Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å±â¼úº¸°í¼(TTAR) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAR-06.0111 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2012-05-23 | ÃÑ ÆäÀÌÁö | 0 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | M2M ¼ºñ½º º¸¾È À§Çù°ú ¿ä±¸»çÇ× (±â¼úº¸°í¼) | ||||||||||||||||
¿µ¹® Ç¥Áظí | M2M Security threats and requirements | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | M2M ³×Æ®¿öÅ©´Â ´Ù¾çÇÑ ³×Æ®¿öÅ© ±â¼ú°ú µð¹ÙÀ̽ºµé·Î ±¸¼ºµÇ¾î ½º¸¶Æ® ±×¸®µå, ÅÚ ·¹¸Åƽ½º µîÀÇ ¼ºñ½º¸¦ Á¦°øÇÑ´Ù. µû¶ó¼ M2M ³×Æ®¿öÅ©´Â ´Ù¾çÇÑ ³×Æ®¿öÅ© ±â¼úµé°ú µð¹ÙÀ̽ºµéÀÇ º¸¾È Ãë¾à¼ºÀÌ Á¸ÀçÇÏ°Ô µÈ´Ù. ¶ÇÇÑ »ó´ëÀûÀ¸·Î º¸¾ÈÀÌ Ãë¾àÇÑ ¹°¸®Àû À§ Ä¡¿¡ ¹èÄ¡µÉ ¼ö ÀÖÀ½¿¡µµ ºÒ±¸ÇÏ°í ¼ºñ½º ÅëÇÕ, °³¹ßÀÇ ¿ëÀ̼º µîÀÇ ÀÌÀ¯·Î °³¹æÇü ÀÎ ÅÍÆäÀ̽º¸¦ °¡Áø Ç÷§ÆûÀ¸·Î ±¸ÇöµÇ¾î ÀÌ·Î ÀÎÇÑ º¸¾È À§ÇùÀÌ ¹ß»ýÇÑ´Ù. µû¶ó¼ º» ±â¼ú º¸°í¼´Â M2M ³×Æ®¿öÅ© ±â¼ú ¹× ¼ºñ½º¿¡¼ ¹ß»ý °¡´ÉÇÑ º¸¾È À§ÇùÀ» ºÐ¼®, ºÐ·ùÇÏ°í º¸¾È À§Çùµé·ÎºÎÅÍ º¸¾È °ü·Ã ¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | M2M network consists of a variety of network technologies and devices, smart grid and telematics services. Thus, M2M network have their vulnerability of security of network technologies and devices. Relatively, Device is to be placed on the vulnerable physical location despite Services integration, open interfaces for reasons such as ease of development with the platform has been implemented resulting security threat occurs. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|
||||||||||||||||
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â |
|