Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAS.KO-12.0031 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2005-12-21 ÃÑÆäÀÌÁö 41
ÇѱÛÇ¥ÁØ¸í ¾ÈÀüÇÑ ¹«¼±·£ »ç¿ëÀ» À§ÇÑ °¡À̵å
¿µ¹®Ç¥Áظí Secure Use Guide for Wireless LAN
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ¹«¼±·£ Ãë¾à¼ºÀ» ÀÌ¿ëÇÏ´Â ¹°¸®ÀûÀÎ ÈѼÕ, ½Ã½ºÅÛ ¹× ³×Æ®¿öÅ© ÇØÅ·°ú ÀÌ·¯ÇÑ °ø°Ý ½Ãµµ Àü´Ü°èÀÇ ÇÊ¿ä Á¤º¸ ¼öÁý¿¡ ´ëÇÑ ³»¿ëÀ» Æ÷ÇÔÇÏ´Â ´Ù¾çÇÑ °ø°Ý À¯ÇüÀ» ¼³¸íÇÑ´Ù.À̾ ¹«¼±·£ ¿î¿µÇöȲ ÆľÇ,Àåºñ ¹× ³×Æ®¿öÅ© °ü¸®, º¸¾ÈÁ¡°Ë µîÀÇ º¸¾È Ãë¾à¼ºÀ» ±Øº¹ÇÏ°í °ø°ÝÀ» ¿¹¹æÇϱâ À§ÇØ ¹«¼±·£ °ü¸®ÀÚ¿Í »ç¿ëÀÚ°¡ ÁؼöÇÏ¿©¾ß ÇÒ Á¤º¸º¸È£°¡À̵带 ¼³¸íÇÑ´Ù. ¸¶Áö¸· ºÎ·ÏÀ¸·Î´Â ±â¾÷¸Á°ú ¼ÒÈ£ ¹× °¡Á¤¿¡¼­ ¹«¼±·£À» È°¿ëÇÒ ¶§, Ãë¾à¼º¿¡ µû¸¥ Á¤º¸º¸È£ °¡À̵带 ¼Õ½±°Ô Àû¿ëÇÒ ¼öÀÖµµ·Ï ¹«¼±·£ Á¤º¸º¸È£ üũ¸®½ºÆ®¸¦ Á¦½ÃÇÏ¿´´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes the relation among Vulnerabilities, Intrusion methods and security guide of Wireless LAN. This standard gives full details of Intrusion methods such as physical breakdown, system or network hacking,denial of services, etc. Then, this provides the security guide for wireless LAN managers and users.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAS.KO-12.0031.pdf
Ç¥ÁØÀÌ·Â
±¸ºÐ ÀÏÀÚ Ç¥ÁعøÈ£ º¯°æ³»¿ª
ÆóÁö 2011-12-21 TTAK.KO-12.0031/R1 ÁÂÃøÇ¥ÁØÀ¸·Î °³Á¤µÇ¾î º» Ç¥ÁØ ÆóÁö
°³Á¤ 2011-12-21 TTAK.KO-12.0031/R1

ÀÌÀü
¾ó±¼ ÀÎ½Ä ¾Ë°í¸®Áò ¼º´É ½ÃÇè ¹æ¹ý
´ÙÀ½
½º¸¶Æ®Ä«µå ±â¹ÝÀÇ ÁöÁ¤¸Æ ÀÎÁõ ¹æ¹ý·Ð