Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0368 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-12-10 ÃÑÆäÀÌÁö 38
ÇѱÛÇ¥ÁØ¸í ºÐ»ê¿øÀå½Ã½ºÅÛÀ» À§ÇÑ º¸¾È±â´É ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Security functional requirements for distributed ledger systems
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº ÀÌ¿ëÀÚ ¾ÖÇø®ÄÉÀ̼ÇÀ» ¿î¿µÇÏ´Â ºÐ»ê¿øÀå½Ã½ºÅÛ¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â ÀÌ¿ëÀÚ ÀÍ¸í¼º, ¼ÒÇÁÆ®¿þ¾î À§‧º¯Á¶, ¾ÏȣŰ À¯Ãâ, ºñÀΰ¡µÈ Á¢±Ù, µ¥ÀÌÅÍ À¯Ãâ ¹× À§‧º¯Á¶, ½Ã½ºÅÛ Àå¾Ö, °¨»ç ±â·Ï ¼Õ½Ç µî º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í, ÀÌ¿¡ ´ëÀÀÇÒ ¼ö ÀÖ´Â ½Äº° ¹× ÀÎÁõ, º¸¾È °¨»ç, Åë½Å º¸È£, ¾ÏÈ£ ÅëÁ¦, Á¢±Ù ÅëÁ¦, °³ÀÎÁ¤º¸ º¸È£, µ¥ÀÌÅÍ º¸È£, ÀÚ¿ø °¡¿ë¼º µî º¸¾È±â´É ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard identifies security threats (such as user anonymity, software tampering, crypto-key leakage, unauthorized access, data leakage and tampering, system failure, audit log loss, etc.) that can occur in a distributed ledger system running user applications and defines security functional requirements such as identification and authentication, security audit, communication protection, cryptography control, access control, privacy protection, data protection, and resource availability against security threats identified.
±¹Á¦Ç¥ÁØ -
°ü·ÃÆÄÀÏ TTAK.KO-12.0368.pdf TTAK.KO-12.0368.pdf            

ÀÌÀü
ºòµ¥ÀÌÅÍ À¯Åë Ç÷§Æû - µ¥ÀÌÅÍÀÇ °Å·¡¸¦ À§ÇÑ °¡°Ý »êÁ¤ º¯¼ö
´ÙÀ½
ºòµ¥ÀÌÅÍ À¯Åë Ç÷§Æû - ¾È½É±¸¿ª ¼­ºñ½º ¿ä±¸»çÇ×