Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Project Management Methodologies

Agenda

  • Project Lifecycle Phases
  • Project Management Models
  • Recap of Project Management
  • Review of PMBOK and Agile
  • Waterfall vs. Agile methodologies
  • Tailoring Methodologies
  • Discussion / Case Study

Key Points

  • Importance of structured frameworks for managing complex cybersecurity projects in automobility.
  • Comparison of Waterfall and Agile methodologies, and how these models can be tailored for automobility cybersecurity.

Project Lifecycle Phases

  • Initiation: Define project scope, objectives, and initial risk assessments.
  • Planning: Establish cybersecurity protocols, define roles, and tailor the methodology to address specific security challenges.
  • Execution: Implement project activities, regularly test for security vulnerabilities, and adjust as needed.
  • Monitoring and Controlling: Continuous tracking of project progress, cybersecurity incidents, and changes in scope.
  • Closure: Conduct final security reviews, audits, and post-project analysis to capture lessons learned.

Recap of Project Management

  • Toyota's 3M Model (Muda, Mura, Muri): Focus on reducing waste, variation, and strain through Lean principles. Enhances security and efficiency in projects.
  • Ford’s Product Development Process (FPDS): Structured and stage-gate model emphasizing innovation and quality control, often aligned with Waterfall methodology.
  • Volkswagen's Agile Development: More focus on agile processes for software development, embracing flexibility and responsiveness to changes.

Review of PMBOK and Agile

  • PMBOK in Cybersecurity:
    • Emphasizes structured stages: Initiation, Planning, Execution, Monitoring & Controlling, and Closing.
    • Key Processes: Scope Management, Risk Management, Quality Control.
  • Agile Methodologies in Cybersecurity:
    • Flexibility: Respond quickly to emerging security threats.
    • Scrum and Kanban: Useful in sprints for testing and deploying cybersecurity measures.
  • When to Choose Agile or Waterfall: Potential hybrid models for automobility.

Waterfall Methodology

Waterfall is a linear, sequential approach where each phase must be completed before the next starts.

Phases:

  • → Requirements
  • → Design
  • → Development
  • → Testing
  • → Deployment
  • → Maintenance

Pros:

  • Clearly defined stages and milestones.
  • Easier to manage large teams and long-term projects.
  • Suitable for projects with fixed requirements.

Cons:

  • Inflexible: Difficult to adapt to changes.
  • Testing and security checks occur late in the process, which can delay response to cybersecurity risks.

Agile Methodology

An iterative, flexible approach where project development happens in cycles (sprints).

Key Concepts:

  • Sprints: Short, time-boxed development cycles.
  • Scrum framework: Daily standups, sprint reviews, and retrospectives.
  • Kanban: Visualizing workflows to improve process efficiency.

Pros:

  • Highly adaptable to changing requirements and new cybersecurity threats.
  • Encourages continuous collaboration between stakeholders and team members.
  • Continuous testing and updates ensure early identification of security risks.

Cons:

  • Can be chaotic if not well-managed.
  • May lead to “scope creep” without proper controls.
  • Less suitable for projects with strict regulatory or compliance requirements, common in the automotive industry.

Waterfall vs Agile

Waterfall:

  • Best suited for large, complex, and compliance-driven projects.
  • Works well when requirements are static and clearly defined from the outset.
  • Cybersecurity integration happens in later stages, potentially leaving gaps early in the project.

Agile:

  • Ideal for dynamic environments where cybersecurity threats evolve rapidly.
  • Enables frequent testing, risk identification, and adjustments during development.
  • Encourages iterative improvements but may lack clear documentation needed for regulatory approval.

Tailoring Methodologies

Waterfall for Regulatory Projects: Tailor Waterfall to ensure compliance with standards like ISO/SAE 21434 and UNECE WP.29, where rigid documentation is necessary.

Agile for Threat Response: Use Agile for ongoing cybersecurity initiatives like software patches, vulnerability management, and incident response.

Hybrid Models: Some automobility projects might benefit from a hybrid approach (combining Waterfall and Agile), where fixed stages like compliance testing (Waterfall) coexist with iterative software development (Agile).

Discussion

  • When is Waterfall more appropriate for automobility cybersecurity projects?
  • In what scenarios does Agile excel for cybersecurity challenges?
  • Can both methodologies be combined for optimal results? How would that work in practice?
  • What challenges might a project manager face when transitioning between Waterfall and Agile?

Case Study

Scenario: A connected vehicle platform requires regular security patches, while also needing to comply with stringent automotive regulations.

Waterfall Approach: Review how a Waterfall approach might structure long-term compliance planning and project execution.

Agile Approach: Explore how Agile sprints would handle continuous security monitoring, threat assessments, and response to emerging vulnerabilities.

Activity: Discuss each approach, and present which methodology (or hybrid) would be most effective for the project.

Summary / Key Takeaways

  • Both Waterfall and Agile have their place in managing automobility cybersecurity projects.
  • Waterfall excels in structured, regulatory-heavy environments but lacks flexibility.
  • Agile is dynamic and allows for quick adaptation to cybersecurity threats but may lack the control needed for complex compliance.
  • Tailoring methodologies to specific project needs is critical, and hybrid models may offer the best of both worlds.
Last Updated:
Prev
Unit 1 Frameworks
Next
Unit 1 Standards