"* Preconditions: Traffic monitoring system shall provide mechanism that includes protection against counterfeiting or modification of transferred information and shall enable detection of such event. * Input conditions / steps: simulation of counterfeiting or modification of transferred information form the traffic system to the server * Expected result: Any information transferred to the server should be verified (server-side) whether message was counterfeited/modified or not. Such incident shall be immediately reported."
* Preconditions: Integrity of SW on the unit and the data transmitted to the central system * Input conditions / steps: A modified SW component * Expected result: The system should validate and detect that the software is not legitimate and not run the software
"* Preconditions: Data transmitted over the network by traffic monitoring system should stay confidential (Confidentiality of data transmitted). * Input conditions / steps: A network capture * Expected result: When transmitting data over network, in the event of network capturing, examining and analyzing captured packages should not route to their destination and assemble into acquired traffic information. No sensitive information should be revealed"
"* Preconditions: Data transmitted over the network by traffic monitoring system should stay confidential (Confidentiality of data transmitted). * Input conditions / steps: A network capture * Expected result: When transmitting data over network, in the event of network capturing, examing and analyzing captured packages should not route to their destination and assemble into acquired traffic information. No sensitive information should be revealed"