Verification and Validation (V&V for short) are of absolute importance in the domain of automotive cybersecurity. What is it all about? How do they differ? And - even more important - to what extent are existing V&V procedures influenced by cybersecurity? You will find answers to these questions in this video course “Cybersecurity Verification and Validation (G5_5)”.
In the first part of the video, we will give you an overview for both validation and verification by defining them and pointing out the difference between them by giving you an example of how both can be applied to cybersecurity control. Additionally, we will give you examples of verification and validation methods to show you that there are more methods to consider other than testing.
In the next part of the video, we will clarify what happens when combining traditional verification and validation methods with methods specifically tailored for cybersecurity. Then we will talk about the need for cybersecurity when applying these methods to ensure that systems are designed according to requirements. After that, it's about the need for a cybersecurity V&V strategy. Finally, we will give some ideas on how verification and validation come together with cybersecurity by listing questions that are derived from Automotive SPICE and should be considered in advance of verification and validation.