Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0369 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2021-06-30 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥ÁØ¸í ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ÀÌ¿ëÇÑ ÀüÀÚÃâÀÔ¸íºÎ ±â·Ï ÀýÂ÷
¿µ¹®Ç¥Áظí Digital Entry Logging Procedures Using Beacon-Based Dynamic Authentication Information
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº ½Ã¼³À» ¹æ¹®ÇÏ´Â ÀÌ¿ëÀÚ°¡ ÀÚ½ÅÀÇ ½º¸¶Æ®Æù¿¡¼­ ºñÄÁ ±â¹Ý µ¿Àû ÀÎÁõÁ¤º¸¸¦ ¼ö½ÅÇÏ¿© ¹æ¹® ½Ã¼³ Á¤º¸¸¦ È®ÀÎÇÑ ÈÄ ¹æ¹® ±â·ÏÀ» »ý¼ºÇÏ´Â ºñÄÁ ±â¹Ý ÀüÀÚÃâÀÔ¸íºÎ ½Ã½ºÅÛÀÇ ±â·Ï ÀýÂ÷¸¦ Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ ÀÌ¿Í °ü·ÃÇÏ¿© ¹ß»ýÇÒ ¼ö ÀÖ´Â ÀáÀçÀûÀÎ º¸¾È À§Çù°ú ÀÌ¿¡ ´ëÀÀµÇ´Â º¸¾È ¿ä±¸»çÇ×À» ±â¼úÇÏ°í, º¸¾È ¿ä±¸»çÇ׿¡ ºÎÇÕÇÏ´Â Á¤º¸º¸È£ ¹× °³ÀÎÁ¤º¸º¸È£ °ü¸®Ã¼°è(ISMS-P) ÀÎÁõ±âÁØ Ç׸ñ°úÀÇ ´ëÀÀ °ü°è¸¦ ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines logging procedures of beacon-based digital entry log system which users visiting facilities create entry logs after confirming the facility information on their smart phones by receiving beacon-based dynamic authentication information. In addition, it describes potential security threats that may occur regarding the system and security requirements against those threats. It also describes the relation between the security requirements and the conforming items in the Personal Information & Information Security Management System(ISMS-P) requirements.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0369.pdf TTAK.KO-12.0369.pdf            

ÀÌÀü
ÀÚÀ²ÁÖÇà ÇнÀµ¥ÀÌÅÍ »ý¼º ¼ÒÇÁÆ®¿þ¾îÀÇ µ¥ÀÌÅÍ º¯È¯ ¹× Áõ½Ä Ç°Áú °ËÁõ ÇÁ·Î¼¼½º
´ÙÀ½
µðÁöÅÐ Æ®À©ÀÇ °³³ä ¹× ¼Ó¼º