Adapting ISO/SAE 21434 for Effective Cyber Risk Management in Modern Vehicles Engineering and Project Management [Insert Date]
Research Motivation - Growing digitization and connectivity in modern vehicles - Rising incidents of cyberattacks in the automotive sector - Need for a robust cybersecurity framework - Regulatory and market pressures
Research Objectives - Examine ISO/SAE 21434 applicability - Assess standard adaptation for better risk management - Explore implementation challenges and best practices - Develop a risk framework aligned with ISO/SAE 21434
Research Questions - How well does ISO/SAE 21434 address cybersecurity threats? - What are its adoption and implementation limitations? - How can it be adapted for evolving threats? - What can be learned from industry case studies?
Industry and Technological Context - Modern vehicle systems: ECUs, CAN, ADAS, V2X - Cybersecurity for functional safety - Regulations: UNECE WP.29, GDPR, NHTSA - Impact of AI and OTA updates
PESTEL Analysis - Political: Regulations and compliance - Economic: Cost of non-compliance - Social: User trust and privacy - Technological: Evolving threats - Environmental: Lifecycle management - Legal: Cyber laws and standards
Case Studies - Jeep Cherokee Hack (2015) - Tesla OTA vulnerability - ISO/SAE 21434 adoption by OEMs - Lessons: Proactive vs. reactive security
Research Methodology - Approach: Qualitative case study & framework analysis - Sources: Whitepapers, standards, interviews - Analysis: Gap identification, standard mapping
Key Findings - ISO/SAE 21434 is a strong base, needs adaptation - Challenges: Scalability, supply chain integration - Cybersecurity must span the vehicle lifecycle - Cross-industry collaboration is key
Conclusion & Future Work - ISO/SAE 21434 is vital but not standalone - Needs dynamic, risk-based adaptation - Future: AI threat intelligence, predictive analytics - Continuous collaboration and regulatory updates