Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-12.0025 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2017-11-09 | ÃÑ ÆäÀÌÁö | 31 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼ ÀüÀڰǰ±â·ÏÀÇ º¸¾È - PART ¥³: º¸¾ÈÇ¥Áذú º¸¾È±â´É(±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | Securing Electronic Health Records on Mobile Devices - PART ¥µ: Standards and Controls Mapping(Technical Report) | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ ±â¼úº¸°í¼´Â ¡°¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼ ÀüÀڰǰ±â·ÏÀÇ º¸¾È¡± PART ¥³ ·Î¼ º¸¾È¿¡ °üÇÑ Ç¥ÁØ ¹× ¸ð¹ý»ç·Ê¸¦ Á¦°øÇÑ´Ù. PART ¥µ´Â 3°³ÀÇ ÀåÀ¸·Î ºÐ·ùµÈ´Ù.
1Àå º¸¾È Ç¥ÁØ – º¸¾È Ç¥ÁØ ¹× ¸ð¹ü»ç·Ê 2Àå º¸¾È Ư¼º ¹× ±ÔÁ¦ – º¸¾È Ç¥Áذú PART ¥±¿¡¼ ´Ù·é º¸¾È ±â´É°úÀÇ ºñ±³ 3Àå ±â¼ú – ÁÖ¿ä »çÀ̹ö º¸¾È ÇÁ·¹ÀÓ¿öÅ© ¹× ¹Ì±¹ ±¹°¡Ç¥Áرâ¼ú¿¬±¸¼Ò(NIST) ÇÁ·¹ÀÓ¿öÅ© ÂüÁ¶ ¼³°è¿¡ »ç¿ëµÈ ±â¼ú°ú Á¦Ç°ÀÇ ºñ±³ |
||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à |
As Part IV of ¡°Security of Electronic Health Records on Mobile Devices¡±, the technical report provides the relevant standards as well as the best practices. Part VI is divided into three chapters.
Chapter 1 Security Standards – Standards and Best Practices on Security Chapter 2 Security Characteristics and Controls – Mapping of the Security Characteristics Described in Part II to the relevant Security Controls Chapter 3 Technologies – Mapping of the Technologies and Products Used in the Reference Design to the NIST Framework for Improving Critical Infrastructure Cybersecurity |
||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|