Security Analysis and Characteristical Constraints in the Automotive Domain
Based on the threat analysis in Chapter 5, this chapter describes how to identify the particular security objectives of the entities involved in typical automotive security-critical applications. It then describes how to deduce the corresponding security requirements to fulfill the before identified security objectives. It further indicates characteristical technical and non-technical constraints as well as characteristical advantages that have to be faced while establishing IT security in the automotive domain. Parts of this chapter are based on published research in [PW08, WWW07].
KeywordsSecurity Requirement Security Analysis Security Measure Security Risk Vehicle Owner
Unable to display preview. Download preview PDF.