Vulnerability Analysis for Vehicle Cybersecurity – Video Course
Get to know what the cybersecurity vulnerability analysis and role in continual cybersecurity activities is in this video course. You will also learn about what determines the treatment of a vulnerability and further steps as demanded by the ISO/SAE 21434. Most importantly, we will give you an overview of the steps in vulnerability analysis.
Know what a cybersecurity vulnerability analysis is in automotive and required steps in this video course
Discovering a weakness is certainly not desirable, but also you can’t stay with arms crossed. There is, of course, a standard required solution to handle cybersecurity weaknesses identified during the continual cybersecurity activities process. This is where the vulnerability analysis comes into play. In this video course, you will learn about what is the vulnerability analysis, necessary steps and decision making to treat vulnerabilities.
First, we will recapitulate on what continual cybersecurity activities are according to ISO/SAE 21434 and what the process looks like to afterwards give you an overview of what the cybersecurity vulnerability is. We will also introduce the concept of the exploitability analysis, which is the main activity taking place during the vulnerability analysis.
Next, we will provide an overview and the step-by-step process of the vulnerability analysis, which ultimately leads to deciding on further remediation action. Over this course, we will also explain the bottom down approach and top down approach and clarify where they need to be used.
At last, we will explain how the decision to handle a vulnerability is made and the further steps needed as required by ISO/SAE 21434 for both if further treatment is required and if no additional processing is required.
Who the “Vulnerability Analysis” video course is made for
For quality managers
The vulnerability analysis plays a crucial role to keep a product secure throughout the entire vehicle product lifecycle. Therefore, this video course is important to get a whole picture on what needs to be done if weaknesses that compromise overall cybersecurity and, therefore, quality, are detected.
For system engineers
Being able to handle cybersecurity weaknesses with an effective and standard required solution, such as the cybersecurity vulnerability analysis is essential to correctly handle vulnerabilities. In this course, you will learn what steps are required and how to correctly decide how vulnerabilities should be treated.
Vulnerability Analysis video course content
Understand what continual cybersecurity activities are according to ISO/SAE 21434 and the role of vulnerability analysis, the main activities taking place such as the exploitability analysis, and its purpose.
II. Cybersecurity Vulnerability Analysis
In this section, we will explain the exploitability analysis into more detail. You will also learn how the approach from determining attack paths differentiate from the TARA and the steps along the vulnerability analysis.
Here, you will learn about the decision making involved on how to handle the vulnerability, what determines the decision, and what the ISO/SAE 21434 requires if no additional processing is needed.
IV. Vulnerability analysis final thoughts
Finally, we will summarize what you have learned during the video course.