Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0203 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 30
ÇѱÛÇ¥ÁØ¸í ±â¾÷ ¹«¼± ·£ ȯ°æ¿¡¼­ À§Çù ¹æÁö¸¦ À§ÇÑ º¸¾È ±â´É ¿ä±¸ »çÇ×
¿µ¹®Ç¥Áظí Functional Requirements for Threat Prevention in Business WLAN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ±â¾÷ ¹«¼± ·£ ȯ°æ¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, ¹«¼± º¸¾È ½Ã½ºÅÛµéÀÌ »óÈ£ Çù·ÂÇÏ¿© ´Ù¾çÇÑ À§ÇùÀ» ŽÁöÇÏ°í ¹æ¾îÇÒ ¼ö ÀÖ´Â À§Çù ¹æÁö ±â´É ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. ¹«¼± À§Çù ¹æÁö ±â´É ¿ä±¸ »çÇ×À» Å©°Ô »ç¿ëÀÚ/½Ã½ºÅÛ ÀÎÁõ, ¾ÈÀüÇÑ Á¤º¸ Àü´Þ, ¹«¼± °ø°Ý ŽÁö, ¹«¼± °ø°Ý ´ëÀÀ, º¸¾È °ü¸®, º¸¾È °¨»ç ÃßÀû, ±×¸®°í º¸¾È Á¤º¸ °øÀ¯ ±â´É ºÐ·ùÇÏ¿© Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard analyzes security threats that may occur in business WLAN and defines functional requirements for detecting and preventing various kinds of threats through cooperation among wireless security system. The functional requirements are classified into user/system authentication, safe information delivery, wireless attack detection, wireless attack reaction, security management, security audit trail, and security information sharing functions.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0203.pdf TTAK.KO-12.0203.pdf            

ÀÌÀü
ÀÚ¿ø¿¹¾àÇÁ·ÎÅäÄÝ(RSVP) Áø´Ü¸Þ½ÃÁö
´ÙÀ½
¸ÖƼÇÁ·ÎÅäÄÝ ·¹ÀÌºí ±³È¯ ±¸Á¶