Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAS.KO-10.0074/R1 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2007-06-22 | ÃÑ ÆäÀÌÁö | 69 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | ÀÚ·á º¸¾È°ü¸® Áöħ | ||||||||||||||||
¿µ¹® Ç¥Áظí | A Guide for Data Security Management | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | º» Áöħ¿¡¼´Â Àü»ê¸Á ½Ã½ºÅÛ¿¡ ÀúÀåµÈ ÀÚ·áÀÇ È¿°úÀûÀÎ °ü¸®¿Í º¸È£¸¦ À§ÇØ °í·ÁÇØ¾ß ÇÒ º¸¾È »çÇ×À» ÀÚ·áºÐ·ù ¹× Á¢±ÙÁ¦¾î, ÀÀ¿ë ÇÁ·Î±×·¥ º¸¾ÈÁ¦¾î, µ¥ÀÌÅͺ£À̽º °ü¸®½Ã½ºÅÛ º¸¾ÈÁ¦¾î ¼¼°¡Áö °üÁ¡¿¡¼ ¾ð±ÞÇÏ¿´À¸¸ç, ºÎ·ÏÀ¸·Î ÀÚ·á º¸¾È ¹æÄ§ ¼ö¸³½Ã ÂüÁ¶ÇÒ ¼ö ÀÖ´Â Á¦¾îµéÀ» ÀÏ¹Ý Á¦¾î¿Í ÀÀ¿ë Á¦¾î·Î ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | This guide describes three views on data security and management which are stored on computer network systems: data category & access control, application program security control, database management system security control. Appendix describes control lists which can be used as a reference of data security policy build-up. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|