Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0346 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-06-18 ÃÑÆäÀÌÁö 15
ÇѱÛÇ¥Áظí Â÷·® ³»ºÎ ³×Æ®¿öÅ© º¸¾È ¿ä±¸»çÇ×
¿µ¹®Ç¥Áظí Security requirements for In-vehicle network
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, º¸¾È¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. 5Àý¿¡¼­´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÏ´Â ±¸¼º ¿ä¼Ò¿Í ±¸¼º ¿ä¼Ò °£ÀÇ °ü°è, CAN, LIN, FlexRay µîÀÇ Â÷·® ³»ºÎ ³×Æ®¿öÅ© ÇÁ·ÎÅäÄÝ¿¡ ´ëÇؼ­ ¼³¸íÇÑ´Ù. 6Àý¿¡¼­´Â Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â »çÀ̹ö º¸¾È À§ÇùÀ» ºÐ¼®ÇÏ°í, º¸¾È ¿ä±¸ »çÇ×À» µµÃâÇÑ´Ù. ¶ÇÇÑ »çÀ̹ö º¸¾È À§Çù°ú º¸¾È ¿ä±¸ »çÇ× °£ÀÇ °ü°è¸¦ ½±°Ô ÆľÇÇÒ ¼ö ÀÖµµ·Ï ¸ÅÇÎ Å×À̺íÀ» Á¦°øÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard analyzes cyber security threats that may occur in the in-vehicle network and derives the security requirements. Chapter 5 explains the relationship between the constituent elements and the constituent elements of the vehicle internal network, and the in-vehicle network protocols such as CAN, LIN, and FlexRay. Chapter 6 analyzes cybersecurity threats that may occur in the in-vehicle network and derives the security requirements. It also provides a mapping table to help you better understand the relationship between cyber security threats and the security requirements.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0346.pdf TTAK.KO-12.0346.pdf            

ÀÌÀü
oneM2M - Management Enablement (BBF) v2.2.1
´ÙÀ½
oneM2M - CoAP Protocol Binding v2.6.1