Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 29
Risk Score Comparison for Threat #6 Exploiting the Sensor Input.
| # | Who | When | Why | Where | What | | | | | CRSS | RSS-CVSSv3 | Q-RSMA | | | | | | | ( | At | Asset | ) | Score, Level | Score, Level | Score, Level |
| 6 | Outsider | Operation | Maliciously | Electromagnetic wave/ Supersonic wave | Tampering | | Position Sensor | Position information | | 6.81 Level II | 7.05 Level III | 6.00 Level II |
|
|