Terms and Abbreviations Flashcards

1
Q

Architectural Design

A

Representation that allows for identification of components, their boundaries, interfaces and interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asset

A

Object that has value, or contributes to value
Has one more CS properties whose compromise can lead to one or more damage scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attack Feasibility

A

Attribute of an attack path describing the ease of successfully carrying out the corresponding set of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Path

A

Set of deliberate actions to realise a threat scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker

A

Person, group or org that carries out an attack path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Audit

A

Examination of a process to determine the extent to which the process objectives are achieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Component

A

Part that is logically and technically separable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Customer

A

Person or org that receives a service or product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cybersecurity aka Road Vehicle CS

A

Condition in which assets are sufficiently protected against threat scenarios to items of road vehicles, their functions and electrical or electronic components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CS Assessment

A

Judgement of CS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CS Case

A

Structured argument supported by evidence to state that risks are not unreasonable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CS Claim

A

Statement about a risk.
Justification for retaining or sharing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CS Concept

A

CS requirements of an item and requirements on its operational environment with associated information on the CS controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CS Control

A

Measure that is modifying the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CS Event

A

CS information that is relevant for an item or component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CS Goal

A

Concept-level CS requirement associated with one or more threat scenarios

17
Q

CS Incident

A

Situation in the field that can involve vulnerability exploitation

18
Q

CS Information

A

Information with regard to cybersecurity for which relevance is not yet determined

19
Q

CS Interface Agreement

A

Agreement between customer and supplier concerning distributed CS activities

20
Q

CS Property

A

Attribute that can be worth protecting

21
Q

CS Spec

A

CS requirements and corresponding architectural design

22
Q

Damage Scenario

A

Adverse consequences involving a vehicle or vehicle function and affecting a road user

23
Q

Distributed CS Activities

A

CS activities for the item or component whose responsibilities are distributed between customer and supplier

24
Q

Impact

A

Estimate of magnitude of damage or physical harm from a damage scenario

25
Q

Item

A

Component or set of components that implements a function at the vehicle level

26
Q

Operational Environment

A

Context considering interactions in operational use
Operational use of item or a component can include use in a vehicle function, in production and/or in service and repair

27
Q

Out-of-Context

A

Not developed in the context of a specific item

28
Q

Penetration Testing

A

Cybersecurity testing in which real-world attacks are mimicked to identify wats to compromise CS goals

29
Q

Risk
Cybersecurity Risk

A

Effect of uncertainty on Road Vehicle CS expressed in terms of attack feasibility and impact

30
Q

Risk Management

A

Coordinated activities to direct and control an organization with regard to risk

31
Q

Tailor

A

To omit or perform an activity in a different manner compared to its description in this document

32
Q

Threat Scenario

A

Potential cause of compromise of CS properties of one or more assets in order to realise a damage scenario

33
Q

Triage

A

Analysis to determine the relevance of CS information to an item or component

34
Q

Trigger

A

Criterion for triage

35
Q

Validation

A

Confirmation, through the provision of objective evidence, that the CS goals of the item are adequate and are achieved

36
Q

Verification

A

Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled

37
Q

Vulnerability

A

Weakness that can be exploited as part of an attack path

38
Q

Vulnerability Analysis

A

Systematic identification and evaluation of vulnerabilities

39
Q

Weakness

A

Defect or characteristic that can lead to undesirable behaviour