BSI PD ISO/TR 17427-6:2015
$167.15
Intelligent transport systems. Cooperative ITS – ‘Core system’ risk assessment methodology
Published By | Publication Date | Number of Pages |
BSI | 2015 | 34 |
The scope of this Technical Report is to identify critical technical and financial risks that can impact the core system deployment supporting C-ITS vehicle and highway systems service provision and to provide means to evaluate such risks.
This Technical Report is designed to embrace C-ITS vehicle and highway systems where there is some institutional involvement and support, by the direct or indirect provision of core system support, and it is the risks associated with the deployment of āCore Systemsā that provide the focus of this Technical Report.
This Technical Report does not provide a calculated āglobalā risk assessment for C-ITS, but identifies the principal causes of risk, and provides a consistent methodology for a jurisdiction, core system operator, or application service provider, to assess the risks that they face. The objective of this Technical Report is to raise awareness of and consideration of such issues and to give pointers, where appropriate, to standards deliverables existing that provide specifications for all or some of these aspects. This Technical Report does not provide specifications for solutions of these issues.
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Terms and definitions |
10 | 3 Abbreviated terms 4 How to use this Technical Report 4.1 Acknowledgements |
11 | 4.2 C-ITS āCore Systemā risks |
13 | 4.3 āCore Systemā overview |
14 | 4.4 Non āCore Systemā risks |
15 | 5 Tools to assess risk 5.1 General 5.1.1 Technology risk 5.1.2 Technical risk 5.1.3 Financial risk 5.1.4 Liability 5.2 Operational phases of risk assessment |
16 | 5.3 Risk evaluation explanation |
18 | 5.4 Categorization of risk |
19 | 6 Risks for the core system 6.1 Risks associated with an individual āCore Systemā 6.1.1 Timely deployment |
20 | 6.1.2 Relationships between āCore Systemsā and external enterprises |
21 | 6.1.3 Adequate operations and maintenance personnel 6.2 Risks associated with multiple āCore Systemsā |
22 | 6.2.1 Role and makeup of the āCore Certification Authorityā |
24 | 6.2.2 External support system (ESS) for security |
25 | 6.2.3 Operations and maintenance (O&M) of the security āExternal Support Systemā (ESS) |
26 | 6.2.4 Security management |
27 | 6.2.5 System performance management |
28 | 6.2.6 Privacy |
29 | 6.2.7 Device certification 6.3 Consideration of other risks |
31 | Bibliography |