Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0365 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-12-10 ÃÑÆäÀÌÁö 18
ÇѱÛÇ¥Áظí Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) º¸¾È ¿ä±¸ »çÇ×
¿µ¹®Ç¥Áظí Security requirements of hardware security module (HSM) for V2X communication
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. 5Àý¿¡¼­´Â Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀ» ¼³¸íÇÏ°í, 6Àý¿¡¼­´Â Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ÀÚ»ê°ú Àڻ꿡 ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í, º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ÆľÇÇÒ ¼ö ÀÖ´Â ´ëÀÀ Ç¥¸¦ Á¦°øÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines the security requirements to protect the security assets of the hardware security module for V2X communication from threats. Section 5 describes the hardware security module for V2X communication, and Section 6 identifies the security assets and threats to the hardware security module and defines the security requirements. It also provides a mapping table to understand the relationship between cybersecurity threats and security requirements quickly.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0365.pdf TTAK.KO-12.0365.pdf            

ÀÌÀü
°ø°£Á¤º¸ ±â¹ÝÀÇ ±³Â÷ µµ¸ÞÀÎ ¿ë¾î ¸ÅÇÎ - Á¦2ºÎ: ±³ÅëÁ¤º¸
´ÙÀ½
Á¤¹Ð¹ö½ºÀ§Ä¡Á¤º¸ ¼­ºñ½º – Á¦2ºÎ: Á¤º¸ ÀÎÅÍÆäÀ̽º