Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 6
Output at Each Phase in JASO TP15002.
| Phase # | Label | Output in the corresponding phase |
| 1 | | TOE Model | 1 | | Module Function List | 1 | | Life-cycle List |
| 2 | | Assumptions List | 2 | | Threat List | 2 | | Organizational security policies List | 3 | | (Prioritized) Threats List | 3 | | FT |
|
|