Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 5
The Inputs at Each Phase Defined in JASO TP15002 and Our Proposed Inputs(
,...,
).
| Phase # | Label | Input in the corresponding phase |
| 1 | | System configuration | 1 | | System function | 1 | ā | Information/data that the system handles |
| 2 | | System Preliminary condition | 2 | | System outline | 2 | | TOE Model | 2 | | Module Function List | 2 | | Lifecycle List |
| 3 | | TOE Model | 3 | | Module Function List | 3 | | Attack Ease for CRSS | 3 | | Effect Factor for CRSS | 3 | | Occurrence Possibility for RSMA | 3 | | Effect Factor for RSMA | 3 | | Exploitability for RSS-CVSSv3 | 3 | | Impact for RSS-CVSSv3 | 3 | | Occurrence Possibility for Q-RSMA | 3 | | Effect Factor for Q-RSMA |
|
|