driving worldwide business excellence

Writing Effective Requirements, Test Cases, and H/S Interfaces for Cybersecurity

Home > Automotive Cybersecurity > Writing Effective Requirements, Test Cases, and H/S Interfaces for Cybersecurity

Seminar Content

To decrease the possibility of cybersecurity attacks, security by design has to be an integral part of the development lifecycle. Writing effective requirements, test cases, and hardware/software interfaces are critical components of the secure by design approach. This two day seminar provides guidance on writing effective requirements, test cases, and hardware/software interfaces (HSI) to help achieve cybersecurity goals. It will explain how to use the building blocks of a TARA (threat analysis and risk assessment) to specify effective requirements, test cases, and HSI. An overview of ISO 21434, ISO 27001, and United Nations (UN) regulation WP.29 will also be provided.

Who Should Attend

Those involved in the design, development, and production of electrical and electronic based vehicle products, including the systems, software and hardware engineers, and managers. Basically, all those responsible for the development and implementation of hardware and software systems in motor vehicles.

Participants should be, or plan to be, actively managing, or involved in, or aware of the development of electrical and/or electronic items, systems, or elements that are incorporated in motor vehicles. Participants should also have the abilities, education, and experience required for the above roles.

Recommended Training and/or Experience

Participants should be involved in or aware of Cybersecurity development as it relates to the vehicle industry.

Seminar Materials

Each participant will receive a seminar manual including breakout exercises.

Seminar Goals

  • Determine the role and importance of Cybersecurityrequirements
  • Determine the role and importance of the Cybersecurity test cases
  • Determine the role and importance of the Cybersecurity HSI.
  • Write effective requirements, test cases, and HIS based on HARA building blocks

Seminar Outline

Day 1

  • Building blocks of TARA per ISO 21434
  • Breakout 1: Reviewing a TARA
  • Threat identification
  • (Introduction to the Running Case Study for an Air Bag Cybersecurity Case. Walk thru of Air Bag Cybersecurity Goal development though Functional Cybersecurity Concept)
  • Breakout 2:High level architecture of an Air Bag system
  • Breakout 3:Identifying threats for the air bag case study
  • Attack tree generation
  • Breakout 4: Develop an attack tree for the air bag case study
  • Writing effective requirements

Day 2

  • Test case derivation
  • Breakout 5:Specify cybersecurity requirements and test cases for the air bag case study
  • Threat Modeling
  • Breakout 6:Determining threats for the air bag case study
  • Risk Countermeasures
  • Breakout 7: Listing countermeasures for the for the air bag case study.
  • Specification of Hardware/Software interfaces
  • Summary

Writing Effective Requirements, Test Cases, and H/S Interfaces for Cybersecurity

Search for Training

Course Keyword:

Series:

Start Date:

/ /

End Date:

/ /

Location:

Plantech-Omnex Partnership ppapandaudits