ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0205 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑ ÆäÀÌÁö 27
ÇÑ±Û Ç¥Áظí Á¤º¸ º¸È£ °ü¸® ü°è ¹üÀ§ ¼³Á¤ Áöħ
¿µ¹® Ç¥Áظí A Guide for Establishing the Scope of Information Security Management System
ÇÑ±Û ³»¿ë¿ä¾à Á¶Á÷ÀÇ È¿°úÀûÀÎ Á¤º¸ º¸È£ È°µ¿ ¹× ¾÷¹« ¼öÇàÀ» À§Çؼ­´Â ÇØ´ç Á¶Á÷¿¡ ÀûÇÕÇÑ Á¤º¸ º¸È£ °ü¸® ü°è¸¦ ¼ö¸³ÇÏ¿© ¿î¿µÇØ¾ß Çϴµ¥, Á¤º¸ º¸È£ °ü¸® ü°èÀÇ ¹üÀ§¸¦ ¸íÈ®È÷ Á¤ÇÏ´Â °ÍÀº ¹«¾ùº¸´Ù Áß¿äÇÑ ¼±Çà ÀÛ¾÷À̶ó°í ÇÒ ¼ö ÀÖ´Ù.
º» Ç¥ÁØ¿¡¼­´Â Á¶Á÷¿¡¼­ Á¤º¸ º¸È£ °ü¸® ü°èÀÇ ¹üÀ§¸¦ °áÁ¤ÇÒ ¶§ À¯ÀÇÇØ¾ß ÇÒ »çÇ×À» ¼³¸íÇÏ°í, Á¶Á÷Àû, ±â¼úÀû, ¹°¸®Àû Ãø¸éÀ» °ËÅäÇÏ¿© ¹üÀ§¸¦ Á¤ÀÇÇÏ´Â ¹æ¹ýÀ» Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à Effective information security needs information security management system appropriate to the organization. Defining the scope of ISMS is one of the most important tasks for it.
This standard shows matters to be attended to when defining the scope of ISMS and scope definition method reviewing organizational, technical, physical aspects.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2021-12-08
ÆóÁö»çÀ¯ Á¤ºÎ ±â¼ú±âÁØ µîÀÌ °³Á¤
(»õ·Î¿î Á¦µµ µµÀÔ(ISMS-P)¿¡ µû¶ó »ê¾÷°è È°¿ë ÀúÁ¶)
°ü·ÃÆÄÀÏ  TTAK.KO-12.0205_ed15.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Á¤º¸ º¸È£ °ü¸® ü°è ¹üÀ§ ¼³Á¤ Áöħ TTAK.KO-12.0205 2012-12-21 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2016-06-08 À¯Áö -