CyberSecurityEvaluationMethodologyofICV
CyberSecurityEvaluationMethodologyofICV.pdf
ThepaperwilldiscussthecybersecurityevaluationmethodologyofICV,interpretthekeyelementsofcybersecurityandtherelationsamongthem.Withthecybersecuritymodel,weproposethesecurityevaluationprocedureconsistsoftheTOEdefinitionandassetidentification,threatprobabilityanalysis,vulnerabilityseverityanalysis,safeguardeffectivenessverificationandimpactanal-ysissteps.Basedontheanalysisresultsofalltheseparts,weproposeawaytoconcludetheoverallsecurityrisks.Theriskcalculationwillsummarizetheevaluationresults,makeitcomparable,orcanbeusedastheinputtogettheprotectionrequirementandactionplanforfurtherimprovement.Inthepaper,cybersecurityelements'conceptwillbeintroducedandthemeaningofthemduringtheICVse-curityevaluationwillbeexplained.Mappingbetweenthecybersecurityandthesafetyishighlightedattheendofthepaper,togetherwiththekeypointswhenlinkingthem.
作者:LuoYingluo LiuJianxing
作者单位:ChinaAcademyofInformationandCommunicationsTechnologySchoolofTransportationScienceandEngineering,BeihangUniversity
母体文献:第19届亚太汽车工程年会暨2017中国汽车工程学会年会论文集
会议名称:第19届亚太汽车工程年会暨2017中国汽车工程学会年会
会议时间:2017年10月24日
会议地点:上海
主办单位:中国汽车工程学会
语种:chi
分类号:
关键词:cybersecurityriskevaluationvulnerabilitythreatautomateddriving
在线出版日期:2020年7月9日
基金项目:
相似文献
相关博文
页:
[1]