ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0384 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2022-06-29 ÃÑ ÆäÀÌÁö 20
ÇÑ±Û Ç¥Áظí Ãë¾àÁ¡ ŽÁö ¹× ÇØ°áÀ» À§ÇÑ ±¸Á¶È­µÈ ¼ÒÇÁÆ®¿þ¾î Ãë¾àÁ¡ µ¥ÀÌÅͺ£À̽º Á¤º¸ Ç¥Çö ±Ô°Ý
¿µ¹® Ç¥Áظí Structured Software Vulnerability Database Information Expression for Vulnerability Detection and Resolution
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº ¼Ò½ºÄÚµå ·¹º§¿¡¼­ ¹ß»ýÇÏ´Â Ãë¾àÁ¡ÀÇ Å½Áö ¹× ÇØ°áÀ» À§ÇÑ ±¸Á¶È­µÈ Ãë¾àÁ¡Á¤º¸ Ç¥Çö ±Ô°ÝÀ» Á¤ÀÇÇÑ´Ù. ÇöÀçÀÇ ¼ÒÇÁÆ®¿þ¾î Ãë¾àÁ¡ µ¥ÀÌÅͺ£À̽º°¡ Á¦°øÇÏ´Â Á¤º¸µéÀº Ãë¾àÁ¡À¸·Î ÀÎÇØ ¹ß»ýÇÏ´Â º¸¾È À§ÇùÀ» ŽÁö ¹× ÇØ°áÇϴµ¥ µµ¿òÀÌ µÇ´Â Á¤º¸µéÀ» Àϰü¼º ÀÖ°Ô Á¦°øÇØÁÖÁö ¾Ê´Â´Ù. µû¶ó¼­ ¼ÒÇÁÆ®¿þ¾î Ãë¾àÁ¡À¸·Î ÀÎÇØ ¹ß»ýÇÒ ¼ö ÀÖ´Â º¸¾È À§ÇùÀ» ¿ÏÈ­Çϴµ¥ È¿À²ÀûÀÎ Á¤º¸µé, Áï Ãë¾àÁ¡ ŽÁö ¹× ÇØ°á¿¡ ½ÇÁúÀûÀ¸·Î Ȱ¿ëµÉ ¼ö ÀÖ´Â Á¤º¸µéÀÌ Àϰü¼º ÀÖ°Ô Á¦°øµÉ ¼ö ÀÖµµ·Ï ±¸Á¶È­µÈ Á¤º¸ Ç¥Çö ±Ô°ÝÀ» Á¦¾ÈÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard expresses the structured information of software vulnerability data bases for vulnerability detection and resolution. Current software vulnerability databases do not consistently provide information to address security threats caused by software vulnerabilities. This standard provides a structured information expression that is effective in addressing security threats caused by vulnerabilities.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0384.pdf TTAK.KO-12.0384.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Ãë¾àÁ¡ ŽÁö ¹× ÇØ°áÀ» À§ÇÑ ±¸Á¶È­µÈ ¼ÒÇÁÆ®¿þ¾î Ãë¾àÁ¡ µ¥ÀÌÅͺ£À̽º Á¤º¸ Ç¥Çö ±Ô°Ý TTAK.KO-12.0384 2022-06-29 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0384.pdf