Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0390 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2022-12-07 ÃÑÆäÀÌÁö 28
ÇѱÛÇ¥ÁØ¸í ¸ð¹ÙÀÏÆ÷·»½ÄÀ̹ÌÁö Á¦ÀÛ ÀýÂ÷
¿µ¹®Ç¥Áظí Production Process of Mobile Forensic Image
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ¸ð¹ÙÀÏÆ÷·»½ÄÀ̹ÌÁö Á¦ÀÛ ÀýÂ÷¿¡ °üÇÏ¿© ÃÑ 3´Ü°è 13°³ ÀýÂ÷¸¦ Á¦½ÃÇÏ¿´´Ù. 1Àý¿¡¼­ 4ÀýÀº Àû¿ë ¹üÀ§, Àοë Ç¥ÁØ, ¿ë¾î Á¤ÀÇ, ¾à¾î µîÀ» ¼­¼úÇÏ¿´°í, 5Àý¿¡¼­ ¸ð¹ÙÀÏÆ÷·»½ÄÀ̹ÌÁö¿¡ ´ëÇÑ °³³ä, Á¦ÀÛ¸ñÀû, Á¦ÀÛ´Ü°è µî ¹è°æ Áö½ÄÀ» °ËÅäÇÏ¿´´Ù. 6ÀýºÎÅÍ 8Àý±îÁö ¸ð¹ÙÀÏÆ÷·»½ÄÀ̹ÌÁö Á¦ÀÛ ÀýÂ÷·Î ÀÇ·ÚÀÚÀÇ ¿ä±¸»çÇ×À» ±â¹ÝÀ¸·Î ½Ã³ª¸®¿À, ºÐ¼®±â¹ýÀ» ¼±Á¤ÇÑ ÈÄ °ËÅäÇÏ´Â ±âȹ ´Ü°è, ½Ã³ª¸®¿À ¼öÇà¿¡ »ç¿ëµÇ´Â °¡»óÁ¤º¸¸¦ Á¦ÀÛÇÏ°í ¾ÆƼÆÑÆ®¸¦ »ý¼ºÇÏ´Â °³¹ß ´Ü°è, Á¦ÀÛµÈ ¸ð¹ÙÀÏÆ÷·»½ÄÀ̹ÌÁöÀÇ Á¤È®¼º°ú ¿Ï¼ºµµ¸¦ È®ÀÎÇÏ°í Æò°¡ÇÏ´Â °ËÁõ ´Ü°è¸¦ ¼Ò°³ÇÏ¿´´Ù. Áï, 6ÀýÀº ±âȹ ´Ü°è·Î ¨ç ¼³°è¹æÇâ ¼ö¸³, ¨è ½Ã³ª¸®¿À ¼³°è, ¨é ºÐ¼®±â¹ý ¼±Á¤ ¨ê °¡»óÁ¤º¸ ¼³°è, ¨ë ¹ýÀûÀïÁ¡ ÆÇ´Ü µî 5´Ü°è·Î ±¸¼ºÇÏ¿´´Ù. 7ÀýÀº °³¹ß ´Ü°è·Î ¨ç °¡»óÁ¤º¸ Á¦ÀÛ, ¨è µð¹ÙÀ̽º ȯ°æ¼³Á¤, ¨é ¾ÆƼÆÑÆ® »ý¼º, ¨ê À̹ÌÁö »ý¼º µî 4´Ü°è·Î ±¸¼ºÇÏ¿´´Ù. 8ÀýÀº °ËÁõ´Ü°è·Î ¨ç üũ¸®½ºÆ® ÀÛ¼º, ¨è ³»ºÎ°ËÁõ, ¨é ¿ÜºÎ°ËÁõ, ¨ê ÀûºÎÆÇÁ¤ µî 4´Ü°è·Î ±¸¼ºÇÏ¿´´Ù.
¿µ¹®³»¿ë¿ä¾à This standard suggest 3 stages 13 steps in the production process of Mobile Forensic Image(MFI). Sections 1 through 4 describe the scope of application, citation standards, terminology definitions, and abbreviations, and in Section 5, background knowledge such as the concept of mobile forensic image, production purpose, and production stage was reviewed. Sections 6 through 8 introduced scenarios based on the client's requirements, planning stages to select and review analysis techniques, development stages to produce virtual information and create artifacts, and verification stages to check and evaluate the accuracy and completeness of the produced mobile forensic images. That is, Section 6, as the planning process, consists of 5 steps: a. Establishment of design principles, b. Scenario design, c. Selection of analysis techniques, d. Virtual Information Design, and e. Judgment of legal issues. In Section 7, the development process is 4 steps: a. Creating virtual information, b. Device configuration, c. Creating artifacts, d. Imaging. In Section 8, the verifiction process is 4 steps: a. Making checking list, b. Internal verification, c. External verification, d. Conformity assessment.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0390.pdf TTAK.KO-12.0390.pdf            

ÀÌÀü
oneM2M - Management Enablement (BBF) v2.2.1
´ÙÀ½
oneM2M - CoAP Protocol Binding v2.6.1