보안 정보보호시스템 구축을 위한 실무가이드
2019.03.20 09:52
정보보호시스템 구축을 위한 실무가이드
다운로드 정보보호시스템_구축_실무가이드(배포용).pdf
제 1 장 정보보호사업 개요 ···························1
제 1 절 정보보호사업 정의 ································3
제 2 절 정보보호사업 발주 단계 ·····························7
제 3 절 사업 계획 수립 ·································10
제 2 장 제안요청서 작성 ···························19
제 1 절 제안요청서 개요 ·································21
제 2 절 사전 준비 ····································26
제 3 절 제안요청서 작성 ·································38
가. 사업 개요 ·····································39
나. 현황 및 문제점 ··································43
다. 사업 추진방안 ···································46
라. 제안요청 내용 ···································51
마. 제안서 작성요령 ··································68
바. 제안 안내사항 ···································72
사. 기타 사항 ·····································92
제 4 절 제안요청서 검토 ·································9
제 3 장 사업자 선정 및 계약 ························103
제 1 절 사업 발주 계획 수립 ······························105
제 2 절 제안평가 및 계약 ·······························19
제 4 장 사업 수행 및 검사 ·························121
제 1 절 사업 이행 및 관리 ·······························123
제 2 절 검사 및 종료 ··································125
댓글 0
번호 | 제목 | 날짜 | 조회 수 |
---|---|---|---|
110 | 정보보안 국가기술자격검정 최종합격자 현황 [1] | 2019.03.27 | 199 |
109 | top을 통해 살펴보는 프로세스 정보들 | 2020.03.05 | 210 |
108 | OSI 7 Layer | 2017.11.01 | 214 |
107 | ISAC (정보공유분석센터) | 2018.02.03 | 216 |
106 | http protocol 기본적인 이해 | 2018.04.27 | 217 |
105 | 위험관리 | 2017.11.01 | 218 |
104 | 보안솔류션 | 2017.11.01 | 218 |
103 | DDoS 공격도구 | 2017.10.18 | 221 |
102 | 정보 보안기사 | 2017.08.23 | 222 |
101 | netstat | 2020.02.05 | 233 |
100 | 튜닝 교육 자료 | 2017.08.23 | 234 |
99 | 사이버 침해사고 대응 절차 | 2017.10.29 | 236 |
98 | 개인정보 안전성 확보조치 기준 해설서개인 정보 보호 | 2019.03.20 | 243 |
97 | 국제공통 평가 기준 표준 (CC:Common Criteria) | 2017.11.09 | 248 |
96 | 시스템 개발·운영자를 위한 개인정보보호 가이드라인 | 2019.03.20 | 252 |