As cybersecurity verification and validation is required by ISO/SAE 21434 and UN R155, having an understanding of both is essential. In this video course, you will learn the difference between verification and validation, as well as get an overview of V&V methods. Additionally, you will also learn which needs should be covered in a V&V strategy. Verification and validation methods, otherwise known as V&V, have been present in automotive for decades to ensure the product indeed fulfills the requirement and the approach is the right one. But today, cybersecurity needs to also be embedded here as required by ISO/SAE 21434 and UN R155. Therefore, in this “Cybersecurity verification and validation” video course, we will explain V&V methods in the context of automotive cybersecurity. First, we will highlight the importance of verification and validation in automotive cybersecurity. Then, to gain a common understanding, we will define the differences between validation and verification and provide a practical example to make the distinction clear. Second, we will give you an overview of available verification and validation methods, besides testing, such as review, analysis, and simulations. We will also provide clear examples for each of the presented V&V methods. Third, you will learn how you can reuse existing traditional V&V methods by merging them with new methods specific to cybersecurity. Moreover, you will learn why including cybersecurity in the V&V strategy is necessary to ensure systems are meeting requirements. At last, we will provide you with some questions derived from ASPICE, which should be considered in the V&V strategy and make you aware of how cybersecurity impacts your V&V approach. In order to ensure the product is indeed fulfilling its requirements, there is no failure, and also that it fulfills its objective; verification and validation is required. Therefore, in this video course, you will learn how to reuse already existing methods in automotive and combine them with new methods to make them relevant for automotive cybersecurity. As the professional involved in building and protecting systems, it is important to have an understanding of the cybersecurity verification and validation methods. This enables you to be aware of and perform the activities and analysis accordingly and provide evidence the product is indeed cybersecure. In this section, we will highlight the importance of verification and validation, what the video course contains, and the learning objectives. II. Difference between verification and validation Understand what the purpose of verification is and how it differs from the purpose of validation in a side to side comparison. An automotive cybersecurity example is provided here. III. Verification and validation methods: summary Get an overview of available methods, besides testing, to apply V&V in a visual overview such as review, analysis, and simulations. Examples for each (e.g. Threat analysis and vulnerability analysis) will be provided. IV. Cybersecurity verification and validation methods: a closer look Learn which traditional methods have been present for decades already in automotive and how merging them with new cybersecurity methods can suit them for automotive cybersecurity. Comprehend what a cybersecurity verification and validation strategy is according to ASPICE and which needs should be considering when developing one. VI. Expectations on verification and validation strategy Here, we will provide some questions to make you aware how cybersecurity impacts your V&V approach and which should be answered also in the V&V strategy. VII. Cybersecurity verification and validation summary To wrap up this video course, we will go over the main lessons learned during the cybersecurity verification and validation video course.Cybersecurity Verification And Validation – Video course
Cybersecurity verification and validation: merging traditional and new methods
Who the Cybersecurity verification and validation video course is made for
For project and quality managers
For system and software engineers
Cybersecurity verification and validation – Video course content
More video courses related to Cybersecurity Verification and Validation
What is cybersecurity verification and validation, which methods are available, and how is a V&V strategy developed?
I. Introduction to Cybersecurity verification and validation
V. The need for cybersecurity verification and validation strategy