Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of
preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD/PoCD.
For PHDs/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to
identification of cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment
uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of
Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System
(eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring,
mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an
acceptable level of risk.
Required fields are indicated with *