Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-12.0093 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2008-12-19 | ÃÑ ÆäÀÌÁö | 82 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | Á¶Á÷ÀÇ Á¤º¸º¸È£ Á¤Ã¥ ¼ö¸³ °¡À̵å | ||||||||||||||||
¿µ¹® Ç¥Áظí | A Guide to Establishing Information Security Policies of Organization | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | Á¶Á÷ÀÇ °æ¿µÁø ¹× Á¤º¸º¸È£°ü¸®ÀÚµéÀÌ Á¤º¸º¸È£ Ȱµ¿¿¡ ´ëÇÑ ¹æÇâ°ú ¸ñÇ¥¸¦ Á¦½ÃÇϰíÀÚ ÇÒ ¶§ ÂüÁ¶ÇÒ ¼ö Àִ ǥÁØÈµÈ Á¤º¸º¸È£ Á¤Ã¥ °³¹ß ÀýÂ÷¸¦ ¼³¸íÇϰí ÀÛ¼º »ç·Ê¸¦ Á¦½ÃÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This standard provides development procedures and examples of security policy which can be referenced by director or security managers of an organization, to establish direction and aims about information security activities. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
ÆóÁöÀÏ | 2017-12-13 | ||||||||||||||||
ÆóÁö»çÀ¯ |
Á¦92Â÷ Ç¥ÁØÃÑȸ
(Ç¥ÁØ ³»¿ëÀÌ ³ëÈÄȵǾúÀ¸¸ç, »çȸÀûÀ¸·Î Á¤º¸º¸È£ Á¤Ã¥ °æÇèÀÌ ÃæºÐÈ÷ ÃàÀûµÇ¾î ÀÖÀ¸¹Ç·Î °¡ÀÌµå ºÒÇÊ¿ä (ÃֽŠISO/IEC 27000 ½Ã¸®Áî Ȱ¿ëÀÌ ±ÇÀåµÊ)) |
||||||||||||||||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0093.pdf | ||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|