Guidelines for sharing security threat information on connected vehicles |
|
Connected vehicles are facing increasingly prominent network security issues along with their rapid development. Security threat information of connected vehicles, which plays an integral role in securing connected vehicles, is any information that can help an organization identify, assess, monitor, and respond to a connected vehicle. Organizations that share threat information for connected vehicles can improve their own security postures and those of other organizations.
Recommendation ITU-T X.1382 provides guidance on the principles, rules, methodology and procedures of sharing security information for connected vehicles. It also provides a brief description of the different scopes, roles and effectiveness of the various organizations while they engage in the lifecycle of security threat information sharing.
This Recommendation is intended to help organizations stay in touch with the connected vehicles sharing community and to contribute threat information which would support the practices of connected vehicles safety protection. Overall, this Recommendation aims to enhance security threat information sharing and mitigate the potential impact of cybersecurity attacks on connected vehicles.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/15104 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1370-X.1399: Intelligent transportation system (ITS) security |
Approval date: |
2023-03-03 |
Provisional name: | X.fstiscv |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
[7 related work items in progress]
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1382 (03/2023)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|