IT °Å¹ö³Í½º, ÅëÁ¦, º¸¾È ±×¸®°í º¸Áõ ¾÷°èÀÇ ±Û·Î¹ú ¸®´õ
HOME > Ä¿¹Â´ÏƼ > IT ÅëÁ¦/º¸Áõ Àü¹®¿ë¾î
vulnerability (Ãë¾à¼º)
±Û¾´ÀÌ
:
½ÅÀÎö
³¯Â¥
: 07-05-21 20:10
Á¶È¸
: 4212
̵̧
: 11
Æ®·¢¹é ÁÖ¼Ò
Ãë¾à¼ºÀ̶õ À§ÇùÀ¸·ÎºÎÅÍ ÀÌ¿ëµÉ ¼ö ÀÖ´Â Á¤º¸ ÀÚ¿ø (¾ÖÇø®ÄÉÀ̼Ç, Á¤º¸, ÀÎÇÁ¶ó, Àη µî) ÀÌ Áö´Ñ Ư¼º ¶Ç´Â ¼ºÁúÀ» ¸»ÇÑ´Ù.
¿¹¸¦ µé¸é,
»ç¿ëÀÚÀÇ Áö½Ä ºÎÁ·, º¸¾È ±â´É ºÎÁ·, ¼Åõ¸¥ ÆÐ½º¿öµå ¼±ÅÃ, Å×½ºÆ®µÇÁö ¾ÊÀº ±â¼ú, º¸È£µÇÁö ¾ÊÀº Åë½Å¸ÁÀ¸·Î Àü¼Û µîÀÌ´Ù.
Àǰ߾²±â
À̸§
ÆÐ½º¿öµå
2
6
f
b
5
4
6a0c
¹øÈ£
Á¦¸ñ
±Û¾´ÀÌ
³¯Â¥
Á¶È¸
̵̧
Governance of IT Services (IT ¼ºñ½º °Å¹ö³Í½º)
(25)
½ÅÀÎö
09-05-12
33427
39
¹ø¿ª¾î ¼º¸³°úÁ¤
(16)
½ÅÀÎö
07-03-26
31247
24
75
IT-enabled business investment (IT-enabled ºñÁî´Ï½º ÅõÀÚ)
½ÅÀÎö
07-06-24
5232
2
74
a control deficiency (´ÜÀÏ ÅëÁ¦ ¹ÌºñÁ¡)
(2)
½ÅÀÎö
07-06-20
4201
2
73
IT general control (IT ÀÏ¹Ý ÅëÁ¦)
(1)
½ÅÀÎö
07-06-20
5533
4
72
application control (ÀÀ¿ë ÅëÁ¦, ¾ÖÇø®ÄÉÀÌ¼Ç ÅëÁ¦)
(1)
½ÅÀÎö
07-06-20
5429
1
71
COBIT¡¯s Information Criteria (COBIT¡¯s Á¤º¸ ±âÁØ)
(2)
½ÅÀÎö
07-06-16
4203
1
70
issue (Çö¾È, À̽´)
(1)
½ÅÀÎö
07-06-09
4175
0
69
problem (¹®Á¦, ¹®Á¦Á¡)
½ÅÀÎö
07-06-09
4218
10
68
procedure (ÀýÂ÷)
½ÅÀÎö
07-06-09
4454
1
67
operational risk (¿î¿µ À§Çè)
½ÅÀÎö
07-05-29
4773
4
66
Inherent Limitations (Å»ýÀû ÇѰè)
(1)
½ÅÀÎö
07-05-25
13684
3
65
Accreditation (Àΰ¡)
½ÅÀÎö
07-05-25
4829
10
64
certification (ÀÎÁõ)
½ÅÀÎö
07-05-25
4204
15
63
Deterrent control (¾ïÁ¦ ÅëÁ¦)
½ÅÀÎö
07-05-23
4182
9
62
directive control (ÁöÇâ ÅëÁ¦)
½ÅÀÎö
07-05-23
4463
10
61
vulnerability (Ãë¾à¼º)
½ÅÀÎö
07-05-21
4213
11
1
2
3
4
5
6
7
8
9
10
Á¦¸ñ
³»¿ë
Á¦¸ñ+³»¿ë
ȸ¿ø¾ÆÀ̵ð
ȸ¿ø¾ÆÀ̵ð(ÄÚ)
À̸§
À̸§(ÄÚ)
and
or