The Vulnerability Analysis provides a structured analysis method for vulnerabilities in elements of the design. The related editor is an adaptation of the FMEA table structure drawing the focus on vulnerabilities instead of failures or limitations. For further information on how to create and edit this analysis see section System Weakness Analysis in the User Guide.
Example:
The following screenshot shows the architecture of a Software-Update-Over-the-Air system. The column Known System Design Weaknesses lists the vulnerabilities of the involved components. In the column Triggering Conditions those attacks can be linked that exploit the corresponding vulnerability. The column Vehicle Level Effect can reference either threats, hazards or malfunctions that could be caused by this exploited vulnerability.
