Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Need for Cybersecurity in Automotive

  • Automotive Innovations Driving the Increased Risk of Cyberattacks
    • Autonomous vehicles, Connected Infrastructure, Electric Vehicles
    • Increasing Cyber Threat Landscape for vehicles
      • Presence of 100s of Electronic Components
      • Over 100 million lines of code is used
  • Standards and Regulations
    • ISO 21434
    • UNECE WP 29 R155 and R156
  • Security is a safety issue in vehicles

Cybersecurity Standards and Regulations

  • UNECE Cybersecurity Regulation - UNECE WP.29 R155 & R156
  • ISO 21434 - Road Vehicle Cybersecurity Engineering Standard

UNECE WP.29 R155 and R156

  • Regulation establishes performance and audit requirements for cybersecurity and software update management for new passenger vehicles
  • WP.29 applies to the 54 countries
  • Automakers to implement measures to
    • Manage vehicle cybersecurity risks
    • Secure vehicles by design to mitigate risks along the supply chain
    • Detect and respond to security incidents across the vehicle fleet
    • Provide safe, secure software updates that do not compromise vehicle safety

ISO 21434 - Road vehicles — Cybersecurity Engineering

  • Specifies engineering requirements for cybersecurity risk management
    • E/E systems in road vehicles
    • Components
    • Interfaces
  • Defines a framework
    • Minimum Requirements for cybersecurity processes
    • Common language for communicating and managing cybersecurity risk.
  • Covers Cybersecurity Management and engineering processes

ISO 21434 - Applicability

  • E/E systems, including their components and interfaces, whose development or modification began after the publication of ISO 21434.
  • Activities along the product lifecycle are covered
    • Concept Phase
    • Product Development
    • Production
    • Operation
    • Maintenance
    • Decommissioning
  • Impact all players in the automotive industry from OEMs to Tier- N suppliers

ISO 21434

  • 15 Clauses
  • 37 Sub-Clauses
  • 101 Requirements
  • 13 recommendations
  • 4 permissions

Threat Analysis and Risk Assessment

  • TARA is a comprehensive risk assessment
  • Clause 15 of the ISO/SAE 21434 outlines the basic elements of a risk assessment
  • Core activities in a TARA
    • Item definition
    • Asset identification and impact rating
    • Threat scenario identification
    • Attack path analysis
    • Risk determination and treatment

Cybersecurity Goals and Claims

  • Cybersecurity Goals
    • Concept level cybersecurity requirements associated with one or more threat scenarios
    • Cybersecurity goal would include the protection of assets that if compromised would lead to a damage scenario
    • Example: The storage and transmission of data should be secure and should be controlled
  • Cybersecurity Claims
    • Risks that cybersecurity goals do not account for but are still applicable to the scenario
    • Fail-safe mechanism when the accounted risks occur
    • Cybersecurity claims are used to explain why risk retention or sharing are considered adequate.
    • Example: Lock the device after 5 failed attempts

Cybersecurity Concept and Plan

  • Cybersecurity Concept
    • It is to verify and ensure conformance with the cybersecurity goals and consistency and compatibility with the functionality of the item
    • cybersecurity requirements of the item and requirements on the operational environment with associated information on cybersecurity controls
    • Example: To protect the vulnerability this should be done in x amount of time to protect the feature (Testing)
  • Cybersecurity Plan
    • Specifies what is required to maintain the concept in a concise way.

Interaction in Concept Phase

Interaction

Item Definition

  1. Item Boundary

    • Interactions of interfaces with the vehicle or E/E systems externally
  2. Item Functions

    • Describing the behavior of the interfaces
    • Describe the operational environment
  3. Preliminary Architecture

    • Identifications of components, connections and external interfaces
  4. Other relevant information can also be included such as assumptions

Example

image-20241006202814534

Example of item boundary and preliminary architecture of the headlamp system

image-20241006202923000

Example

Cybersecurity Relevant Candidate

  • Motion control modules and modules with automotive safety integrity level (ASIL) designations
  • Data related to drivers or passengers, or to potentially sensitive information such as location data.
  • Internal connections -- CAN, Ethernet, media-oriented systems transport (MOST), transmission control protocol/internet protocol (TCP/IP).

Cybersecurity Properties

  • Confidentiality
    • Ensures appropriate access level for sensitive information
  • Integrity
    • Data protection from alterations, deletion by unauthorized parties
  • Availability
    • Ensuring the access/service remains available

image-20241006203205715

Asset Identification

  • Objects that have value or contribute to the value

  • Determine the context and composition of the product as:

    • Functions
    • Data
    • Interfaces
    • Hardware
    • Software
    • Networks

Asset Identification

  • Identify cybersecurity properties whose compromise lead to damage scenario
  • Identification of assets can be based on
    • Analyzing the Item Definition
    • Performing an impact rating
    • Deriving assets from Threat scenarios
    • Using Pre-defined Catalogues
  • Define the asset(what), property(why) and the location(where)

Damage Scenarios & Impact

  • Damage Scenarios
    • Adverse Consequence involving a vehicle or a vehicle function and affecting a road user
    • Can include relation between the functionality of the item and adverse consequence
    • It can be description of harm to the road user
  • Impact
    • Estimate of magnitude of damage and physical harm from a damage scenario

Example of Damage Scenario

image-20241006204131348

Impact Analysis

  • Impact

    • Estimate of magnitude of damage and physical harm from a damage scenario
  • Impact Categories

    • Safety
    • Financial
    • Operational
    • Privacy
  • Impact Rate ranges

    • Severe (3), Major (2), Moderate (1) and Negligible (0)

Example of Impact ratings for damage scenarios

image-20241006204451815

Threat Modeling

  • Step by Step procedure to identify threats and vulnerabilities
    1. Identify threats
    2. Creating architectural overview including data flows
    3. Identify threats, vulnerabilities and requirements
  • Can consists of different levels
    • Vehicle, Subsystem and Component
  • Analyzing the severity of impact of the threat on TOE
  • Define security objectives - CIA
  • Methods
    • Attack tree & STRIDE methodology

Example

image-20241006204723002

STRIDE Methodology

  • Qualitative threat analysis method
  • Used for identifying threats according to the purpose of the attack
  • Instead of every type of attack possibility it is concise
  • Reasons why STRIDE is preferred: ○ Repeatability
    • Efficiency and Effectiveness based on known designs
    • Easy to document vs attack trees
    • Controls can be directly associated with identified vulnerabilities

Threat Scenario Identification

image-20241006204900684

Attack Paths

Threat ScenarioAttack Paths
Denial of service of oncoming car informationAttacker compromises navigation ECU from cellular interface. iv. Attacker floods the communication bus with a large number of messages
Compromised navigation ECU transmits malicious control signals
Gateway ECU forwards malicious signals to power switch actuator
Attacker floods the communication bus with a large number of messages

Attack feasibility

  • Attribute of an attack path describing the ease of successfully carrying out the corresponding set of actions
  • Depends upon various factors
    • Elapsed Time
    • Specialized Expertise
    • Knowledge of item/component
    • Window of Opportunity
    • Equipment

Attack feasibility Rating

Threat ScenarioAttack PathsETSEKoICWoOEQValueRating
Denial of service of oncoming car informationAttacker compromises navigation ECU from cellular interface. iv. Attacker floods the communication bus with a large number of messages1870420Low
Compromised navigation ECU transmits malicious control signals
Gateway ECU forwards malicious signals to power switch actuator
Attacker floods the communication bus with a large number of messages

Risk Determination

image-20241006205507693

Determined Risk Values

Threat scenarioAggregated attack feasibility ratingImpact ratingRisk value
Spoofing of a signal leads to loss of integrity of the data communication of “Lamp Request” signal for power switch actuator ECUHighSevereS: 5
Denial of service of oncoming car informationLowModerateO: 2

Risk Treatment Decisions

Threat scenarioRisk valueRisk treatment option
Spoofing of a signal leads to loss of integrity of the data communication of “Lamp Request” signal for power switch actuator ECUS: 5Reducing the risk
Denial of service of oncoming car informationO: 2Reducing the risk

Threat Catalog

  • Tool containing a generic list of threats that are considered common in the automotive security industry
  • Threat catalog contains threat classes which are based on the STRIDE methodology
  • Free to download from the ASRG Website

image-20241006205930778

Last Updated:
Prev
Schedule
Next
MidTerm Notes