Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C
AssetAsset FunctionCybersecurity Property(CIA)IADamage Scenario
BT/WLANWireless communicationXXXData communication via Bluetooth/WLAN could be intercepted, leading to unauthorized access or control of the system.
Analog and Digital Radio TunerReceives audio broadcast signalsXAn attacker could manipulate radio content, sending misleading traffic updates or emergency broadcasts.
GPS/GLONASSNavigation and positioning dataXXXGPS data spoofing could mislead navigation, directing the vehicle to incorrect or unsafe routes.
HDMI/USBMultimedia input/output interfaceXXMalware introduced via USB could compromise the infotainment system or spread to other vehicle systems.
CAN TransceiverVehicle control network communicationXXXCAN bus messages could be intercepted and manipulated, causing unintended vehicle behavior such as braking or acceleration.
LIN TransceiverLow-speed vehicle network communicationXXXManipulated LIN signals could disable or alter the behavior of comfort systems like lighting or seat controls.
Ethernet TransceiverHigh-speed in-vehicle communicationXXXNetwork traffic could be intercepted, affecting real-time data exchanges and safety-critical functions.
DSP/MicrocontrollerMain controller handling processing and controlXXXCompromising the microcontroller could lead to full system control, disabling safety features or controlling media outputs.
Audio Codec (ADC/DAC)Audio signal conversionXAltering audio output could interfere with important auditory cues or navigation instructions.
Human Machine Interface (HMI)User interface for controlling the infotainmentXXHMI compromise could confuse the driver, leading to incorrect input or unresponsiveness in critical situations.
Rear Seat MonitorProvides entertainment for rear passengersXXMalicious content could be displayed, or the screen could be disabled, affecting passenger experience.
Analog/Digital CameraCaptures visual dataXXXCamera feeds could be tampered with, providing incorrect images to the driver or turning off critical safety systems.

1. Item Definition (Section 7 of ISO 21434)

  • Objective: Define the system or component (the "item") under consideration, including its architecture, functionality, and context.

  • Key Activities

    :

    • Define the item scope (e.g., ECU, infotainment system, powertrain, etc.).
    • Identify the functions of the system.
    • Consider interfaces and interactions with other components.

2. Asset Identification

  • Objective: Identify the assets within the defined item that need to be protected.

  • Key Activities

    :

    • Identify the assets within the system (e.g., ECU firmware, communication links, user data, cryptographic keys).
    • Classify assets based on their importance to vehicle safety, security, and privacy.

3. Threat Scenario Identification (Threat Analysis)

  • Objective: Identify potential threat scenarios that can compromise the identified assets.

  • Key Activities:

    • Perform a threat analysis by identifying possible threat scenarios that could exploit vulnerabilities in the system.
    • Define the attack paths and methods that an attacker might use (e.g., physical access, remote hacking).
    • Consider different attacker types, capabilities, and attack motivations (e.g., theft, privacy invasion, disruption).

4. Impact Assessment

  • Objective: Assess the potential consequences of each identified threat scenario.

  • Key Activities:

    • Determine the potential impact on the system in terms of safety, financial loss, privacy, operation, or regulatory compliance.
    • Rate the impact level (low, medium, high) based on consequences like system malfunction, data breach, or operational failure.
    • Assess how the failure impacts confidentiality (C), integrity (I), and availability (A).

5. Vulnerability Identification

  • Objective: Identify the vulnerabilities that could be exploited by attackers to compromise the system.

  • Key Activities:

    • Evaluate weaknesses in system design, software, hardware, or protocols that could be exploited.
  • Use industry knowledge, past incidents, and vulnerability databases to identify common and emerging vulnerabilities (e.g., unpatched software, open communication ports).

6. Attack Feasibility Rating

  • Objective: Assess how feasible it is for an attacker to exploit the identified vulnerabilities.

  • Key Activities:

    • Analyze the attacker’s capabilities and required resources (e.g., time, tools, access level).
    • Rate attack feasibility based on complexity, accessibility, knowledge required, and attacker motivation.
    • Use a scale such as low, medium, or high feasibility.

7. Risk Determination

  • Objective: Evaluate the overall risk for each threat scenario by combining the impact assessment and attack feasibility rating.

  • Key Activities:

    • Calculate the risk based on the combination of impact and feasibility (ISO 21434 uses a risk matrix or similar method).
    • Determine which risks are high, medium, or low based on this combination.
    • Focus on high-risk scenarios that require immediate mitigation.

8. Risk Treatment Decision

  • Objective: Decide how to manage the identified risks (accept, mitigate, transfer, or avoid).

  • Key Activities:

    • For high-risk scenarios, define appropriate cybersecurity controls (e.g., encryption, secure boot, access controls).
    • For medium-risk scenarios, decide whether to accept the risk or apply mitigations.
    • For low-risk scenarios, document the rationale for accepting the risk.

9. Risk Treatment Implementation

  • Objective: Implement the necessary cybersecurity controls to mitigate the identified risks.

  • Key Activities:

    • Implement security controls in the system design, such as software updates, firewalls, or physical security measures.
    • Ensure that countermeasures protect the system from identified threat scenarios.
    • Conduct testing and validation to ensure the controls are effective in mitigating risks.

10. Residual Risk Assessment

  • Objective: Evaluate the residual risk after mitigation measures have been applied.

  • Key Activities:

    • Reassess the risk levels after applying cybersecurity controls.
  • Ensure that residual risks are acceptable or have been properly documented for ongoing management.

11. Monitoring and Update (Cybersecurity Lifecycle)

  • Objective: Continuously monitor and update the system’s security posture over its lifecycle.

  • Key Activities:

    • Regularly update threat models, vulnerabilities, and risk assessments.
    • Perform regular security audits and penetration testing.
    • Apply software updates, patches, and new mitigations as new threats and vulnerabilities emerge.

12. Documentation

  • Objective: Maintain thorough documentation throughout the TARA process for compliance, auditing, and future reference.

  • Key Activities:

    • Document threat scenarios, risk assessments, mitigation decisions, and test results.
  • Ensure that all cybersecurity measures and justifications are traceable and well-documented.

TARA Framework in ISO 21434:

StepKey Output
Item DefinitionSystem architecture and context definition.
Asset IdentificationList of critical assets and their functions.
Threat Scenario IdentificationSet of potential attack scenarios and attack vectors.
Impact AssessmentEvaluation of the impact of each threat on C, I, and A.
Vulnerability IdentificationIdentification of system vulnerabilities that can be exploited.
Attack Feasibility RatingEstimation of the feasibility of exploiting each vulnerability.
Risk DeterminationCalculation of overall risk level for each threat scenario.
Risk Treatment DecisionDecisions on risk mitigation strategies (accept, mitigate, transfer, or avoid).
Risk Treatment ImplementationApplication of cybersecurity controls to reduce or eliminate risks.
Residual Risk AssessmentReassessment of risks post-mitigation to ensure they are within acceptable levels.
Monitoring and UpdateContinuous monitoring and updating of the cybersecurity posture throughout the lifecycle of the system.

Key Concepts in ISO 21434:

  • Cybersecurity Goals: Confidentiality (C), Integrity (I), and Availability (A) are key properties that should be protected.
  • Risk Levels: Risks are classified based on the combination of attack feasibility and impact severity.
  • Lifecycle: ISO 21434 emphasizes cybersecurity as a continuous process that extends throughout the lifecycle of the vehicle, from development to decommissioning.
STRIDE CategoryAnalysis of the Scenario
S - SpoofingThe attacker could spoof the GPS signals or the GPS system itself, making the vehicle’s navigation believe the altered route is accurate, misleading the driver.
T - TamperingThe attacker tampered with the GPS data, modifying the navigation route to direct the vehicle to an unsafe or unintended destination.
R - RepudiationThe attacker could deny responsibility for altering the GPS data, and there may be no logging or proof of who manipulated the GPS route or system.
I - Information DisclosureThe attacker could access the vehicle’s GPS data, tracking the driver’s location, and potentially revealing sensitive information about the driver’s movements.
D - Denial of ServiceThe attacker could prevent the GPS system from functioning correctly, leaving the driver without navigation or causing confusion by showing no available routes.
E - Elevation of PrivilegeThe attacker might exploit vulnerabilities to gain unauthorized access to the GPS system, which they would not typically be allowed to control or manipulate.
S - SpoofingThe hacker might spoof the identity of legitimate users or services, making the vehicle’s system believe that the braking system was disabled by a trusted entity or service.
T - TamperingThe attacker directly tampers with the braking system's controls or commands, disabling the brakes and preventing the driver from being able to slow down or stop the vehicle.
R - RepudiationThe attacker could deny their actions, and there may be insufficient logging or evidence to prove that they were responsible for disabling the braking system.
I - Information DisclosureThe attacker could gain access to sensitive data related to the braking system’s control, revealing how it functions and exposing vulnerabilities in the system architecture.
D - Denial of ServiceDisabling the braking system constitutes a Denial of Service (DoS) attack, preventing the driver from using a critical vehicle function that directly impacts their ability to stop.
E - Elevation of PrivilegeThe attacker may have exploited a vulnerability in the vehicle’s software or control system to gain access to privileged functions such as controlling or disabling the brakes.
Last Updated:
Prev
MidTerm Notes