What is CycurRISK

Automobiles that have been released in recent years have various functions electronically controlled by ECUs, including the basic functions of "running, turning, and stopping." Along with this, cyber security threats in automobiles, such as communication between ECUs and access to the cloud using OTA technology, are expanding. In the automotive industry, we are hearing more and more about the word cyber security.


Threat analysis and risk assessment (TARA*) are required at the stage prior to project planning as a cybersecurity measure, to discover potential attack areas in in-vehicle systems at an early stage and implement TARA. The software tool for this is ESCRYPT CycurRISK.

*Threat Analysis and Risk Assessment

What is TARA

TARA is an abbreviation for Threat Analysis and Risk Assessment, and is an engineering method for identifying and evaluating cybersecurity vulnerabilities and selecting measures to mitigate those vulnerabilities.

ESCRYPT CycurRISK allows you to systematically identify and analyze threats through attack feasibility using attack trees. Damage scenarios are used to assess the business impact of drivers and automotive OEMs/suppliers, presenting threat scenarios and risks to specific systems in the form of structured documentation. CycurRISK enables you to prioritize risks and countermeasures and create security concepts that comply with the requirements of security engineering processes, ISO/SAE 21434 and UN-R155.

Product Summary

Features

  • Proven tools widely used in the automotive industry
  • Continuous product updates and improvements based on years of experience in automotive security
  • Capable of implementing TARA (Threat Analysis and Risk Assessment) in accordance with ISO/SAE 21434
  • Prioritize risks and countermeasures and create security concepts that comply with security engineering processes, ISO/SAE 21434 and UN-R155 requirements
  • Maintenance and support system by highly specialized professionals
  • Highly configurable and flexible report templates

Conducting an efficient threat analysis and risk assessment (TARA)

  • Workflow-oriented guidance
  • User-friendly GUI
  • Comparison of initial risk and residual risk
  • Automatic generation of executive summaries
  • Integrated attack tree editor and automatic calculation of attack potential
  • Attack potential method support with automatic calculation of attack potential
  • Catalog TARA results for reuse including threats, controls, and assumptions
  • Advanced features for handling analytes and their variants, including configuration for each variant

Inquiry

ETAS manufacturer information TOP

If you want to return to ETAS Manufacturer Information Top, please click below.