Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0232 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2013-12-18 ÃÑÆäÀÌÁö 27
ÇѱÛÇ¥ÁØ¸í ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í¿¡ ´ëÇÑ º¸¾È Áöħ
¿µ¹®Ç¥Áظí The Security Guideline for Financial Hacking Incidents in Smart Phone Device
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀÇ ³»¿ëÀº ´ÙÀ½°ú °°´Ù.

- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· °ø°Ý ±â¼ú
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ °¨¿° È®ÀÎ
- ½º¸¶Æ®Æù ´Ü¸»±âÀÇ ±ÝÀ¶ ÇØÅ· ħÇØ »ç°í º¸¾È ¹æ¹ý
- À̵¿Åë½Å»ç¿¡¼­ Á¦°øÇÏ´Â ÇÇÇØÀÚ º¸»ó ´ëÃ¥ ±âÁØ
- ºÎ·Ï
¿µ¹®³»¿ë¿ä¾à The summary of contents are as below:

- Security violation state of Smart Phone Device
- Financial Program state of Smart Phone Device
- Financial Hacking Incidents Security method of Smart Phone Device
- Victim compensation measures criteria to be provided fromMobile Service Provider
- Appendix
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0232_[3].pdf

ÀÌÀü
C-ITS ¼­ºñ½º¸¦ À§ÇÑ OBU(On-Board Unit)-IVN(In-Vehicle Network)°£ º¸¾È ¿ä±¸»çÇ×
´ÙÀ½
¹ÙÀÌ¿ÀÀÎ½Ä ±â¹Ý ÃâÀÔÅëÁ¦ ½Ã½ºÅÛ°ú À̱âÁ¾ ¹°¸®º¸¾È ½Ã½ºÅÛ »óÈ£¿¬µ¿À» À§ÇÑ API