Risk ThreatAnalysis 201902 JLE
Risk ThreatAnalysis 201902 JLE
Risk ThreatAnalysis 201902 JLE
➢ Analysis Breakdown
➢ System Analysis
➢ Threat Analysis
➢ Risk Analysis
➢ Summary
Attack
Detection and
Security
Response Assessment
Security
Lifecycle
Monitor and Goals, Policies,
Manage Planning
Training,
Enforcement,
Implementation
Attack Security
Detection and
Response Assessment
Analysis
Security
Lifecycle
Monitor and Goals, Policies,
Manage Planning
Training,
Enforcement,
Implementation
Attack Security
Detection and
Response Assessment
Analysis
Security
Lifecycle
Monitor and Planning
Goals, Policies,
Manage Planning
Training,
Enforcement,
Implementation
Attack Security
Detection and
Response Assessment
Analysis
Security
Lifecycle
Monitor and Planning
Goals, Policies,
Execution
Manage Planning
Training,
Enforcement,
Implementation
Risk is evaluated by understanding the external threats and actors that can attack vulnerable assets,
resulting in damage or loss.
• System security analysis is the process of identifying the boundaries and assets of the system,
understanding the system vulnerabilities and evaluating the damage that would result from a
successful attack.
• Threat analysis is the process of identifying and understanding the threats and their actors,
evaluating their capabilities and motivations.
• Risk analysis combines the results of the threat and system analyses to create a priority-ordered list
of risks and associated controls. This list provides the overview of what must be done to reduce risk
to acceptable levels.
CIA
Triad
Page 8 Risk Analysis and Threat Analysis, Dr. Joachim Leder, 2019, 8
System Analysis
Example: ADAS / AD
3rd Party
3rd Party
Apps
Information
OEM Apps Cloud
OTA Update*
Infrastructure Vehicles
7 2 Perception 3 Interpretation
4 Applications
Lane Keep
Assistance
Vehicle Dynamics and Behavior Situation
Actors Control Planning Prediction Blind Spot
Warning
Execution …
6 5 Planning
Risk Assessment
• C: Low
• I: Low Attack Feasibility Assessment
• A: Moderate • C: Highly feasible
• I: Highly feasible
• C&I: Moderate to low feasibility
Risk Treatment • A: Moderate feasibility
• C: Ignore
• I: Higher weighting for internal sensor data
combined with strong plausibility checking
• A: Fallback mode based on local data and
processing capability only.
Risk Analysis and Threat Analysis, Dr. Joachim Leder, 2019, 10
V2X
System Analysis
V2I
RF transmit/receiver: V2V
V2P connection to vehicle
(periodic send and
continuous receive)
Safety -
driver/bystanders
loss of control. Loss Loss of control
of superficial
notifications.
unlikely, minor
injuries possible.
risk of crash.
Moderate injury
possible.
Serious injury, loss of car. Loss of life
limbs possible,
survival probable.
possible, survival
uncertain.
affected. Loss of life
targeted and survival
uncertain.
Triad
Unpredicted but Significant and Massive financial
manageable cost exceptional cost impact over an
Negligable cost. Minor and budgeted (e.g. replacement of Unpredicted but over a short period extended period of
Resolvable without cost (e.g. minor whole device). manageable cost. of time. Reputation time (e.g. loss of car
OEM - Reputation modification of the optional or hidden Reputation still Reputation damaged temporarily severely sales, multiple
and Financial vehicle. update). intact. but fixable. damaged. recalls).
Longer term
Minor but longer significant drop in
Minor but short term quality of life quality of life. Serious drop in
End User - not
safety.
term quality of life
drop. Manageable
drop. Temporary
financial trouble
Significant assitance lifestyle required. Long term quality of
with money required Permanent drop in life affected.
Suppress received information
Financial, Quality of financial trouble. (e.g. car broken). (e.g. car stolen). quality of life. Secret Bankrupt. Top secret
Life, Privacy, User
Experience
Negligable cost,
minor annoyance.
User is unsatisfied
with the car.
Information in
danger.
Information
compromised.
information
compromised.
information
compromised. IL4
Script kiddies
Competitors
Researchers
Individual criminals /
terrorists
Criminal / terrorists
groups
Foreign states
Capability
(skills & resources) Attack Feasibility Assessment
Competitors medium+
Researchers high-
Capability
(skills & resources) Attack Feasibility Assessment
Competitors medium+
MOTIVATION
Researchers high-
Capability
(skills & resources) Attack Feasibility Assessment
Motivation
Negligible Low Moderate Substantial Severe
Individual criminals / Medium
high- 1 2 3 4 5
terrorists Low Low Moderate Severe Severe
High
2 2 3 5 5
Criminal / high Low Moderate Substantial Severe Critical
terrorists groups Very High
2 3 4 5 6
Foreign states very high
Filter/modify received
Information IL5
Spoof vehicle ID
IL4
Risk Treatment
Filter/modify received
Information IL5
IL TL
Spoof vehicle ID
CAL =
6
IL4
Cybersecurity Assurance Level
Risk Assessment Suppress received
Information IL4
Risk Treatment
Filter/modify received
1.7 3.3 2.5
Information IL5
Spoof vehicle ID
1.3 2.7 2.0
IL4
Risk Treatment
Spoof vehicle ID 1) Compare V2V information with input from other sensors (e.g. V2I)
IL3 IL4 2) Detect conflicts between V2V and other channels
Risk Treatment
Filter/modify received
1.3 2.7 2.0
Information IL4
Spoof vehicle ID
1.0 2.0 1.5
IL3
Risk Treatment
• System Analysis
• Identify assets and the consequences/damage when they are compromised
• Assess impact → IL
• Threat Analysis
• Assess vulnerabilities
• Identify aggressors, their goals and their capabilities/motivations
Analysis
• Assess threat → TL
• Risk Analysis
• Understand damage that would result from successful attack
• Estimate severity of risk → CAL
• Define risk/threat catalogue
• Specify mitigations for risks
• Prioritisation
• Define rating criteria (effort, timing, cost,…)
Planning • Prioritize risk/threat catalogue, including mitigation concepts
• Mitigation
• Describe mitigation concepts for all relevant Risks/Threats