This overview paper presents attacker incentives and the most importantsecurity risks that are identi_x000C_ed for the parts that make up a cooperativemobility system. For cooperative systems, the application data integritymust be validated to determine if values can be trusted. Furthermore,secure alternatives will be required for positioning, in order to be usableby safety critical systems. To create a secure in-vehicle system, it shouldbe secure by design