보안 정보보호시스템 구축을 위한 실무가이드
2019.03.20 09:52
정보보호시스템 구축을 위한 실무가이드
다운로드 정보보호시스템_구축_실무가이드(배포용).pdf
제 1 장 정보보호사업 개요 ···························1
제 1 절 정보보호사업 정의 ································3
제 2 절 정보보호사업 발주 단계 ·····························7
제 3 절 사업 계획 수립 ·································10
제 2 장 제안요청서 작성 ···························19
제 1 절 제안요청서 개요 ·································21
제 2 절 사전 준비 ····································26
제 3 절 제안요청서 작성 ·································38
가. 사업 개요 ·····································39
나. 현황 및 문제점 ··································43
다. 사업 추진방안 ···································46
라. 제안요청 내용 ···································51
마. 제안서 작성요령 ··································68
바. 제안 안내사항 ···································72
사. 기타 사항 ·····································92
제 4 절 제안요청서 검토 ·································9
제 3 장 사업자 선정 및 계약 ························103
제 1 절 사업 발주 계획 수립 ······························105
제 2 절 제안평가 및 계약 ·······························19
제 4 장 사업 수행 및 검사 ·························121
제 1 절 사업 이행 및 관리 ·······························123
제 2 절 검사 및 종료 ··································125
댓글 0
번호 | 제목 | 날짜 | 조회 수 |
---|---|---|---|
80 | BroadCast 주소 | 2018.04.03 | 442 |
79 | tcp 상태 전이도 | 2017.08.24 | 449 |
78 | 주요정보통신기반시설 기술적 취약점 분석 평가 상세 가이드 | 2019.03.20 | 452 |
77 | 보안점검 툴 | 2017.08.25 | 456 |
76 | Vtl quick start guide | 2017.08.23 | 461 |
75 | Oracle asm | 2017.08.24 | 494 |
74 | HPUX 보안설정 가이드 | 2017.08.25 | 503 |
73 | uptime 갑인가? | 2017.09.13 | 510 |
72 | [python] MySQL 사용법 예제 | 2018.10.24 | 523 |
71 | ftp 보안 취약점및 대책 | 2017.11.05 | 538 |
70 | SUN 솔라리스 보안취약점 조치 방안 | 2018.03.05 | 546 |
69 | Process Explorer - 윈도우용 프로세서, 메모리, TCP 모니터링용 | 2017.09.09 | 548 |
68 | 개발보안 | 2017.11.01 | 563 |
67 | HTTP Status Code HTTP 상태 코드 | 2018.05.03 | 573 |
66 | BCP | 2017.11.01 | 589 |