보안 정보보호시스템 구축을 위한 실무가이드
2019.03.20 09:52
정보보호시스템 구축을 위한 실무가이드
다운로드 정보보호시스템_구축_실무가이드(배포용).pdf
제 1 장 정보보호사업 개요 ···························1
제 1 절 정보보호사업 정의 ································3
제 2 절 정보보호사업 발주 단계 ·····························7
제 3 절 사업 계획 수립 ·································10
제 2 장 제안요청서 작성 ···························19
제 1 절 제안요청서 개요 ·································21
제 2 절 사전 준비 ····································26
제 3 절 제안요청서 작성 ·································38
가. 사업 개요 ·····································39
나. 현황 및 문제점 ··································43
다. 사업 추진방안 ···································46
라. 제안요청 내용 ···································51
마. 제안서 작성요령 ··································68
바. 제안 안내사항 ···································72
사. 기타 사항 ·····································92
제 4 절 제안요청서 검토 ·································9
제 3 장 사업자 선정 및 계약 ························103
제 1 절 사업 발주 계획 수립 ······························105
제 2 절 제안평가 및 계약 ·······························19
제 4 장 사업 수행 및 검사 ·························121
제 1 절 사업 이행 및 관리 ·······························123
제 2 절 검사 및 종료 ··································125
댓글 0
번호 | 제목 | 날짜 | 조회 수 |
---|---|---|---|
125 | 윈도우용 wget | 2017.09.28 | 4067 |
124 | tcpdump - dump traffic on a network [1] | 2017.10.13 | 4060 |
123 | Tear Drop / Tiny Fragment / Fragment Overlap(고전적인방법) | 2017.10.17 | 9377 |
122 | Smurf Attack / Land Attack / Ping of Death | 2017.10.17 | 1341 |
121 | UDP 플러드 공격 - NTP, DNS, SSDP Amplification DDoS Attack | 2017.10.18 | 1169 |
120 | DDoS 공격도구 | 2017.10.18 | 256 |
119 | 스니핑용 promisc 모드 | 2017.10.29 | 338 |
118 | 사이버 침해사고 대응 절차 | 2017.10.29 | 277 |
117 | 전자서명의 원리 | 2017.10.30 | 220 |
116 | route access-list | 2017.10.30 | 610 |
115 | 블록체인 | 2017.10.31 | 201 |
114 | DDos 공격대응 가이드 - kisa 자료 | 2017.10.31 | 309 |
113 | 시스템보안 | 2017.11.01 | 1351 |
112 | 어플리케이션 보안 | 2017.11.01 | 162 |
111 | 개발보안 | 2017.11.01 | 593 |