Cybersecurity Verification And Validation – Video course

What is cybersecurity verification and validation, which methods are available, and how is a V&V strategy developed?

As cybersecurity verification and validation is required by ISO/SAE 21434 and UN R155, having an understanding of both is essential. In this video course, you will learn the difference between verification and validation, as well as get an overview of V&V methods. Additionally, you will also learn which needs should be covered in a V&V strategy.

Watch video course
Cybersecurity verification and validation video course
Cybersecurity-Verification-and-Validation

Cybersecurity verification and validation: merging traditional and new methods

Verification and validation methods, otherwise known as V&V, has been present in automotive for decades to ensure the product indeed fulfills the requirement and the approach is the right one. But today, cybersecurity needs to also be embedded here as required by ISO/SAE 21434 and UN R155. Therefore, in this “Cybersecurity verification and validation” video course, we will explain V&V methods in the context of automotive cybersecurity.

First, we will highlight the importance of verification and validation in automotive cybersecurity. Then, to gain a common understanding, we will first define the differences between validation and verification and provide a practical example to make the distinction clear.

Second, we will give you an overview of available verification and validation methods, besides testing, including review, analysis and simulations. We will also provide clear examples for each of the presented V&V methods.

Third, you will learn how you can reuse existing traditional V&V methods by merging them with specific to cybersecurity new methods. Moreover, you will learn why including cybersecurity in the V&V strategy is necessary to ensure systems are meeting requirements.

At last, we will provide you with some questions derived from ASPICE, which should be considered in the V&V strategy and make you aware of how cybersecurity impacts your V&V approach.

Who the Cybersecurity verification and validation video course is made for

For project and quality managers

In order to ensure the product is indeed fulfilling its requirements and there is no failure, but also that it fulfills its objective, verification and validation is required. Therefore, in this video course you will learn how to reuse already existing methods in automotive for cybersecurity with new methods.

For system and software engineers

As the professional involved in building and protecting systems, it is important to have an understanding of the cybersecurity verification and validation methods, so you are aware of the activities and analysis to perform accordingly to provide evidence the product is indeed cybersecure.

Cybersecurity verification and validation – Video course content

I. Introduction to Cybersecurity verification and validation

In this section, we will highlight the importance of verification and validation, what the video course contains, and the learning objectives.

II. Difference between verification and validation

Understand what is the purpose of verification and how it differs from the purpose of validation in a side to side comparison. An automotive cybersecurity example is provided here.

III. Verification and validation methods: summary

Get an overview of available methods, besides testing, to apply V&V in a visual overview such as review, analysis, simulations, and examples for each (e.g. Threat analysis and vulnerability analysis).

IV. Cybersecurity verification and validation methods: a closer look

Learn which traditional methods have been present for decades already in automotive and how merging with new cybersecurity methods can adapt them for automotive cybersecurity.

V. The need for cybersecurity verification and validation strategy

Comprehend what a cybersecurity verification and validation strategy is according to ASPICE and which needs should be considering when developing one.

VI. Expectations on verification and validation strategy

Here, we will provide some questions to make you aware how cybersecurity impacts your V&V approach and that should be covered in the V&V strategy.

VII. Cybersecurity verification and validation summary

To wrap up this video course, we will go over the main lessons learned during the cybersecurity verification and validation video course.

More video courses related to Cybersecurity Verification and Validation

X