Automotive cybersecurity

12345678
Across
  1. 2. group represents the characteristics of a vulnerability that may change over time.
  2. 4. Control the body and disable the braking system.
  3. 6. Track the vehicle, open the door, start the engine, and drive away.
  4. 8. The requirement for users to participate in the compromise of a vulnerable component.
Down
  1. 1. effects of an exploited vulnerability on the component.
  2. 3. The context by which vulnerability is being attacked.
  3. 4. The conditions that must exist to exploit the vulnerability
  4. 5. Connected vehicles invades location privacy.
  5. 7. level is an essential factor for vulnerability prioritization.