Introduction to ISO 21434 Terms - Continued
Welcome to our second blog post of functionalsafetyfirst.com on Cybersecurity. In our previous article, we introduced you to some of the key ISO 21434 terms and applied them to the well-known Jeep Cherokee cyberattack. For those who may have missed it, you can find it here . In this article, we will explore additional ISO 21434 attack-related terminologies, using the same Jeep Cherokee cyberattack as example. Attack related terms! - Weakness & Vulnerability Weakness - is a defect or flaw in an asset that can cause undesirable/unwanted behaviour. Examples: Missing requirement or specification Missing/Incorrect implementation of security protocols such as Media Access Control Security (MAC) for communication among ECUs in vehicle network Using outdated software without the latest security patches makes vehicles vulnerable to digital break-ins, as attackers may already know and exploit these security gaps A weakness of an asset may or may not lead to a vulnerability. For example,...