Research Article
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
Table 7
An Example of Data Produced by Our Method.
| # | Where | Who | When | Why | What (At, Asset) | AE | EF | Risk Value |
| 1 | OBD-II | Outsider | In regular use | Maliciously | cause malfunction (CGW, Control function) | 3.9 | 9.2 | 6.6 |
|
|