Research Article

A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design

Table 5

The Inputs at Each Phase Defined in JASO TP15002 and Our Proposed Inputs(,..., ).

Phase # Label Input in the corresponding phase

1 System configuration
1 System function
1ā€‰ Information/data that the system handles

2 System Preliminary condition
2 System outline
2 TOE Model
2 Module Function List
2 Lifecycle List

3 TOE Model
3 Module Function List
3 Attack Ease for CRSS
3 Effect Factor for CRSS
3 Occurrence Possibility for RSMA
3 Effect Factor for RSMA
3 Exploitability for RSS-CVSSv3
3 Impact for RSS-CVSSv3
3 Occurrence Possibility for Q-RSMA
3 Effect Factor for Q-RSMA