Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0369 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2021-06-30 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥ÁØ¸í ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ÀÌ¿ëÇÑ ÀüÀÚÃâÀÔ¸íºÎ ±â·Ï ÀýÂ÷
¿µ¹®Ç¥Áظí Digital Entry Logging Procedures Using Beacon-Based Dynamic Authentication Information
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ½Ã¼³À» ¹æ¹®ÇÏ´Â ÀÌ¿ëÀÚ°¡ ÀÚ½ÅÀÇ ½º¸¶Æ®Æù¿¡¼­ ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ¼ö½ÅÇÏ¿© ¹æ¹® ½Ã¼³ Á¤º¸¸¦ È®ÀÎÇÑ ÈÄ ¹æ¹® ±â·ÏÀ» »ý¼ºÇÏ´Â ºñÄÁ ±â¹Ý ÀüÀÚÃâÀÔ¸íºÎ ½Ã½ºÅÛÀÇ ±â·Ï ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀÌ¿Í °ü·ÃÇÏ¿© ¹ß»ýÇÒ ¼ö ÀÖ´Â ÀáÀçÀûÀÎ º¸¾È À§Çù°ú ÀÌ¿¡ ´ëÀÀµÇ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÏ°í, º¸¾È ¿ä±¸»çÇ׿¡ ºÎÇÕÇÏ´Â Á¤º¸º¸È£ ¹× °³ÀÎÁ¤º¸º¸È£ °ü¸®Ã¼°è(ISMS-P) ÀÎÁõ±âÁØ Ç׸ñ°úÀÇ ´ëÀÀ °ü°è¸¦ ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines logging procedures of beacon-based digital entry log system which users visiting facilities create entry logs after confirming the facility information on their smart phones by receiving beacon-based dynamic authentication information. In addition, it describes potential security threats that may occur regarding the system and security requirements against those threats. It also describes the relation between the security requirements and the conforming items in the Personal Information & Information Security Management System(ISMS-P) requirements.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0369.pdf TTAK.KO-12.0369.pdf            

ÀÌÀü
Åë½Å ¼­ºñ½º Á¦°øÀÚ¸¦ À§ÇÑ ºñ½Äº° ÇÁ·Î¼¼½º ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
¾Ç¼ºÄÚµå ÅëÇÕÁø´Ü¸í »ý¼ºÀýÂ÷ ¹× ¿ä±¸»çÇ×