Across
- 2. group represents the characteristics of a vulnerability that may change over time.
- 4. Control the body and disable the braking system.
- 6. Track the vehicle, open the door, start the engine, and drive away.
- 8. The requirement for users to participate in the compromise of a vulnerable component.
Down
- 1. effects of an exploited vulnerability on the component.
- 3. The context by which vulnerability is being attacked.
- 4. The conditions that must exist to exploit the vulnerability
- 5. Connected vehicles invades location privacy.
- 7. level is an essential factor for vulnerability prioritization.
