ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0093 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-12-19 ÃÑ ÆäÀÌÁö 82
ÇÑ±Û Ç¥Áظí Á¶Á÷ÀÇ Á¤º¸º¸È£ Á¤Ã¥ ¼ö¸³ °¡À̵å
¿µ¹® Ç¥Áظí A Guide to Establishing Information Security Policies of Organization
ÇÑ±Û ³»¿ë¿ä¾à Á¶Á÷ÀÇ °æ¿µÁø ¹× Á¤º¸º¸È£°ü¸®ÀÚµéÀÌ Á¤º¸º¸È£ Ȱµ¿¿¡ ´ëÇÑ ¹æÇâ°ú ¸ñÇ¥¸¦ Á¦½ÃÇϰíÀÚ ÇÒ ¶§ ÂüÁ¶ÇÒ ¼ö Àִ ǥÁØÈ­µÈ Á¤º¸º¸È£ Á¤Ã¥ °³¹ß ÀýÂ÷¸¦ ¼³¸íÇϰí ÀÛ¼º »ç·Ê¸¦ Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard provides development procedures and examples of security policy which can be referenced by director or security managers of an organization, to establish direction and aims about information security activities.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2017-12-13
ÆóÁö»çÀ¯ Á¦92Â÷ Ç¥ÁØÃÑȸ
(Ç¥ÁØ ³»¿ëÀÌ ³ëÈÄÈ­µÇ¾úÀ¸¸ç, »çȸÀûÀ¸·Î Á¤º¸º¸È£ Á¤Ã¥ °æÇèÀÌ ÃæºÐÈ÷ ÃàÀûµÇ¾î ÀÖÀ¸¹Ç·Î °¡ÀÌµå ºÒÇÊ¿ä
(ÃֽŠISO/IEC 27000 ½Ã¸®Áî Ȱ¿ëÀÌ ±ÇÀåµÊ))
°ü·ÃÆÄÀÏ  TTAK.KO-12.0093.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Á¶Á÷ÀÇ Á¤º¸º¸È£ Á¤Ã¥ ¼ö¸³ °¡À̵å TTAK.KO-12.0093 2008-12-19 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2017-06-09 ÆóÁö Ç¥ÁØÀÇ ³»¿ëÀÌ ³ëÈÄÈ­µÇ¾úÀ¸¸ç »çȸÀûÀ¸·Î Á¤º¸º¸È£ Á¤Ã¥ °æÇèÀÌ ÃæºÐÈ÷ ÃàÀûµÇ¾î ÀÖÀ¸¹Ç·Î °¡ÀÌµå ºÒÇÊ¿ä (PG ȸÀÇ °á°ú : ISO/IEC JTC1/SC27 ³»¿¡ Á¦/°³Á¤µÈ ÃֽŠISO/IEC 27000 ½Ã¸®Áî Ȱ¿ëÀÌ ±ÇÀåµÊ)