ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0284 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2015-12-16 ÃÑ ÆäÀÌÁö 21
ÇÑ±Û Ç¥Áظí Á¤º¸º¸È£ ¿ª·® ¼º¼÷µµ ¸ðµ¨
¿µ¹® Ç¥Áظí Cybersecurity Capability Maturity
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀÇ ∙ÁÖ¿ä ³»¿ëÀº Á¤º¸º¸È£ ¿ª·® ¼º¼÷µµ¸¦ Æò°¡ÇÏ°í º¸¾È ´É·Â ¼öÁØÀ» °³¼±Çϱâ À§ÇØ ÇÊ¿äÇÑ ¼º¼÷µµ ¸ðµ¨À» Á¤ÀÇÇÑ´Ù. À̸¦ À§ÇØ, ¿ª·® ¼º¼÷µµ µî±Þ(capability maturity level), ¼º¼÷µµ ¸ðµ¨ ÇÁ·Î¼¼½º°¡ Àû¿ëµÇ´Â µµ¸ÞÀÎ(domain), µµ¸ÞÀÎ º° ¼¼ºÎ µî±Þ ±âÁØ µîÀ» ´Ù·é´Ù. º» Ç¥ÁØÀº [C2MM] ÀÇ °³³ä°ú ±âÁØÀ» ±¹³» ½ÇÁ¤¿¡ ÀûÇÕÇÏ°Ô Àû¿ëÇÏ¿´´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard describes information key components of security maturity model which improve the information security capability of an organization: definition of capability maturity model, maturity level, key process domains for the model and criteria for defining the maturity level in each domain of the model. The standard uses concept and criteria of [C2MM] to be applicable to domestic environment.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0284.pdf TTAK.KO-12.0284.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Á¤º¸º¸È£ ¿ª·® ¼º¼÷µµ ¸ðµ¨ TTAK.KO-12.0284 2015-12-16 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0284.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2019-05-31 À¯Áö ÇöÀç Ȱ¿ëµÇ°í Àִ ǥÁØÀ̹ǷΠÀ¯Áö°¡ ÇÊ¿äÇÔ