4.2.5. ?nnU:ud{F.?at 8 n15u:lt'r:00n1:[vnn']:ruv.,lmJ du'?to{nun?l:Jxru.,n{Ua.onnu Lyer ouiqu,11,1n1)u)v r) 1flnr:Lvn?\"flda.tt an:vuLJo?!at]fl11u:vtlJLLasfll:aod61: LJfiu?nntoun iar trauaolunlia:6rrn?rrlrT-uni!aonn\"u finr:nrrqrLouariJ\"u.rivu, erourLavi!:viv]Bnrr{ n1:1{d 15 innr-j:ca.rrid 8 nr:uivr:o'nnr:rvf,nr:rifirfiu?tiorriunmuriunqJaosrriu tonlvuo ruurrJfrrifi nrrudoqndo,r t. desfil r or: n r: rilvY! n r: {[vir-rBnr:mrr,irrfi unr:u61t ruq nr: niriunr':rr tso 27001, rtluon aooaluriruairat.tlvrfi :'rrfi {iElJvrrio.:Ivi tso 27701 nouau0{ norvnn''r:aun'ru , + .J L 11't.ilvFrLe 0 u't.i u o ulj 0.i Lv'lv tu u ttll t 0t't u 51L 1't: n?'luuun.iUa afl fl uft'tu CVE (Common Vutnerabitities and Exposures ) i, a1:auLvtfl110tQa.iiia n:vvlu9tolc!!n'l!n!n't: Lraut0,<n,JdLvlvt]n1:9tl'tnu:JLrJunlfl Lt uSn't1 Lu d;a e :uplu:ult:.r 01{d{nrtdoila C_V_S_5-f)r severity :;6'u 1J5Ut! LqUn5tuvtulJatJa , ir Lvavnoi!-n1t ... ti UtqU q n0U [14!:n1: a'MJflna5't hrgh tun:lJyln:1Un1i a-. aoal:n!tn''tto.i10:.Jattac r.r tn u11lo.: v,! 11iU v1fl L1]Un15!5JtU AU Lt!EO_IO',r L1.rlJn 1: LLn [-lJ14',l riorlv'jvrr rvninlu:s dr :uu:r (drr6rnudara -,--;LV55 1T seventy :UPIU high llxr L!) Lvn:u{n :r unr: iiadriuBnr: -32-
5. ron61id1{A{ 1. \"r,i:v:rtrirvunrrrirurio.rnr:r-l:ztlrurr.ri'ao-15nv:ofinri z5$\" (rg r!u'rul.r 2563) _ ola!fJr 3--0 137 :rt voorurrnur n 120 - 23 Lau 2. \" rJ:v nranrug:hurnrrr:a.rr ur.irtr 6 at,rd tqtzsst 6or nr:rJ:vqurirudaa rd nvr:ainii \" (4 n:n!rn! 2557) :1rnnn1\\rL!nur ui:L 131 oroufiunu tqz r vrir t t - t2 3. \":vtr.t'uu':rrirunr::-nurnrr:.La-lyrr.r:ltnrl (ariur' Z) yt.A.2561 (26 !-quiuu 2561) :rrioorqrrnur rair t35 narfirnu tqg r udr t - g 4. \"rl:ynr6flivvr:xdivr-ardorn:ugfinuacd.!a! udor rror:grunr::hurnrrr:riun.r aoon-oto.lnl: i o-oa'ra'nv:oinri \\.A. ?563\" (26 vt.?,. 2563\\ : rtfiooru rr nur rrir 137 noufirnu 122 r rJ:grrl,.rrua vi124 -30 s. {fior:rn:grunr:inurnrrrriunr!aonfiurornr:rJ:vqrr.irudo6uSnv:ofin;i (fiurnu zsol) niu .iiunlx 'ruLLavleLiur-r nornnrauru a'rfin{tr!a-qn:vvr:r.rdir'arfioun:ugfrouasd-.:nr 6. European Union Agency for Network and lnformation Security (ENISA), Technical guidelines for the imptementation of minimum security measures for Digital Service Providers, December, 2016. .7 ISOAEC 27001:2013, lnformation Technotogy - Security Techniques - lnformation Security Management Systems - Requirements, 2013. 8. ISO/IEC 27002:201,3, lnformation Technotogy - Security Techniques - Code of Practice for lnformation Security Controts, 2013. 9. ISO/IEC 27005:2018, lnformation technotogy - Security techniques - lnformation security risk management, 2018 10. l5o/lEC 27701:2A19, Security techniques - Extension to lSO/|EC 27001 and ISO/IEC 21002 for privacy lnformation management - Requirements and guidelines, 2019. 11. ISO 31000:2018, Risk management - Guidelines,2018 t2. uuurrrrnr:1{6iviala6dryilrj:srynlro - nr:alytvriouuavfiaoiqirsru uard rrro. 19-2561 13. LLuxyr {nri1?i66ri'aloddrrriu:e rrnlyo - nr:Euriusr\"lnl larfr rtoo.20-2561 14. Tom 8., Mike F., Adam P.(2019). Magic Quadrant for Meeting Sotutions. GARTNER Reseorch. lD G00350493. -33-
6. nlar.ru'tn id& nUtl',',t91:6'',tUA',t{ q 01151,!Vt 16 LU:UULVtUU?nnU5gA,iBn',t:5nU1n?',',tu!Un,!UaAOnU9t',',lUd',',t5dUtv6 rso ENISA tso rJxr00. ?!io. I 27001 2770t1 t9 20 I 1. uTu!1un1:r-nulo1'u.rliun{laonn-r.rdruar:aurvro *av a oa ulu!rgnr:d n:ar:iararirurnna 2. nr:liur:l\"oa r :?uv Ylr ri a aa 3. nr:nrlqrnr:rdr6r a aaaa 4. ni:tfl1tvaa!to!a a aa 5. nlidSlinsuriunr aanfiuyrrnrunrruardl*:od'au aa 6. nruriunltj a oofier druiu nr :er\"r riulru tla a 7. nrrrrfiunrlaaer:1u;i,tviur:f;'oar:dora a ao 8. n 15! 5y't i 0-I ft't l [!tmfl ritu.r))Lfl v { n-!F]'t':.Jxtnun iU a a fla u a a o u'tt 0 9.4':uriunrtlaonn-udruar:duwrqto.inr:l3vr:o'nnr: aa a aa tr40.,a.1tlin1't m 0 t1-l 0.l yt'l{ 05 n x I0. n l iui rrt: io n 1: o: r:- rF u rairufuriL#LBnr: -34-
Search