车辆概念设计阶段的网络安全与风险评估ppt课件.pptx
《车辆概念设计阶段的网络安全与风险评估ppt课件.pptx》由会员分享,可在线阅读,更多相关《车辆概念设计阶段的网络安全与风险评估ppt课件.pptx(41页珍藏版)》请在三一办公上搜索。
1、,October 28, 2019,Revision: October 28, 2019,John T. KrzeszewskiChief Engineer, Cybersecurity Governance, Risk, Compliance and ArchitectureChair, “PG1: Risk Assessment” in ISO-SAE 21434,Cybersecurity in the V-cyclePurpose and components of a risk assessmentRelationships between components or riskRis
2、k calculation/mappingRisk assessment stepsIdentification of assets/damage scenarioImpact ratingsThreat scenario identificationAttack Feasbility EstimationCase StudiesGroup activity,Agenda,CS Steps and Reviews,Concept,Requirements and Architecture,Detailed,Design,IMPLEMENTATION,“TARA”= output Risk le
3、vel, relative to threat/damage scenario (Impact and Attack feasibility)Derive CS goals=CS concept=initial requirements; allocate to preliminary architecture,Refine & verify CS requirements, architecture, design: selection of controls (considering interfaces)Allocation of requirements to architectura
4、l elementsIdentify and manage vulnerabilities,Riskassessment,Risk assessment in cybersecurity is used to determine what negative actions could occur and their associated likelihood, resulting in an overall risk value.Risk value is then assessed by the business and based on the associated risk tolera
5、nce of the organization, the following options are selected:Accept (do nothing)Transfer (to another entity, e.g. insurance)Reduce (mitigate)Avoid (remove the source of the risk e.g. remove the feature)In the case of “Reduce”, the appropriate cybersecurity controls and/or processesare designed and im
6、plementedThe residual risk should then be assessed to determine if it has been lowered sufficiently.,PurposeofRisk Assessment,IQPC Risk Assessment | 28OCT19 | Aptiv Public,4,Asset IdentificationIdentify objects whose cybersecurity properties1 could be violated = damage scenarioNote this is independe
7、nt of how the damage scenario could be realizedWe document what damage could happen, but not the various methods that could cause the damageImpact RatingDetermine the level of impact if the damage scenario were to be realized.Impact to the stakeholders in regards to Safety, Operational, Financial, a
8、nd PrivacyThreat Scenario IdentificationIdentify way(s) in which a damage scenario could occur.,ComponentsofaRisk Assessment,IQPC Risk Assessment | 28OCT19 | Aptiv Public,5,1 Confidentiality, Integrity, Availability,Vulnerability AnalysisIdentify potential flaws and weaknesses in the product that co
9、uld be used in an attacki.e. needed to realize a particular threat scenarioAttack Path AnalysisIdentify the steps required to realize a threat scenarioAttack Feasibility Analysis i.e. related to likelihood of the attackEstimate the feasibility to carry out the steps of a particular attack pathRisk i
10、s determined by impact of the threat and associated “likelihood” of theattack and these components are utilized to derive this informationThese components can be performed in the order most beneficial to the organizationE.g. brainstorm threats and then determine what are the associated assets and th
11、eir damage scenarios;another option is to identify assets and their damage scenarios and then brainstorm threat scenarios that can realize a damage scenario,ComponentsofaRisk Assessment,RelationshipBetweenComponentsofRisk,Asset(C, I, A properties),Damage Scenario,Vulnerability,Impact Rating,AttackFe
12、asibility,Risk Value,Vulnerability,ThreatScenario,Attack Path,7,IQPC Risk Assessment | 28OCT19 | Aptiv Public,Calculate risk of realization of a particular threat scenarioRisk calculation based on impact of the threat and associated attack feasibilityOverall risk value can determined by a heat map-
13、One axis is the Impact and the other axis the Attack FeasibilityMapping of impact rating and associated attack feasibility to a risk value is up to the organization:,RiskCalculationExampleofan alternative mapping,Security Goals,8,IQPC Risk Assessment | 28OCT19 | Aptiv Public,Risk calculation heat ma
14、ps are up to the organizationSome organizations may consider anything critical that is eitherHigh Attack Feasibility with Impact greater than or equal to MajorThe fact that the attack is quite feasible increases riskSevere impact with Attack Feasibility greater than or equal to MediumThe fact that t
15、hat is has maximum impact and a relatively high attack feasibility,RiskCalculationExampleofan alternative mapping,Security Goals,9,IQPC Risk Assessment | 28OCT19 | Aptiv Public,Different approaches are possible, based on whatever makes sense for the particular application or organization e.g.Identif
16、y assets, associated damage scenarios and then brainstorm as to what threat scenarios could accomplish a damage scenarioBrainstorm possible threat scenarios and by doing so, it identifies assets and theirassociated damage scenariosThreat modeling componentsSystem architecture diagram & associated da
17、ta flows i.e. visualization of assetsDetermine threats to the identified assets which result in a damage scenarioThreats can be identified by brainstorming, using Microsofts STRIDE methodology, etc.Assumptions must be documentedE.g. ECU supplier may not know the potential impact at a vehicle levelIn
18、 absence of this information, the analysis is done “out of context”, such as design of a system beforeengaging customers,Risk Assessment Steps,All connections can be used in an attack,Sensors Gateway (camera, LiDAR,radar, etc.),Autonomous,V2X,Attack PointExamples,Immobilizer/ BCM,Infotainment,Actuat
19、ors,Cloud services,Telematics,Diagnostic port,PODS,Cockpit,system,ExampleCaseStudy1- InfotainmentSystemHighLevelSystem Architecture &Data Flow (partial),IQPC Risk Assessment | 28OCT19 | Aptiv Public,12,1 A hypothetical system, not an actual,The infotainment system has numerous features, such asAbili
20、ty to make online purchases via verbal commands, utilizing credit card and associated personal information that are stored in the infotainment systemAvailability of an API for development of custom applications that interact with the infotainment systemWhat is an asset?Something whose cybersecurity
21、properties could be violated, resulting in a damage scenario- Cybersecurity properties:Confidentiality, Integrity, AvailabilityLets first focus on a potential “damage scenario” to an asset, irrespective of how it can be realized via a particular “threat scenario”What are the assets for the first sys
22、tem feature above and the associated damage scenario(s)?,Identificationof assets,In the use case of the ability to make online purchases via verbal commandsOne obvious asset is the credit card and associated personal information (name, address)This qualifies as an asset as one of its cybersecurity p
23、roperties could be violated: confidentiality, resulting in a damage scenarioFor purposes of this presentation, we will use an impact scale of 4 levels of Severe, Major, Moderate and NegligibleFor a financial impactSevere catastrophic consequences; stakeholder might not overcomeMajor substantial cons
24、equences; stakeholder will be able to overcomeModerate inconvenient consequences; stakeholder can overcome with limited resourcesNegligible no effect, negligible consequences or is irrelevant,Determination ofasset andassociateddamage scenario,If a credit card and required associated information was
25、stolen, it could have a major impact on the user i.e. hit credit cards maximum purchase limitOverall impact rating “Major” but unlikely it would cause bankruptcySo far, we have only assessed the impact of the damage scenario and not themeans by which it can be accomplished i.e. the threatBy breaking
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 车辆 概念 设计 阶段 网络安全 风险 评估 ppt 课件

链接地址:https://www.31ppt.com/p-1409564.html