Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0155 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2010-12-23 ÃÑÆäÀÌÁö 21
ÇѱÛÇ¥Áظí Á¶Á÷¿¡¼­ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ º¸¾È Áöħ
¿µ¹®Ç¥Áظí Security Guidelines for Personal Mobile Devices in Organizations
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº Á¶Á÷(ȸ»ç, ´Üü, ±â°ü)¿¡¼­ÀÇ °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» ¾÷¹«¿¡ »ç¿ëÇÒ ¶§ ÇÊ¿äÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù. ÀÌ·¯ÇÑ º¸¾È ÁöħÀ» Á¤ÀÇÇϱâ À§ÇØ ÇöÀç »ç¿ëÇÏ°í ÀÖ´Â °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»ÀÇ °³¿ä¸¦ ¼³¸íÇÏ°í, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷¿¡¼­ »ç¿ëÇϴµ¥ À־ÀÇ º¸¾È ±â¼úÀ» Á¦½ÃÇÑ´Ù. ƯÈ÷, °³ÀÎ ¸ð¹ÙÀÏ ´Ü¸»À» Á¶Á÷ ¾÷¹«¿¡ »ç¿ëÇÏ´Â µ¥ À־ÀÇ º¸¾È À§Çù°ú ±â¼úÀûÀÎ À§Ç輺À» Á¤¸®ÇÏ°í, ÀÌ·¯ÇÑ º¸¾È À§ÇùµéÀ» ¿ÏÈ­ÇÏ°í °¨¼Ò½ÃÅ°±â À§ÇÑ º¸¾È ÁöħÀ» ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard describes security guidelines for using Personal Mobile Devices in the organization such as company, institute, government agency, etc. to work. This document explains an overview of the mobile terminal, and proposes security technology at an organization to use mobile personal terminals. In particular, this document describes technical risks and security threats for using a mobile personal device in the organization of business, and it defines security guidelines to lesson those security threats and security vulnerabilities.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0155.pdf TTAK.KO-12.0155.pdf            

ÀÌÀü
½ºÄÉÀÏ·¯ºí ºñµð¿À ÄÚµù ±â¹Ý ¹Ìµð¾î º¸¾È ÇÁ·¹ÀÓ¿öÅ©
´ÙÀ½
¾ó±¼ ÀÎ½Ä ½Ã½ºÅÛ ½Ã³ª¸®¿À ±â¹Ý ¼º´É ½ÃÇè ¹æ¹ý