ITU-T X.1382 (03/2023)
Current
The latest, up-to-date edition.
Guidelines for sharing security threat information on connected vehicles
Hardcopy , PDF
English, French, Spanish, Castilian, Chinese, Russian
03-03-2023
1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
6.1 Types of threat information on connected vehicles
6.2 Benefits and challenges of sharing threat information on connected vehicles
7 Principles of sharing threat information on connected vehicles
7.1 Mutual benefit
7.2 Categorization and classification
7.3 Data security
8 Organization, role and partnership
8.1 Organizations and their roles
8.2 Sharing scopes among organizations
8.3 Information sharing rules among organizations
8.4 Establishing a sharing community
9 Procedures and guidance for sharing threat information on connected vehicles
9.1 Introduction
9.2 Procedures of threat information sharing activities
9.3 Guidance during phases in the procedure
Appendix I – Best practice of Auto-ISAC's threat information sharing activities
Appendix II – Methodology for evaluating the value of threat information
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.