ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0365 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-12-10 ÃÑ ÆäÀÌÁö 18
ÇÑ±Û Ç¥Áظí Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) º¸¾È ¿ä±¸ »çÇ×
¿µ¹® Ç¥Áظí Security requirements of hardware security module (HSM) for V2X communication
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. 5Àý¿¡¼­´Â Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀ» ¼³¸íÇϰí, 6Àý¿¡¼­´Â Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ÀÚ»ê°ú Àڻ꿡 ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°Çϰí, º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ÆÄ¾ÇÇÒ ¼ö ÀÖ´Â ´ëÀÀ Ç¥¸¦ Á¦°øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard defines the security requirements to protect the security assets of the hardware security module for V2X communication from threats. Section 5 describes the hardware security module for V2X communication, and Section 6 identifies the security assets and threats to the hardware security module and defines the security requirements. It also provides a mapping table to understand the relationship between cybersecurity threats and security requirements quickly.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0365.pdf TTAK.KO-12.0365.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) º¸¾È ¿ä±¸ »çÇ× TTAK.KO-12.0365 2020-12-10 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0365.pdf