Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Project Scheduling (2)

Project Scope

  • A project scope refers to the detailed description of the project’s deliverables, boundaries, and goals.
  • Clearly defining scope ensures all stakeholders are aligned, prevents “scope creep”, and sets measurable objectives for the project.
  • Critical in determining what parts of the automotive system (hardware, software, networks) will be secured and how regulatory compliance (ISO/SAE 21434, UNECE WP.29) will be maintained.

Project Scope

  • Focus on protecting automotive systems from cyber threats.
  • Include both pre-launch (development phase) and post-launch (monitoring, updates) security.
  • Objectives:
    • Compliance: Adhere to regulatory standards (ISO/SAE 21434, UNECE WP.29).
    • Risk Mitigation: Identify and mitigate cybersecurity risks throughout the vehicle lifecycle.
    • Security by Design: Embed cybersecurity measures during vehicle development.
    • Post-Launch Protection: Ensure mechanisms are in place for ongoing cybersecurity monitoring and patching.

Project Scope

  • Scenario: Atat Motors, an automotive company, is developing a new connected electric vehicle (EV) that will be launched in 18 months. The vehicle must comply with ISO/SAE 21434, UNECE WP.29, and other cybersecurity regulations.
  • The task is to define the cybersecurity scope and objectives for this project.
  • Key Stakeholders:
    • Automotive engineers
    • Software developers
    • Compliance officers
    • Third-party cybersecurity auditors

Steps to Define Project Scope

  1. Understand the Project’s Requirements:
    • Review cybersecurity standards (e.g., ISO/SAE 21434) and regulations (e.g., UNECE WP.29).
    • Identify key security requirements based on connected vehicle technology.
  2. Define What’s Included in the Scope:
    • Specify components of the vehicle that require cybersecurity (ECUs, infotainment systems, sensors, etc.).
    • Include both hardware and software security requirements.
  3. Identify What’s Not Included:
    • Clearly outline what is outside the project’s scope to avoid confusion (e.g., non-digital components, unrelated subsystems).
  4. Determine Success Criteria:
  • Establish measurable cybersecurity goals (e.g., passed vulnerability tests, compliance certifications).

Example Scope Definition

Included:

  1. Secure software development lifecycle for in-vehicle systems.
  2. Penetration testing of vehicle-to-everything (V2X) communications.
  3. Compliance with ISO/SAE 21434 cybersecurity requirements.
  4. Integration of over-the-air (OTA) security patching systems.

Not Included:

  1. Development of non-digital vehicle systems.
  2. Cybersecurity for third-party aftermarket devices not provided by the manufacturer.

Developing Project Objectives

  1. Clear, Measurable Goals: Ensure that the objectives are well-defined, time- bound, and linked to specific outcomes (e.g., complete security testing of all in-vehicle systems within 12 months).
  2. Alignment with Business Goals: Ensure cybersecurity objectives support the company's broader business objectives, such as market launch timelines and regulatory compliance.
  3. Risk Management: Include objectives that focus on mitigating cybersecurity risks (e.g., implement security controls for V2X communications).
  4. Regulatory Compliance: Ensure all cybersecurity objectives meet regulatory standards (e.g., “Achieve ISO/SAE 21434 compliance by Q4 of the project”).

SMART Objectives

  • Specific: “Secure the infotainment system, communication protocols, and software updates.”
  • Measurable: “Achieve 100% compliance with ISO/SAE 21434 within 12 months.”
  • Achievable: “Allocate resources to ensure all security testing is completed on time.”
  • Relevant: “Align with regulatory needs and business goals of secure vehicle launch.”
  • Time-bound: “Complete system security testing by the end of Q3.”

Aligning Scope with Compliance

  • ISO/SAE 21434:
    • Requires cybersecurity to be integrated across the entire product lifecycle.
    • Ensure that the project scope includes both development and post- launch cybersecurity measures.
  • UNECE WP.29:
    • Mandates cybersecurity management in vehicle types - align objectives with compliance review stages.

Scope Creep

  • What is Scope Creep?: Uncontrolled expansion to project scope without adjustments to time, cost, and resources.
  • Impact in Automotive Cybersecurity:
    • Adding new cybersecurity features or testing requirements without revisiting timelines can delay project launch.
  • How to Prevent It:
    • Clearly define the initial scope and objectives.
    • Establish a process for evaluating changes to scope.
    • Regularly review scope in project meetings and adjust resources as needed.

Assignment 1 (5%)

Title: Cybersecurity Assignment for a Connected Vehicle System

Scenario Overview:

  • A large automaker (e.g., "Future Motors") is developing a new electric vehicle (EV) that requires robust cybersecurity measures.
  • The automaker needs to ensure compliance with ISO/SAE 21434 and UNECE WP.29 standards throughout the project lifecycle.
  • You are tasked with scheduling the cybersecurity elements of the project while balancing the project’s time, scope, budget, and quality.

Assignment 1 (5%)

Defining the Project Scope and Objectives (1)

Goal: Ensure that the vehicle’s system is secure by the time of launch, adhering to industry standards and regulations.

Key Deliverables:

  • Security assessments at each phase (design, implementation, testing, and deployment).
  • Regular compliance reviews with ISO/SAE 21434 and UNECE WP.29.
  • Ongoing monitoring and updates for post-launch cybersecurity issues.

Assignment 1 (5%)

  • Define the project scope using requirements from the fictional automaker and cybersecurity regulations.
  • Use a tool like MS Word or Confluence to create a project scope document.
  • Incorporate cybersecurity objectives, compliance requirements, and stakeholder expectations.

Assignment 1 (5%)

Break Down Project Phases (2)

Project Phases (aligned with both Waterfall and Agile approaches):

  1. Requirement Gathering: Collect all requirements related to cybersecurity, both from technical (software, hardware) and regulatory (ISO/SAE 21434) perspectives.
  2. Design: Plan and architect the cybersecurity defenses.
  3. Development: Build the security features.
  4. Testing: Implement penetration tests, vulnerability assessments.
  5. Deployment: Final rollout with ongoing monitoring.
  6. Post-Launch Monitoring: Schedule updates and monitoring for regulatory compliance post-launch.

Assignment 1 (5%)

Task 2

  • Create a “high-level” Work Breakdown Structure (WBS) for the cybersecurity project, outlining key tasks and sub-tasks for each phase.
  • Use tools like Trello or Jira to visually map the WBS.

Assignment 1 (5%)

Develop the Initial Project Schedule (3)

Create a Project Timeline:

  • Establish the duration of each phase (e.g., Requirement Gathering – 2 weeks, Design – 4 weeks, etc.).
  • Consider external factors like regulatory review times and potential delays in testing.

Assignment 1 (5%)

Task 3

  • Using MS Project, create a Gantt chart that outlines the timeline for each phase of the cybersecurity project.
  • Include start/end dates, dependencies between tasks, and milestones (e.g., "Completion of Security Testing").

Assignment 1 (5%)

Apply Waterfall and Agile Methodologies (4)

Waterfall Approach:

  • Sequentially plan the project’s phases and schedule, with defined start and finish dates for each.
  • Minimal room for adjustments once phases are underway.

Assignment 1 (5%)

Task 4

  • Create a Waterfall schedule using MS Project.
  • Ensure dependencies between phases are mapped clearly (e.g., Testing can’t start until Development is completed).

Assignment 1 (5%)

Apply Waterfall and Agile Methodologies (5)

Agile Approach:

  • Use iterative planning, where work is broken down into sprints, allowing flexibility to adapt to emerging cybersecurity risks.

Assignment 1 (5%)

Task 5

  • Create an Agile sprint schedule using Jira.
  • Define multiple sprints (e.g., 2-week sprints) and list tasks within each sprint (e.g., "Sprint 1 – Threat Modelling", "Sprint 2 – Vulnerability Testing“, etc.).
  • Build in regular re-evaluations of the schedule to adapt to any changes (e.g., Retrospectives).

Assignment 1 (5%)

  • FormalReport
  • ReferencesSourced/Cited...properly(APA) Due Date:

TBD (Week 9)

Last Updated:
Prev
Unit 2 Scheduling
Next
Unit 2 Trends