Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0205 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 27
ÇѱÛÇ¥Áظí Á¤º¸ º¸È£ °ü¸® ü°è ¹üÀ§ ¼³Á¤ Áöħ
¿µ¹®Ç¥Áظí A Guide for Establishing the Scope of Information Security Management System
Çѱ۳»¿ë¿ä¾à Á¶Á÷ÀÇ È¿°úÀûÀÎ Á¤º¸ º¸È£ È°µ¿ ¹× ¾÷¹« ¼öÇàÀ» À§Çؼ­´Â ÇØ´ç Á¶Á÷¿¡ ÀûÇÕÇÑ Á¤º¸ º¸È£ °ü¸® ü°è¸¦ ¼ö¸³ÇÏ¿© ¿î¿µÇØ¾ß Çϴµ¥, Á¤º¸ º¸È£ °ü¸® ü°èÀÇ ¹üÀ§¸¦ ¸íÈ®È÷ Á¤ÇÏ´Â °ÍÀº ¹«¾ùº¸´Ù Áß¿äÇÑ ¼±Çà ÀÛ¾÷À̶ó°í ÇÒ ¼ö ÀÖ´Ù.
º» Ç¥ÁØ¿¡¼­´Â Á¶Á÷¿¡¼­ Á¤º¸ º¸È£ °ü¸® ü°èÀÇ ¹üÀ§¸¦ °áÁ¤ÇÒ ¶§ À¯ÀÇÇØ¾ß ÇÒ »çÇ×À» ¼³¸íÇÏ°í, Á¶Á÷Àû, ±â¼úÀû, ¹°¸®Àû Ãø¸éÀ» °ËÅäÇÏ¿© ¹üÀ§¸¦ Á¤ÀÇÇÏ´Â ¹æ¹ýÀ» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à Effective information security needs information security management system appropriate to the organization. Defining the scope of ISMS is one of the most important tasks for it.
This standard shows matters to be attended to when defining the scope of ISMS and scope definition method reviewing organizational, technical, physical aspects.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0205_ed15.pdf

ÀÌÀü
Â÷·®°£ Åë½Åȯ°æ¿¡¼­ÀÇ ¸Þ½ÃÁö ¾Ïȣȭ ±Ô°Ý
´ÙÀ½
DDoS ´ëÀÀÀåºñ º¸¾È¿ä±¸»çÇ×