driving worldwide business excellence

Writing Effective Requirements, Test Cases, and H/S Interfaces for Cybersecurity

Home > Automotive Cybersecurity > Writing Effective Requirements for Cybersecurity

Seminar Content

To decrease the possibility of cybersecurity attacks, security by design has to be an integral part of the development lifecycle. Writing effective requirements, test cases, and hardware/software interfaces are critical components of the secure by design approach. This two day seminar provides guidance on writing effective requirements, test cases, and hardware/software interfaces (HSI) to help achieve cybersecurity goals. It will explain how to use the building blocks of a TARA (threat analysis and risk assessment) to specify effective requirements, test cases, and HSI.

Who Should Attend

Those involved in the design, development, and production of electrical and electronic based vehicle products, including the systems, software and hardware engineers, and managers.  Basically, all those responsible for the development and implementation of hardware and software systems in motor vehicles.

Participants should be, or plan to be, actively managing, or involved in, or aware of the development of electrical and/or electronic items, systems, or elements that are incorporated in motor vehicles.  Participants should also have the abilities, education, and experience required for the above roles.

Recommended Training and/or Experience

Participants should be involved in or aware of Cybersecurity development as it relates to the vehicle industry.

Seminar Materials

Each participant will receive a seminar manual including case studies.

Seminar Goals

  • Importance of the Cybersecurity requirements
  • Importance of the Cybersecurity test cases
  • Importance of the Cybersecurity HSI.
  • Using HARA building blocks to write effective requirements, test cases, and HSI.

Seminar Outline

Day 1

  • Building blocks of TARA
  • Breakout 1: Reviewing a TARA
  • Threat identification
  • (Introduction to the Running Case Study for an Air Bag Cybersecurity Case. Walk thru of Air Bag Cybersecurity Goal development though Functional Cybersecurity Concept)
  • Breakout 2: High level architecture of an Air Bag system
  • Breakout 3: Identifying threats for the air bag case study
  • Attack tree generation
  • Breakout 4: Develop an attack tree for the air bag case study
  • Writing effective requirements

Day 2

  • Test case derivation
  • Breakout 5: Specify cybersecurity requirements and test cases for the air bag case study
  • Hardware Threat Modeling
  • Breakout 6: Hardware threats for the air bag case study
  • Software Countermeasures
  • Breakout 7: Listing software countermeasures for the for the air bag case study.
  • Hardware/Software interfaces
  • Summary

Writing Effective Requirements, Test Cases, and H/S Interfaces for Cybersecurity

Search for Training

Course Keyword:

Series:

Start Date:

/ /

End Date:

/ /

Location:

Plantech-Omnex Partnership ppapandaudits