TARA / Attack Tree / Vulnerability Analysis
In the early phase of its development cycle, a cyber-physical system requires TARA (Threat Analysis and Risk Assessment) activities to be performed to identify potential cyber security threats including unauthorized access or malicious attack and assess the risks of identified security threats. Depending on the size of applicable system and the purpose of analysis, TARA can be performed by a wide range of methods including, but not limited to, E-Safety Vehicle Intrusion Protected Applications (EVITA), Threat and Operability Analysis (THROP), Threat, Vulnerabilities, and implementation Risks Analysis (TVRA), Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE), HEAling Vulnerabilities to ENhance Software Security and Safety (HEAVENS), and Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege (STRIDE).
Employing its ample experiences in cyber security threat analysis projects for automotive domains (powertrain, chassis, body, infotainment system, etc.) and public domains covering critical infrastructure (air transport, railroad, utility, etc.) SOLUTIONLINK delivers methods to identify potential threats to prevent and minimize cyber attacks, offering training and coaching programs for systematic assessment of risks of each applicable potential threat.