본문 바로가기
IT 와 Social 이야기

[미래창조과학부] 사물인터넷 소형 스마트 홈 가전 보안 가이드 - 기업용

by manga0713 2017. 1. 10.

 

제1장 개요 ··························································································· 1
1. 필요성 및 목적 ························································································································ 2
2. 보안 가이드 대상 선정 ·········································································································· 2
3. 가이드 목적 및 구성 ·············································································································· 3
제2장 스마트 홈·가전 보안 위협 ···················································· 4
1. 웹 인터페이스, 인증/허가 보안위협 ···················································································· 5
2. 네트워크 서비스 보안위협 ···································································································· 6
3. 모바일 앱 보안위협 ················································································································ 7
4. 펌웨어/업데이트/물리적 보안위협 ······················································································· 7
제3장 스마트 홈·가전 보안 가이드 ················································ 9
제4장 보안 가이드 항목 해설서 ··················································· 13
1. 웹 인터페이스 보안 ·············································································································· 14
2. 인증/허가 보안 ······················································································································· 15
3. 네트워크 서비스 보안 ·········································································································· 20
4. 모바일 앱 보안 ······················································································································ 22
5. 펌웨어 보안 ···························································································································· 24
6. 업데이트 보안 ························································································································ 27
7. 물리적 보안 ···························································································································· 29

 

 

문서받기: 시큐리티플러스