ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å±â¼úº¸°í¼­(TTAR)
Ç¥ÁعøÈ£ TTAR-12.0025 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2017-11-09 ÃÑ ÆäÀÌÁö 31
ÇÑ±Û Ç¥ÁØ¸í ¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ ÀüÀڰǰ­±â·ÏÀÇ º¸¾È - PART ¥³: º¸¾ÈÇ¥Áذú º¸¾È±â´É(±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí Securing Electronic Health Records on Mobile Devices - PART ¥µ: Standards and Controls Mapping(Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ ±â¼úº¸°í¼­´Â ¡°¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ ÀüÀڰǰ­±â·ÏÀÇ º¸¾È¡± PART ¥³ ·Î¼­ º¸¾È¿¡ °üÇÑ Ç¥ÁØ ¹× ¸ð¹ý»ç·Ê¸¦ Á¦°øÇÑ´Ù. PART ¥µ´Â 3°³ÀÇ ÀåÀ¸·Î ºÐ·ùµÈ´Ù.
1Àå º¸¾È Ç¥ÁØ – º¸¾È Ç¥ÁØ ¹× ¸ð¹ü»ç·Ê
2Àå º¸¾È Ư¼º ¹× ±ÔÁ¦ – º¸¾È Ç¥Áذú PART ¥±¿¡¼­ ´Ù·é º¸¾È ±â´É°úÀÇ ºñ±³
3Àå ±â¼ú – ÁÖ¿ä »çÀ̹ö º¸¾È ÇÁ·¹ÀÓ¿öÅ© ¹× ¹Ì±¹ ±¹°¡Ç¥Áرâ¼ú¿¬±¸¼Ò(NIST) ÇÁ·¹ÀÓ¿öÅ© ÂüÁ¶ ¼³°è¿¡ »ç¿ëµÈ ±â¼ú°ú Á¦Ç°ÀÇ ºñ±³
¿µ¹® ³»¿ë¿ä¾à As Part IV of ¡°Security of Electronic Health Records on Mobile Devices¡±, the technical report provides the relevant standards as well as the best practices. Part VI is divided into three chapters.
Chapter 1 Security Standards – Standards and Best Practices on Security
Chapter 2 Security Characteristics and Controls – Mapping of the Security Characteristics Described in Part II to the relevant Security Controls
Chapter 3 Technologies – Mapping of the Technologies and Products Used in the Reference Design to the NIST Framework for Improving Critical Infrastructure Cybersecurity
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAR-12.0025.pdf TTAR-12.0025.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¸ð¹ÙÀÏ µð¹ÙÀ̽º¿¡¼­ ÀüÀڰǰ­±â·ÏÀÇ º¸¾È - PART ¥³: º¸¾ÈÇ¥Áذú º¸¾È±â´É(±â¼úº¸°í¼­) TTAR-12.0025 2017-11-09 Á¦Á¤ À¯È¿ ¾øÀ½ TTAR-12.0025.pdf