Refine Your Search

Topic

Search Results

Viewing 1 to 5 of 5
Standard

Cybersecurity Guidebook for Cyber-Physical Vehicle Systems

2021-12-15
CURRENT
J3061_202112
This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and expanded on from, existing practices which are being implemented or reported in industry, government and conference papers. ...Other proprietary Cybersecurity development processes and standards may have been established to support a specific manufacturer’s development processes, and may not be comprehensively represented in this document, however, information contained in this document may help refine existing in-house processes, methods, etc. ...This recommended practice establishes a set of high-level guiding principles for Cybersecurity as it relates to cyber-physical vehicle systems. This includes: Defining a complete lifecycle process framework that can be tailored and utilized within each organization’s development processes to incorporate Cybersecurity into cyber-physical vehicle systems from concept phase through production, operation, service, and decommissioning.
Training / Education

DO-326A and ED-202A An Introduction to the New and Mandatory Aviation Cyber-Security Essentials

2024-07-29
This course will introduce participants to industry best practices for real-world aviation cyber-security risk-assessment, development & assurance. Participants will learn the information necessary to help minimize DO-326/ED-202-set compliance risks and costs, while also optimizing cyber-security levels for the development, deployment and in-service phases Topics such as aircraft security aspects of safety, systems-approach to security, security planning, the airworthiness security process, and security effectiveness assurance will be covered.
Journal Article

Threat Identification and Defense Control Selection for Embedded Systems

2020-08-18
Abstract Threat identification and security analysis have become mandatory steps in the engineering design process of high-assurance systems, where successful cyberattacks can lead to hazardous property damage or loss of lives. This article describes a novel approach to perform security analysis on embedded systems modeled at the architectural level. The tool, called Security Threat Evaluation and Mitigation (STEM), associates threats from the Common Attack Pattern Enumeration and Classification (CAPEC) library with components and connections and suggests potential defense patterns from the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security standard. This article also provides an illustrative example based on a drone package delivery system modeled in AADL.
Magazine

SAE Truck & Off-Highway Engineering: April 2018

2018-04-05
Connectivity takes center stage Telematic links have become the norm, helping fleet owners and operators improve efficiency and letting OEMs predict component failures. More power, less noise, fewer emissions These key attributes drive development of new generators both big and small. TARDEC pursues advanced power generation U.S. Army, GM collaborate on fuel-cell-generated electricity to power the vehicle's propulsion system and onboard electronics, while providing off-vehicle power via an Exportable Power Take-Off unit. Developing an alternative engine concept Ricardo's CryoPower engine leverages two unique combustion techniques for reduced emissions and fuel consumption-liquid nitrogen and split combustion. Long-haul trucking and stationary power generation will be the first beneficiaries of the technologies. Technology time-warp The road to autonomous driving has been under construction for decades, as showcased by SAE's Mobility History Committee at the 2018 WCX in Detroit.
X