보안 정보보호시스템 구축을 위한 실무가이드
2019.03.20 09:52
정보보호시스템 구축을 위한 실무가이드
다운로드 정보보호시스템_구축_실무가이드(배포용).pdf
제 1 장 정보보호사업 개요 ···························1
제 1 절 정보보호사업 정의 ································3
제 2 절 정보보호사업 발주 단계 ·····························7
제 3 절 사업 계획 수립 ·································10
제 2 장 제안요청서 작성 ···························19
제 1 절 제안요청서 개요 ·································21
제 2 절 사전 준비 ····································26
제 3 절 제안요청서 작성 ·································38
가. 사업 개요 ·····································39
나. 현황 및 문제점 ··································43
다. 사업 추진방안 ···································46
라. 제안요청 내용 ···································51
마. 제안서 작성요령 ··································68
바. 제안 안내사항 ···································72
사. 기타 사항 ·····································92
제 4 절 제안요청서 검토 ·································9
제 3 장 사업자 선정 및 계약 ························103
제 1 절 사업 발주 계획 수립 ······························105
제 2 절 제안평가 및 계약 ·······························19
제 4 장 사업 수행 및 검사 ·························121
제 1 절 사업 이행 및 관리 ·······························123
제 2 절 검사 및 종료 ··································125
댓글 0
번호 | 제목 | 날짜 | 조회 수 |
---|---|---|---|
80 | 쉘쇼크(Shellshock) | 2017.11.07 | 116 |
79 | 접근통제 참조모델 | 2017.11.07 | 143 |
78 | IoT 보안 | 2017.11.08 | 87 |
77 | 정보통신망법 | 2017.11.09 | 97 |
76 | 국제공통 평가 기준 표준 (CC:Common Criteria) | 2017.11.09 | 248 |
75 | 전자서명법 - 공인인증서 | 2017.11.09 | 103 |
74 | /etc/xinetd.conf 설정 값 | 2017.11.09 | 114 |
73 | 개인정보 보호법 | 2017.11.09 | 96 |
72 | 포렌식 복사 도구 – forecopy_handy | 2017.11.11 | 592 |
71 | 개인정보 피해방지 10계명 | 2017.12.29 | 154 |
70 | [리눅스] 다른 서버에 있는 파일 가져오기(SCP 이용) | 2018.01.25 | 346 |
69 | ISAC (정보공유분석센터) | 2018.02.03 | 216 |
68 | HP-UX 보안가이드라인 | 2018.02.14 | 944 |
67 | Linux 보안및 성능향상을 위한 sysctl.conf 설정 | 2018.02.20 | 3974 |
66 | HPUX Trust Mode | 2018.02.21 | 1052 |