Security Analysis and Characteristical Constraints in the Automotive Domain

  • Marko Wolf


Based on the threat analysis in Chapter 5, this chapter describes how to identify the particular security objectives of the entities involved in typical automotive security-critical applications. It then describes how to deduce the corresponding security requirements to fulfill the before identified security objectives. It further indicates characteristical technical and non-technical constraints as well as characteristical advantages that have to be faced while establishing IT security in the automotive domain. Parts of this chapter are based on published research in [PW08, WWW07].


Security Requirement Security Analysis Security Measure Security Risk Vehicle Owner 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2009

Authors and Affiliations

  • Marko Wolf

There are no affiliations available

Personalised recommendations