Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0365 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2020-12-10 ÃÑÆäÀÌÁö 18
ÇѱÛÇ¥Áظí Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâ(HSM) º¸¾È ¿ä±¸ »çÇ×
¿µ¹®Ç¥Áظí Security requirements of hardware security module (HSM) for V2X communication
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. 5Àý¿¡¼­´Â Â÷·®¡¤»ç¹° Åë½Å¿ë Çϵå¿þ¾î º¸¾È ¸ðµâÀ» ¼³¸íÇÏ°í, 6Àý¿¡¼­´Â Çϵå¿þ¾î º¸¾È ¸ðµâÀÇ º¸¾È ÀÚ»ê°ú Àڻ꿡 ´ëÇÑ º¸¾È À§ÇùÀ» ½Äº°ÇÏ°í, º¸¾È ¿ä±¸ »çÇ×À» Á¤ÀÇÇÑ´Ù. ¶ÇÇÑ º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ÆľÇÇÒ ¼ö ÀÖ´Â ´ëÀÀ Ç¥¸¦ Á¦°øÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard defines the security requirements to protect the security assets of the hardware security module for V2X communication from threats. Section 5 describes the hardware security module for V2X communication, and Section 6 identifies the security assets and threats to the hardware security module and defines the security requirements. It also provides a mapping table to understand the relationship between cybersecurity threats and security requirements quickly.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0365.pdf TTAK.KO-12.0365.pdf            

ÀÌÀü
Á¤º¸±â¼ú - µ¥ÀÌÅÍ ¿ä¼ÒÀÇ ¸í¼¼¿Í Ç¥ÁØÈ­ - Á¦1ºÎ : µ¥ÀÌÅÍ ¿ä¼ÒÀÇ ¸í¼¼¿Í Ç¥ÁØÈ­¸¦ À§ÇÑ ±âº»Æ²
´ÙÀ½
Á¤º¸±â¼ú - °³¹æÇü ºÐ»ê ó¸® - Æ®·¹À̵ù ±â´É Á¦1ºÎ: ¸í¼¼