Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IT-M3016.2 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑÆäÀÌÁö 20
ÇѱÛÇ¥ÁØ¸í ³×Æ®¿öÅ© °ü¸®¸¦ À§ÇÑ º¸¾È: º¸¾È ¼­ºñ½º
¿µ¹®Ç¥Áظí Security for the management plane: Security services
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº Åë½Å¸Á¿¡¼­ÀÇ Åë½Å Àåºñ ¹× °ü¸® ½Ã½ºÅÛÀ» À§ÇÑ º¸¾È Ãø¸é¿¡¼­ º¸¾È ¼­ºñ½º¸¦ Á¤ÀÇÇÑ´Ù. ¼­ºñ½º´Â ½Ã½ºÅÛ °ü¸®¸¦ À§ÇÑ º¸¾È ¿ä±¸ »çÇ×ÀÎ ½Å¿ø °ËÁõ, Á¢±Ù Á¦¾î, ±ÇÇÑ °ü¸®, µ¥ÀÌÅÍ ±â¹Ð¼º, µ¥ÀÌÅÍ ¹«°á¼º, ÃßÀû °¨»ç, º¸¾È ¾Ë¸² ±â´É¿¡ ´ëÇÑ ¿ä±¸¿¡¼­ µµÃâµÇ¾ú´Ù.

- ÀÎÁõ : ¼­ºñ½º¸¦ ¿ä±¸ÇÏ´Â ÇàÀ§ÀÚ¿¡ ´ëÇÑ ½Å¿ø °ËÁõ
- Á¢±Ù Á¦¾î : Àΰ¡¹ÞÁö ¾ÊÀº »ç¿ëÀÚ¿¡ ´ëÇÑ Á¢±Ù Á¦¾î
- µ¥ÀÌÅÍ ¹«°á¼º/±â¹Ð¼º : ÀúÀåµÈ µ¥ÀÌÅÍ¿¡ ´ëÇÑ ¹«°á¼º ¹× ±â¹Ð¼º º¸Àå
- ºÎÀÎ ¹æÁö : À̺¥Æ®¿¡ ´ëÇÑ Ã¥ÀÓ º¸Àå
- ÃßÀû °¨»ç : ÇàÀ§¿¡ ´ëÇÑ ·Î±× ÀúÀå
- ¾Ë¶÷ º¸°í : ÁöÁ¤µÈ À̺¥Æ®¿¡ ´ëÇÑ ¾Ë¸² ±â´É
¿µ¹®³»¿ë¿ä¾à This Recommendation focuses on the security aspect of management plane for network elements and management system, which are part of the Telecommunication infrastructure. It derives ¡°security service¡± from ¡°service requirements¡± which are verification of identities, controlled access, authorization, data confidentiality, data integrity, audit trail and security alarm.
- Authentication : capabilities to verify the claimed identity of any actor.
- Access control : prevent from gaining access to resources which are
not authorized
- Data confidentiality and integrity : ensure the confidentiality/integrity of
stored data
- Non-repudiation : cannot deny the responsibility
- Audit tail : storing information about activities
- Alarm reporting : generate alarm notifications on selected events
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IT-M3016.2_2010-1147.pdf TTAE.IT-M3016.2_2010-1147.pdf            

ÀÌÀü
¿ÂĨ Ç÷¡½Ã ¸Þ¸ð¸® ÀÎÅÍÆäÀ̽º
´ÙÀ½
Ĩ ¼öÁØ EMC ÃøÁ¤À» À§ÇÑ ±ÙÀå ¾ÈÅ׳ªÀÇ ½ºÅþ÷ ±¸Á¶