ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0346 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-06-18 ÃÑ ÆäÀÌÁö 15
ÇÑ±Û Ç¥Áظí Â÷·® ³»ºÎ ³×Æ®¿öÅ© º¸¾È ¿ä±¸»çÇ×
¿µ¹® Ç¥Áظí Security requirements for In-vehicle network
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®Çϰí, º¸¾È¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. 5Àý¿¡¼­´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÏ´Â ±¸¼º ¿ä¼Ò¿Í ±¸¼º ¿ä¼Ò °£ÀÇ °ü°è, CAN, LIN, FlexRay µîÀÇ Â÷·® ³»ºÎ ³×Æ®¿öÅ© ÇÁ·ÎÅäÄÝ¿¡ ´ëÇØ¼­ ¼³¸íÇÑ´Ù. 6Àý¿¡¼­´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®Çϰí, º¸¾È ¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ½±°Ô ÆÄ¾ÇÇÒ ¼ö ÀÖµµ·Ï ¸ÅÇÎ Å×À̺íÀ» Á¦°øÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard analyzes cyber security threats that may occur in the in-vehicle network and derives the security requirements. Chapter 5 explains the relationship between the constituent elements and the constituent elements of the vehicle internal network, and the in-vehicle network protocols such as CAN, LIN, and FlexRay. Chapter 6 analyzes cybersecurity threats that may occur in the in-vehicle network and derives the security requirements. It also provides a mapping table to help you better understand the relationship between cyber security threats and the security requirements.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0346.pdf TTAK.KO-12.0346.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
Â÷·® ³»ºÎ ³×Æ®¿öÅ© º¸¾È ¿ä±¸»çÇ× TTAK.KO-12.0346 2019-06-18 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0346.pdf