Terms and Abbreviations Flashcards

1
Q

Architectural Design

A

Representation that allows for identification of components, their boundaries, interfaces and interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

Object that has value, or contributes to value
Has one more CS properties whose compromise can lead to one or more damage scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack Feasibility

A

Attribute of an attack path describing the ease of successfully carrying out the corresponding set of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Path

A

Set of deliberate actions to realise a threat scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker

A

Person, group or org that carries out an attack path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Audit

A

Examination of a process to determine the extent to which the process objectives are achieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Component

A

Part that is logically and technically separable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Customer

A

Person or org that receives a service or product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cybersecurity aka Road Vehicle CS

A

Condition in which assets are sufficiently protected against threat scenarios to items of road vehicles, their functions and electrical or electronic components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CS Assessment

A

Judgement of CS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CS Case

A

Structured argument supported by evidence to state that risks are not unreasonable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CS Claim

A

Statement about a risk.
Justification for retaining or sharing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CS Concept

A

CS requirements of an item and requirements on its operational environment with associated information on the CS controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CS Control

A

Measure that is modifying the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CS Event

A

CS information that is relevant for an item or component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CS Goal

A

Concept-level CS requirement associated with one or more threat scenarios

17
Q

CS Incident

A

Situation in the field that can involve vulnerability exploitation

18
Q

CS Information

A

Information with regard to cybersecurity for which relevance is not yet determined

19
Q

CS Interface Agreement

A

Agreement between customer and supplier concerning distributed CS activities

20
Q

CS Property

A

Attribute that can be worth protecting

21
Q

CS Spec

A

CS requirements and corresponding architectural design

22
Q

Damage Scenario

A

Adverse consequences involving a vehicle or vehicle function and affecting a road user

23
Q

Distributed CS Activities

A

CS activities for the item or component whose responsibilities are distributed between customer and supplier

24
Q

Impact

A

Estimate of magnitude of damage or physical harm from a damage scenario

25
Item
Component or set of components that implements a function at the vehicle level
26
Operational Environment
Context considering interactions in operational use Operational use of item or a component can include use in a vehicle function, in production and/or in service and repair
27
Out-of-Context
Not developed in the context of a specific item
28
Penetration Testing
Cybersecurity testing in which real-world attacks are mimicked to identify wats to compromise CS goals
29
Risk Cybersecurity Risk
Effect of uncertainty on Road Vehicle CS expressed in terms of attack feasibility and impact
30
Risk Management
Coordinated activities to direct and control an organization with regard to risk
31
Tailor
To omit or perform an activity in a different manner compared to its description in this document
32
Threat Scenario
Potential cause of compromise of CS properties of one or more assets in order to realise a damage scenario
33
Triage
Analysis to determine the relevance of CS information to an item or component
34
Trigger
Criterion for triage
35
Validation
Confirmation, through the provision of objective evidence, that the CS goals of the item are adequate and are achieved
36
Verification
Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled
37
Vulnerability
Weakness that can be exploited as part of an attack path
38
Vulnerability Analysis
Systematic identification and evaluation of vulnerabilities
39
Weakness
Defect or characteristic that can lead to undesirable behaviour