Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0346 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2019-06-18 | ÃÑÆäÀÌÁö | 15 |
ÇѱÛÇ¥Áظí | Â÷·® ³»ºÎ ³×Æ®¿öÅ© º¸¾È ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Security requirements for In-vehicle network | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, º¸¾È¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. 5Àý¿¡¼´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÏ´Â ±¸¼º ¿ä¼Ò¿Í ±¸¼º ¿ä¼Ò °£ÀÇ °ü°è, CAN, LIN, FlexRay µîÀÇ Â÷·® ³»ºÎ ³×Æ®¿öÅ© ÇÁ·ÎÅäÄÝ¿¡ ´ëÇؼ ¼³¸íÇÑ´Ù. 6Àý¿¡¼´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, º¸¾È ¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ½±°Ô ÆľÇÇÒ ¼ö ÀÖµµ·Ï ¸ÅÇÎ Å×À̺íÀ» Á¦°øÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard analyzes cyber security threats that may occur in the in-vehicle network and derives the security requirements. Chapter 5 explains the relationship between the constituent elements and the constituent elements of the vehicle internal network, and the in-vehicle network protocols such as CAN, LIN, and FlexRay. Chapter 6 analyzes cybersecurity threats that may occur in the in-vehicle network and derives the security requirements. It also provides a mapping table to help you better understand the relationship between cyber security threats and the security requirements. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0346.pdf |