Posts

Showing posts with the label Cybersecurity

Introduction to ISO 21434 Terms - Continued

Image
Welcome to our second blog post of functionalsafetyfirst.com on Cybersecurity. In our previous article, we introduced you to some of the key ISO 21434 terms and applied them to the well-known Jeep Cherokee cyberattack. For those who may have missed it, you can find it here . In this article, we will explore additional ISO 21434 attack-related terminologies, using the same Jeep Cherokee cyberattack as example.  Attack related terms! - Weakness & Vulnerability Weakness - is a defect or flaw in an asset that can cause undesirable/unwanted behaviour. Examples: Missing requirement or specification Missing/Incorrect implementation of security protocols such as Media Access Control Security (MAC) for communication among ECUs in vehicle network Using outdated software without the latest security patches makes vehicles vulnerable to digital break-ins, as attackers may already know and exploit these security gaps A weakness of an asset may or may not lead to a vulnerability. For example,...

Introduction to Automotive Cybersecurity (ISO 21434) terms

Image
Welcome to our first ever blog post of functionalsafetyfirst.com on... Cybersecurity !! Cybersecurity in vehicles is evolving faster than ever — and much like functional safety, it’s become a non-negotiable pillar of modern automotive development. It’s no surprise that functional safety engineers are now exploring ISO/SAE 21434, while cybersecurity experts are diving into ISO 26262. The two worlds are converging rapidly. But if you’re a functional safety engineer stepping into cybersecurity for the first time, where do you start? How do you get comfortable with the “cyber language” — the new terms, the lifecycle, the regulations, and the mechanisms like encryption, secure boot, secure OTA, and intrusion detection? This article is our attempt to make that journey simpler. In this article, we will introduce you to a few terms used in the ISO 21434, with short relatable examples. Towards the end, we will look at applying these terms to one of the most prominent and publicized remote hacki...