As cybersecurity verification and validation is required by ISO/SAE 21434 and UN R155, having an understanding of both is essential. In this video course, you will learn the difference between verification and validation, as well as get an overview of V&V methods. Additionally, you will also learn which needs should be covered in a V&V strategy. Verification and validation methods, otherwise known as V&V, has been present in automotive for decades to ensure the product indeed fulfills the requirement and the approach is the right one. But today, cybersecurity needs to also be embedded here as required by ISO/SAE 21434 and UN R155. Therefore, in this “Cybersecurity verification and validation” video course, we will explain V&V methods in the context of automotive cybersecurity. First, we will highlight the importance of verification and validation in automotive cybersecurity. Then, to gain a common understanding, we will first define the differences between validation and verification and provide a practical example to make the distinction clear. Second, we will give you an overview of available verification and validation methods, besides testing, including review, analysis and simulations. We will also provide clear examples for each of the presented V&V methods. Third, you will learn how you can reuse existing traditional V&V methods by merging them with specific to cybersecurity new methods. Moreover, you will learn why including cybersecurity in the V&V strategy is necessary to ensure systems are meeting requirements. At last, we will provide you with some questions derived from ASPICE, which should be considered in the V&V strategy and make you aware of how cybersecurity impacts your V&V approach. In order to ensure the product is indeed fulfilling its requirements and there is no failure, but also that it fulfills its objective, verification and validation is required. Therefore, in this video course you will learn how to reuse already existing methods in automotive for cybersecurity with new methods. As the professional involved in building and protecting systems, it is important to have an understanding of the cybersecurity verification and validation methods, so you are aware of the activities and analysis to perform accordingly to provide evidence the product is indeed cybersecure. In this section, we will highlight the importance of verification and validation, what the video course contains, and the learning objectives. II. Difference between verification and validation Understand what is the purpose of verification and how it differs from the purpose of validation in a side to side comparison. An automotive cybersecurity example is provided here. III. Verification and validation methods: summary Get an overview of available methods, besides testing, to apply V&V in a visual overview such as review, analysis, simulations, and examples for each (e.g. Threat analysis and vulnerability analysis). IV. Cybersecurity verification and validation methods: a closer look Learn which traditional methods have been present for decades already in automotive and how merging with new cybersecurity methods can adapt them for automotive cybersecurity. Comprehend what a cybersecurity verification and validation strategy is according to ASPICE and which needs should be considering when developing one. VI. Expectations on verification and validation strategy Here, we will provide some questions to make you aware how cybersecurity impacts your V&V approach and that should be covered in the V&V strategy. VII. Cybersecurity verification and validation summary To wrap up this video course, we will go over the main lessons learned during the cybersecurity verification and validation video course.Cybersecurity Verification And Validation – Video course
Cybersecurity verification and validation: merging traditional and new methods
Who the Cybersecurity verification and validation video course is made for
For project and quality managers
For system and software engineers
Cybersecurity verification and validation – Video course content
More video courses related to Cybersecurity Verification and Validation
What is cybersecurity verification and validation, which methods are available, and how is a V&V strategy developed?
I. Introduction to Cybersecurity verification and validation
V. The need for cybersecurity verification and validation strategy