Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0105 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2009-12-22 ÃÑÆäÀÌÁö 17
ÇѱÛÇ¥ÁØ¸í °³ÀÎÁ¤º¸º¸È£¸¦ À§ÇÑ DB º¸¾È°¨»ç ·Î±×
¿µ¹®Ç¥Áظí Database Security Audit Log for Protection of Personally Identifiable Information
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº IT¼­ºñ½º Á¦°øÀÚ°¡ ¼öÁý․°ü¸®ÇÏ´Â »ç¿ëÀÚ °³ÀÎÁ¤º¸ Áß, ¾ÈÀüÇÑ ÀúÀå․°ü¸®°¡ ¿ä±¸µÇ´Â ÁÖ¿ä °³ÀÎÁ¤º¸ Ç׸ñÀ» Á¦½ÃÇÑ´Ù. ¶ÇÇÑ, Á¦½ÃµÈ °³ÀÎÁ¤º¸ Ç׸ñÀ» ÀúÀå․°ü¸®ÇÏ´Â µ¥ÀÌÅͺ£À̽º ½Ã½ºÅÛ¿¡¼­ »ý¼ºÇÏ°í °ü¸®ÇؾßÇÏ´Â º¸¾È°¨»ç ·Î±× Ç׸ñÀ» µµÃâÇÑ´Ù. ´Ù¸¸, °¢ Ç׸ñÀÇ Á߿伺 µî¿¡ µû¶ó ÇʼöÇ׸ñ°ú ¼±ÅÃÇ׸ñÀ¸·Î ³ª´©¾î Á¦½ÃÇÑ´Ù. Ãß°¡ÀûÀ¸·Î DBº¸¾È°¨»ç ·Î±×Ç׸ñ¿¡ ´ëÇÑ ±â¼úÀû, °ü¸®Àû º¸¾È¿ä±¸»çÇ×À» Á¦°øÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard defines the configuration of the database security audit log for the protection of the PII (PPII), and presents the technical and administrative requirements. The components of the database security log present the audit log item and the general information to be added according to four phases, namely: collection, storage and management, use and provisioning, and destruction of the PII. In addition, the components describe the technical and administrative security requirements of the database security audit log, in order to apply the database for secure management of the PII.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0105.pdf TTAK.KO-12.0105.pdf            

ÀÌÀü
ºÎ°¡Çü ÀüÀÚ¼­¸í ¹æ½Ä Ç¥ÁØ-Á¦3ºÎ : Ÿ¿ø°î¼±À» ÀÌ¿ëÇÑ ÀÎÁõ¼­ ±â¹Ý ÀüÀÚ¼­¸í ¾Ë°í¸®Áò
´ÙÀ½
CORBA를 위한 개방형 GIS 인터페이스 표준;단순 지형지물 사양