäÀÌÁö | 28 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | µðÁöÅк´¿ø Á¤º¸º¸È£ Áöħ - Á¦1ºÎ: »çÀ̹öº¸¾È ½Ç¹« Áöħ(±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | Guidance of Digital Hospital Security - Part¥°: Cybersecurity Code of Practice(Technical Report) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ ±â¼úº¸°í¼´Â ÀÇ·á±â°ü¿¡¼ Á¤º¸Åë½Å±â¼ú(ICT, Information Communication Technology)À» ±â¹ÝÀ¸·Î ÇÏ´Â ÀÇ·áÁ¤º¸½Ã½ºÅÛ, ÀÇ·á±â°ü¿¡¼ »ç¿ëÇϰí ÀÖ´Â ¿©·¯ ÀÇ·á±â±â¿¡¼ ¼¼Æ®·Î µ¿ÀÛÇÏ´Â ICT ±â±âµé°ú °ü·Ã ¼ÒÇÁÆ®¿þ¾î, ÀÇ·á±â°üÀ» ¹æ¹®ÇÏ´Â ÀÚ(¿Ü·¡, ÀÔ¿ø, ÀÀ±Þ, °Ç°°ËÁø µî)ÀÇ °³ÀΰǰÁ¤º¸, ÀÇ·á °ü·Ã Á¤º¸ µîÀ» ¾ÈÀüÇÏ°Ô º¸È£Çϰí, ÀÇ·á °ü·Ã Á¾»çÀÚ°¡ ÁöÄÑ¾ß ÇÒ Á¦¹Ý Á¤º¸º¸È£(°³ÀÎÁ¤º¸º¸È£ Æ÷ÇÔ) Áؼö»çÇ×À» °¡À̵åÇϱâ À§ÇØ ÀǷẸ¾È °ü·Ã ±¹Á¦Ç¥ÁØ ±â¼ú, ¹Ì±¹ NIST »çÀ̹öº¸¾È ÇÁ·¹ÀÓ¿öÅ©, NIST Ç¥ÁØ Æ¯º°º¸°í¼(SP), »ê¾÷ Ç¥ÁØ °£ÀÇ º¸¾È ÅëÁ¦ Ç׸ñÀ» ºñ±³ÇÏ¿© Á¦°øÇÑ´Ù.
°¢°¢ÀÇ ÀϹÝÀûÀÎ º¸¾È Ư¼ºÀ» ±¸Ã¼ÀûÀÌ°í ´ÙÁßÀûÀÎ º¸¾È ÅëÁ¦¿Í ºñ±³ÇÔÀ¸·Î½á, Ư¡À» Á» ´õ ¼¼ºÐÈÇÏ¿© Á¤ÀÇÇϸç ÀÌ·¯ÇÑ Æ¯Â¡À» ½ÇÇàÇÏ´Â µ¥ ÇʼöÀûÀÎ Á¶Ä¡¸¦ ÀÌÇØÇϰíÀÚ ÇÑ´Ù. ÀÌ·¯ÇÑ ºñ±³¸¦ ÅëÇØ ¾òÀ» ¼ö ÀÖ´Â ÇýÅà Áß Çϳª´Â º¸¾ÈÀû ƯÁ¤À¸·ÎºÎÅÍ º¸¾È ÅëÁ¦ÀÇ Æò°¡·Î±îÁöÀÇ ÃßÀû °¡´É¼ºÀÌ´Ù. |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
This technical report is intended for medical information systems based on ICT(Information Communication Technology) in medical institutions, ICT devices operating in various medical devices used by medical institutions, related software,(Including personal information protection), NIST cyber security framework, related NIST standards, and other related information that healthcare workers must observe, as well as personal health information, medical information, Compare the components between industry standards and best practices.
By comparing each generic security characteristic with specific and multiple security regulations, we want to define the features more granularly and understand the measures necessary to implement them. One of the benefits of these comparisons is traceability from the security specification to the evaluation of security regulations. |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|