• ITU-T X.1382 (03/2023)

    Current The latest, up-to-date edition.

    Guidelines for sharing security threat information on connected vehicles

    Available format(s):  Hardcopy, PDF

    Language(s):  English, French, Spanish, Castilian, Chinese, Russian

    Published date:  03-03-2023

    Publisher:  International Telecommunications Union (CCIR) and (CCITT)

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Scope
    2 References
    3 Definitions
    3.1 Terms defined elsewhere
    3.2 Terms defined in this Recommendation
    4 Abbreviations and acronyms
    5 Conventions
    6 Overview
    6.1 Types of threat information on connected vehicles
    6.2 Benefits and challenges of sharing threat information on connected vehicles
    7 Principles of sharing threat information on connected vehicles
    7.1 Mutual benefit
    7.2 Categorization and classification
    7.3 Data security
    8 Organization, role and partnership
    8.1 Organizations and their roles
    8.2 Sharing scopes among organizations
    8.3 Information sharing rules among organizations
    8.4 Establishing a sharing community
    9 Procedures and guidance for sharing threat information on connected vehicles
    9.1 Introduction
    9.2 Procedures of threat information sharing activities
    9.3 Guidance during phases in the procedure
    Appendix I – Best practice of Auto-ISAC's threat information sharing activities
    Appendix II – Methodology for evaluating the value of threat information
    Bibliography

    Abstract - (Show below) - (Hide below)

    Connected vehicles are facing increasingly prominent network security issues along with their rapid development.

    Scope - (Show below) - (Hide below)

    The purpose of this Recommendation is to provide guidelines for sharing threat information of connected vehicles ecosystems, including the roles and partnership of organizations, sharing scopes, procedures and requirements for sharing threat information of connected vehicles.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard Recommendation
    Product Note This standard also refers to NIST SP 800-150
    Publisher International Telecommunications Union (CCIR) and (CCITT)
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 27000:2018 Information technology — Security techniques — Information security management systems — Overview and vocabulary
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective