Terms & Abbreviated terms Flashcards
(26 cards)
CAL
Cybersecurity assurance level
CVSS
Common vulnerability scoring system
E/E
Electrical and electronic
ECU
Electronic control unit
OBD
On-board diagnostic
OEM
Original equipment manufacturer
PM
Permission
RC
Recommendation
RQ
Requirement
RASIC
Responsible, accountable, supporting, informed, consulted
TARA
Threat analysis and risk assessment
WP
Work product
3.1.1 architectural design
representation that allows for identification of components (3.1.7), their boundaries,
interfaces and interactions
3.1.2 asset
object that has value, or contributes to value Note 1 to entry: An asset has one or more cybersecurity properties (3.1.20) whose compromise can lead to one or more damage scenarios (3.1.22).
3.1.3 attack feasibility
attribute of an attack path (3.1.4) describing the ease of successfully carrying out the corresponding set of actions
3.1.4 attack path
attack set of deliberate actions to realize a threat scenario (3.1.33)
3.1.5 attacker
person, group, or organization that carries out an attack path (3.1.4)
3.1.6 audit
examination of a process to determine the extent to which the process objectives are achieved [SOURCE: ISO 26262-1:2018 [1], 3.5, modified — The phrase “with regard to” was substituted by “to determine the extent to which” and “are achieved” was added.]
3.1.7 component
part that is logically and technically separable
3.1.8 customer
person or organization that receives a service or product
[SOURCE: ISO 9000:2015 [2], 3.2.4, modified — The phrase “could or does receive” was replaced by “receives”, the phrase “that is intended for or required by this person or organization” was omitted, and the example and note 1 to entry were omitted.]
3.1.9 cybersecurity road vehicle cybersecurity
condition in which assets (3.1.2) are sufficiently protected against threat scenarios (3.1.33) to items (3.1.25) of road vehicles, their functions and their electrical or electronic components (3.1.7) Note 1 to entry: In this document, for the sake of brevity, the term cybersecurity is used instead of road vehicle cybersecurity.
3.1.10 cybersecurity assessment
judgement of cybersecurity (3.1.9)
3.1.11 cybersecurity case
structured argument supported by evidence to state that risks (3.1.29) are not unreasonable
3.1.12 cybersecurity claim
statement about a risk (3.1.29) Note 1 to entry: The cybersecurity claim can include a justification for retaining or sharing the risk.