Cybersecurity Verification And Validation – Video course

What is cybersecurity verification and validation, which methods are available, and how is a V&V strategy developed?

As cybersecurity verification and validation is required by ISO/SAE 21434 and UN R155, having an understanding of both is essential. In this video course, you will learn the difference between verification and validation, as well as get an overview of V&V methods. Additionally, you will also learn which needs should be covered in a V&V strategy.

Watch video course
Cybersecurity verification and validation video course
Cybersecurity-Verification-and-Validation

Cybersecurity verification and validation: merging traditional and new methods

Verification and validation methods, otherwise known as V&V, have been present in automotive for decades to ensure the product indeed fulfills the requirement and the approach is the right one. But today, cybersecurity needs to also be embedded here as required by ISO/SAE 21434 and UN R155. Therefore, in this “Cybersecurity verification and validation” video course, we will explain V&V methods in the context of automotive cybersecurity.

First, we will highlight the importance of verification and validation in automotive cybersecurity. Then, to gain a common understanding, we will define the differences between validation and verification and provide a practical example to make the distinction clear.

Second, we will give you an overview of available verification and validation methods, besides testing, such as review, analysis, and simulations. We will also provide clear examples for each of the presented V&V methods.

Third, you will learn how you can reuse existing traditional V&V methods by merging them with new methods specific to cybersecurity. Moreover, you will learn why including cybersecurity in the V&V strategy is necessary to ensure systems are meeting requirements.

At last, we will provide you with some questions derived from ASPICE, which should be considered in the V&V strategy and make you aware of how cybersecurity impacts your V&V approach.

Who the Cybersecurity verification and validation video course is made for

For project and quality managers

In order to ensure the product is indeed fulfilling its requirements, there is no failure, and also that it fulfills its objective; verification and validation is required. Therefore, in this video course, you will learn how to reuse already existing methods in automotive and combine them with new methods to make them relevant for automotive cybersecurity.

For system and software engineers

As the professional involved in building and protecting systems, it is important to have an understanding of the cybersecurity verification and validation methods. This enables you to be aware of and perform the activities and analysis accordingly and provide evidence the product is indeed cybersecure.

Cybersecurity verification and validation – Video course content

I. Introduction to Cybersecurity verification and validation

In this section, we will highlight the importance of verification and validation, what the video course contains, and the learning objectives.

II. Difference between verification and validation

Understand what the purpose of verification is and how it differs from the purpose of validation in a side to side comparison. An automotive cybersecurity example is provided here.

III. Verification and validation methods: summary

Get an overview of available methods, besides testing, to apply V&V in a visual overview such as review, analysis, and simulations. Examples for each (e.g. Threat analysis and vulnerability analysis) will be provided.

IV. Cybersecurity verification and validation methods: a closer look

Learn which traditional methods have been present for decades already in automotive and how merging  them with new cybersecurity methods can suit them for automotive cybersecurity.

V. The need for cybersecurity verification and validation strategy

Comprehend what a cybersecurity verification and validation strategy is according to ASPICE and which needs should be considering when developing one.

VI. Expectations on verification and validation strategy

Here, we will provide some questions to make you aware how cybersecurity impacts your V&V approach and which should be answered also in the V&V strategy.

VII. Cybersecurity verification and validation summary

To wrap up this video course, we will go over the main lessons learned during the cybersecurity verification and validation video course.

More video courses related to Cybersecurity Verification and Validation

X