Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Ç¥ÁعøÈ£ | TTAK.KO-12.0346 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
Á¦°³Á¤ÀÏ | 2019-06-18 | ÃÑ ÆäÀÌÁö | 15 | ||||||||||||||
ÇÑ±Û Ç¥Áظí | Â÷·® ³»ºÎ ³×Æ®¿öÅ© º¸¾È ¿ä±¸»çÇ× | ||||||||||||||||
¿µ¹® Ç¥Áظí | Security requirements for In-vehicle network | ||||||||||||||||
ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®Çϰí, º¸¾È¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. 5Àý¿¡¼´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÏ´Â ±¸¼º ¿ä¼Ò¿Í ±¸¼º ¿ä¼Ò °£ÀÇ °ü°è, CAN, LIN, FlexRay µîÀÇ Â÷·® ³»ºÎ ³×Æ®¿öÅ© ÇÁ·ÎÅäÄÝ¿¡ ´ëÇØ¼ ¼³¸íÇÑ´Ù. 6Àý¿¡¼´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®Çϰí, º¸¾È ¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ½±°Ô ÆÄ¾ÇÇÒ ¼ö ÀÖµµ·Ï ¸ÅÇÎ Å×À̺íÀ» Á¦°øÇÑ´Ù. | ||||||||||||||||
¿µ¹® ³»¿ë¿ä¾à | The standard analyzes cyber security threats that may occur in the in-vehicle network and derives the security requirements. Chapter 5 explains the relationship between the constituent elements and the constituent elements of the vehicle internal network, and the in-vehicle network protocols such as CAN, LIN, and FlexRay. Chapter 6 analyzes cybersecurity threats that may occur in the in-vehicle network and derives the security requirements. It also provides a mapping table to help you better understand the relationship between cyber security threats and the security requirements. | ||||||||||||||||
°ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
°ü·ÃÆÄÀÏ |
![]() |
||||||||||||||||
Ç¥ÁØÀÌ·Â |
|