Terms & Abbreviated terms Flashcards

(26 cards)

1
Q

CAL

A

Cybersecurity assurance level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CVSS

A

Common vulnerability scoring system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

E/E

A

Electrical and electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ECU

A

Electronic control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OBD

A

On-board diagnostic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OEM

A

Original equipment manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PM

A

Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RC

A

Recommendation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RQ

A

Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RASIC

A

Responsible, accountable, supporting, informed, consulted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TARA

A

Threat analysis and risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WP

A

Work product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3.1.1 architectural design

A

representation that allows for identification of components (3.1.7), their boundaries,
interfaces and interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3.1.2 asset

A

object that has value, or contributes to value Note 1 to entry: An asset has one or more cybersecurity properties (3.1.20) whose compromise can lead to one or more damage scenarios (3.1.22).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3.1.3 attack feasibility

A

attribute of an attack path (3.1.4) describing the ease of successfully carrying out the corresponding set of actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3.1.4 attack path

A

attack set of deliberate actions to realize a threat scenario (3.1.33)

17
Q

3.1.5 attacker

A

person, group, or organization that carries out an attack path (3.1.4)

18
Q

3.1.6 audit

A

examination of a process to determine the extent to which the process objectives are achieved [SOURCE: ISO 26262-1:2018 [1], 3.5, modified — The phrase “with regard to” was substituted by “to determine the extent to which” and “are achieved” was added.]

19
Q

3.1.7 component

A

part that is logically and technically separable

20
Q

3.1.8 customer

A

person or organization that receives a service or product
[SOURCE: ISO 9000:2015 [2], 3.2.4, modified — The phrase “could or does receive” was replaced by “receives”, the phrase “that is intended for or required by this person or organization” was omitted, and the example and note 1 to entry were omitted.]

21
Q

3.1.9 cybersecurity road vehicle cybersecurity

A

condition in which assets (3.1.2) are sufficiently protected against threat scenarios (3.1.33) to items (3.1.25) of road vehicles, their functions and their electrical or electronic components (3.1.7) Note 1 to entry: In this document, for the sake of brevity, the term cybersecurity is used instead of road vehicle cybersecurity.

22
Q

3.1.10 cybersecurity assessment

A

judgement of cybersecurity (3.1.9)

23
Q

3.1.11 cybersecurity case

A

structured argument supported by evidence to state that risks (3.1.29) are not unreasonable

24
Q

3.1.12 cybersecurity claim

A

statement about a risk (3.1.29) Note 1 to entry: The cybersecurity claim can include a justification for retaining or sharing the risk.

25
3.1.13 cybersecurity concept
cybersecurity requirements of the item (3.1.25) and requirements on the operational environment (3.1.26), with associated information on cybersecurity controls (3.1.14)
26
3.1.14 cybersecurity control
measure that is modifying risk (3.1.29) [SOURCE: ISO 31000:2018 [3], 3.8, modified — The word "cybersecurity" was added to the term, the phrase “maintains and/or” was deleted, the notes to entry were deleted.