Requirements are the ingredients for a good product but do not on their own lead to the expected results. The key is their interpretation and implementation. Modern product specifications in the automotive industry often include security requirements. Save time in learning how to adhere to the security requirements by getting an in-depth overview of the five most common TARA methodologies. In this module, we go over the details of each methodology and compare and contrast their strengths and limitations. We close off with a case study where we use a set of predefined security requirements. We follow a TARA process using the different available methodologies and propose technical specifications. We pay special attention to the meaning and effective implementation of these security requirements.
This is the second of the three-part series of security training in automotive.
Benefits: You save money and time by accelerating the process of writing technical solutions that meet the OEMs’ security requirements. You learn to ask the right questions and avoid common pitfalls in the implementation There is no way around the self-study of the methodologies, but we can give you a jumpstart and guide you through the entire process.
-2 hours live webinar
-1 hour optional homework
-1 hour live Q&A session
You selected to get the course Automotive: Security Requirements Engine.... Please Login or Signup to get it.