Terms & Abbreviated terms Flashcards

1
Q

CAL

A

Cybersecurity assurance level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CVSS

A

Common vulnerability scoring system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

E/E

A

Electrical and electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECU

A

Electronic control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OBD

A

On-board diagnostic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OEM

A

Original equipment manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PM

A

Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC

A

Recommendation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RQ

A

Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RASIC

A

Responsible, accountable, supporting, informed, consulted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TARA

A

Threat analysis and risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WP

A

Work product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3.1.1 architectural design

A

representation that allows for identification of components (3.1.7), their boundaries,
interfaces and interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3.1.2 asset

A

object that has value, or contributes to value Note 1 to entry: An asset has one or more cybersecurity properties (3.1.20) whose compromise can lead to one or more damage scenarios (3.1.22).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3.1.3 attack feasibility

A

attribute of an attack path (3.1.4) describing the ease of successfully carrying out the corresponding set of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3.1.4 attack path

A

attack set of deliberate actions to realize a threat scenario (3.1.33)

17
Q

3.1.5 attacker

A

person, group, or organization that carries out an attack path (3.1.4)

18
Q

3.1.6 audit

A

examination of a process to determine the extent to which the process objectives are achieved [SOURCE: ISO 26262-1:2018 [1], 3.5, modified — The phrase “with regard to” was substituted by “to determine the extent to which” and “are achieved” was added.]

19
Q

3.1.7 component

A

part that is logically and technically separable

20
Q

3.1.8 customer

A

person or organization that receives a service or product
[SOURCE: ISO 9000:2015 [2], 3.2.4, modified — The phrase “could or does receive” was replaced by “receives”, the phrase “that is intended for or required by this person or organization” was omitted, and the example and note 1 to entry were omitted.]

21
Q

3.1.9 cybersecurity road vehicle cybersecurity

A

condition in which assets (3.1.2) are sufficiently protected against threat scenarios (3.1.33) to items (3.1.25) of road vehicles, their functions and their electrical or electronic components (3.1.7) Note 1 to entry: In this document, for the sake of brevity, the term cybersecurity is used instead of road vehicle cybersecurity.

22
Q

3.1.10 cybersecurity assessment

A

judgement of cybersecurity (3.1.9)

23
Q

3.1.11 cybersecurity case

A

structured argument supported by evidence to state that risks (3.1.29) are not unreasonable

24
Q

3.1.12 cybersecurity claim

A

statement about a risk (3.1.29) Note 1 to entry: The cybersecurity claim can include a justification for retaining or sharing the risk.

25
Q

3.1.13 cybersecurity concept

A

cybersecurity requirements of the item (3.1.25) and requirements on the operational environment (3.1.26), with associated information on cybersecurity controls (3.1.14)

26
Q

3.1.14 cybersecurity control

A

measure that is modifying risk (3.1.29) [SOURCE: ISO 31000:2018 [3], 3.8, modified — The word “cybersecurity” was added to the term, the phrase “maintains and/or” was deleted, the notes to entry were deleted.