2019
DOI: 10.1002/j.2334-5837.2019.00588.x
|View full text |Cite
|
Sign up to set email alerts
|

An Evaluation Ontology Applied to Connected Vehicle Security Assurance

Abstract: Connected vehicles have great potential to benefit society, yet create huge challenges. Vehicles, infrastructure and enterprise activities combine to form massively complex systems of systems (SoSs) that are vulnerable to cyber‐attacks. Security is ill‐defined, making it difficult to achieve a consistent, common understanding of security capabilities across the diverse industries that collaborate to develop connected vehicles. Rigorous evaluation is essential for developing strong security assurance cases. Thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…This involves identifying potential gaps or weaknesses in the security controls, practices and architecture. Such findings are crucial in enabling stakeholders to make informed decisions regarding the system's security and to allocate resources effectively for risk mitigation (Peltier, 2005). The ultimate objective of SAE is to drive improvements in the system's security posture (Ouedraogo et al, 2012).…”
Section: Security Assurance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…This involves identifying potential gaps or weaknesses in the security controls, practices and architecture. Such findings are crucial in enabling stakeholders to make informed decisions regarding the system's security and to allocate resources effectively for risk mitigation (Peltier, 2005). The ultimate objective of SAE is to drive improvements in the system's security posture (Ouedraogo et al, 2012).…”
Section: Security Assurance Evaluationmentioning
confidence: 99%
“…Based on the evaluation findings and recommendations, stakeholders can prioritize remediation efforts, implement necessary security enhancements and allocate resources efficiently to address identified weaknesses. This iterative process ensures that the system's security posture evolves and improves over time, keeping up with the evolving threat landscape and maintaining a strong defense against potential cyber threats (Peltier, 2005;Sattarova Feruza and Kim, 2007).…”
Section: Security Assurance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation