Automotive Cyber Security by Shiho Kim & Rakesh Shrestha

Automotive Cyber Security by Shiho Kim & Rakesh Shrestha

Author:Shiho Kim & Rakesh Shrestha
Language: eng
Format: epub
ISBN: 9789811580536
Publisher: Springer Singapore


5.4.1 TARA

The following sections describe the process of threat modeling using the adapted version of the TARA method. The target of this process is the connected car.

Methodology and Tools. The threat modeling was conducted with the support of domain experts and a project manager from Intel Security in charge of the TARA method. The method is performed in six steps, the goal of which is to find the critical exposures of the connected car. The following is a short description of how these steps were performed:1.Measure current threat agent risks. By using the online survey that was completed by security experts, the method determined the threat levels of different threat agents (default risk).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.