Cybersecurity

exida provides its experience in order to contribute to the success of its Customers Cybersecurity initiatives.


What is Cybersecurity

In the traditional information technology field, Security consists in the protection against non-authorized access to systems and system components, so as to avoid damage to the hardware and the software, theft of electronic data as well as disruption or malfunctioning of the provided services. Cybersecurity occurs when the essential aspect  is not only the protection of information resources, but also the safeguard of humans using them. In the Cybersecurity context, humans are considered both, potential targets of cyber-attacks and agents, unknowingly participating in the cyber-attacks.

The topics related to the Cybersecurity are becoming more and more relevant, due to the increase of information technology items and goods, (e.g. smartphones, vehicles, houses, televisions, …), usually integrated to Internet, therefore extremely vulnerable, normally used by an increasing number of people. Due to the complexity of this topic, in terms of social aspects (e.g. the privacy regulation) and technological implications, Cybersecurity is one of the major challenges in the contemporary world.

Cybersecurity Standards

SAE J3061 (Automotive)
The SAE J3061 has been the foundation for the development of the ISO/SAE 21434 standard. It provides a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems. It defines the life cycle process framework, from concept phase through production, operation, service, and decommissioning, and provides information on some common existing tools and methods used while designing, verifying and validating cyber-physical vehicle systems.

ISO/SAE 21434 (Automotive)
This standard aims at managing the Cybersecurity of electrical and electronic systems in road vehicles, similar to how ISO 26262 manages the Functional Safety aspects. Just as the FuSa approach is based on the analysis of the possible failures, having the Hazard Analysis Risk Assessment (HARA) as a starting point, the Cybersecurity begins by the analysis of the possible attacks and related potential  leaks that allow them, having as incipit the Threats Analysis Risk Assessment (TARA).




exida footer logo

We provide consulting, assessment, cybersecurity, alarm management, product testing and certification under a number of Functional Safety, Security and SW Quality standards, such as IEC 61508, IEC 61511, ISO 26262, ISO 13849, IEC 62061, ISA Security Compliance Institute (ISCI), ASPICE


Contacts

All Rights Reserved © 2020 exida.com GmbH VAT-ID (DE)218559059 | exida Development SrL VAT-ID (IT)10166460013

Info Cookie

This site uses cookie, including third parties cookie, in order to improve and optimize the content usability.
By closing this banner or just browsing within the various areas of this web site you agree to their use in conformity to our Cookie Policy.