SlideShare a Scribd company logo
1 of 15
Download to read offline
The New Assembly Line
3 BEST PRACTICES FOR BUILDING
(SECURE) CONNECTED CARS
Connected cars are about to change
the auto industry’s assembly line.
Vehicles are becoming computers on wheels
and now have more in common with your
laptop than they do the Model T.
Just as smartphones have supplanted non-
Internet-connected phones, connected cars
will supplant non-Internet-connected cars.
Auto manufacturers need to become
software companies if they want to
survive into the 21st century.
The auto industry must now consider cybersecurity
as an integral part to how cars are built, just as
physical safety became a critical part of how cars
were built in the late 20th century.
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two outcomes often occurs.
 
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two outcomes often occurs.
 
If there are clear security
best practices, then most
companies will (hopefully)
implement those best
practices.
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two outcomes often occurs.
 
If there are no clear best
practices, companies will likely
make a lot of security mistakes,
resulting in major cybersecurity
problems down the road.
How do we make cars
resilient in the face of
cyberattacks?
How do we make cars
resilient in the face of
cyberattacks?
In our research, we have found that if the auto industry is to
build vehicles that are resistant to cyberattack, they must
implement three important measures.
An over-the-air update process: Ideally without the owner having
to subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place, it’s
important that any gateway systems receive an extreme amount of
security scrutiny.
Hardening each individual component: A resilient automotive
cybersecurity architecture should assume that attackers will
compromise some component (e.g. the web browser). That single
component compromise should not affect the functionality of the
system as a whole.
1
An over-the-air update process: Ideally without the owner having to
subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place,
it’s important that any gateway systems receive an extreme
amount of security scrutiny.
Hardening each individual component: A resilient automotive
cybersecurity architecture should assume that attackers will
compromise some component (e.g. the web browser). That single
component compromise should not affect the functionality of the
system as a whole.
2
An over-the-air update process: Ideally without the owner having to
subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place, it’s
important that any gateway systems receive an extreme amount of
security scrutiny.
Hardening each individual component: A resilient automotive
cybersecurity architecture should assume that attackers will
compromise some component (e.g. the web browser). That single
component compromise should not affect the functionality of the
system as a whole.
3
Read Hacking a Tesla Model S: What we found and what we learned

More Related Content

What's hot

What's hot (20)

Right Cloud Mindset: Survey Results Hospitality | Accenture
Right Cloud Mindset: Survey Results Hospitality | AccentureRight Cloud Mindset: Survey Results Hospitality | Accenture
Right Cloud Mindset: Survey Results Hospitality | Accenture
 
Digital Marketing Plan- Netflix
Digital Marketing Plan- NetflixDigital Marketing Plan- Netflix
Digital Marketing Plan- Netflix
 
Artificial Intelligence: Have No Fear
Artificial Intelligence: Have No FearArtificial Intelligence: Have No Fear
Artificial Intelligence: Have No Fear
 
Renault ZOE marketing plan
Renault  ZOE marketing planRenault  ZOE marketing plan
Renault ZOE marketing plan
 
AI – Opportunities and Challenges in Transforming the Biopharma Value Chain
AI – Opportunities and Challenges in Transforming the Biopharma Value ChainAI – Opportunities and Challenges in Transforming the Biopharma Value Chain
AI – Opportunities and Challenges in Transforming the Biopharma Value Chain
 
Disrupting the Disruptors: Accenture Post and Parcel Industry Research 2018
Disrupting the Disruptors: Accenture Post and Parcel Industry Research 2018Disrupting the Disruptors: Accenture Post and Parcel Industry Research 2018
Disrupting the Disruptors: Accenture Post and Parcel Industry Research 2018
 
BCG-Executive-Perspectives-Ukraine-Industrial-Impact-14April2022.pdf
BCG-Executive-Perspectives-Ukraine-Industrial-Impact-14April2022.pdfBCG-Executive-Perspectives-Ukraine-Industrial-Impact-14April2022.pdf
BCG-Executive-Perspectives-Ukraine-Industrial-Impact-14April2022.pdf
 
BCG_Meta Report
BCG_Meta ReportBCG_Meta Report
BCG_Meta Report
 
What Does the Recovery of Demand for Urban Mobility Look Like Post-COVID-19?
What Does the Recovery of Demand for Urban Mobility Look Like Post-COVID-19?What Does the Recovery of Demand for Urban Mobility Look Like Post-COVID-19?
What Does the Recovery of Demand for Urban Mobility Look Like Post-COVID-19?
 
True Luxury - 2014/2015 - BCG
True Luxury - 2014/2015 - BCGTrue Luxury - 2014/2015 - BCG
True Luxury - 2014/2015 - BCG
 
Global Asset Management 2014: Steering the Course to Growth
Global Asset Management 2014: Steering the Course to GrowthGlobal Asset Management 2014: Steering the Course to Growth
Global Asset Management 2014: Steering the Course to Growth
 
Analytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolutionAnalytics Trends 2016: The next evolution
Analytics Trends 2016: The next evolution
 
2017 china internet report bcg
2017 china internet report bcg2017 china internet report bcg
2017 china internet report bcg
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
Advertising analytics 2.0
Advertising analytics 2.0Advertising analytics 2.0
Advertising analytics 2.0
 
Urban Mobility Is Evolving in Unexpected Ways Due to COVID-19
Urban Mobility Is Evolving in Unexpected Ways Due to COVID-19Urban Mobility Is Evolving in Unexpected Ways Due to COVID-19
Urban Mobility Is Evolving in Unexpected Ways Due to COVID-19
 
Chevorlet Consumer behavior
Chevorlet Consumer behaviorChevorlet Consumer behavior
Chevorlet Consumer behavior
 
Driving Change in Racial Equity
Driving Change in Racial Equity Driving Change in Racial Equity
Driving Change in Racial Equity
 
Cracking the Code on Consumer Fraud | Accenture
Cracking the Code on Consumer Fraud | AccentureCracking the Code on Consumer Fraud | Accenture
Cracking the Code on Consumer Fraud | Accenture
 
Accenture Consumer Behavior Research: The value shake-up
Accenture Consumer Behavior Research: The value shake-upAccenture Consumer Behavior Research: The value shake-up
Accenture Consumer Behavior Research: The value shake-up
 

Similar to The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars

WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
Symantec
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
IJCI JOURNAL
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
Greg Harms
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
Tonex
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
Tyler Cragg
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
CODE BLUE
 

Similar to The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars (20)

Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
IRJET- Vehicle Cyber Security
IRJET- Vehicle Cyber SecurityIRJET- Vehicle Cyber Security
IRJET- Vehicle Cyber Security
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
Vehicle technology software updates
Vehicle technology software updatesVehicle technology software updates
Vehicle technology software updates
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
 
Role of Cyber security in Automotive
Role of Cyber security in AutomotiveRole of Cyber security in Automotive
Role of Cyber security in Automotive
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 
Dumb and dumber or fast and furious
Dumb and dumber or fast and furiousDumb and dumber or fast and furious
Dumb and dumber or fast and furious
 

More from Lookout

2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
 

More from Lookout (20)

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 

Recently uploaded

如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
avy6anjnd
 
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdfJohn Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
Excavator
 
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
nirzagarg
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
gajnagarg
 
👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...
👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...
👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...
Call Girls Mumbai
 
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl ServiceFULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
dollysharma2066
 
Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...
Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...
Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...
Hyderabad Escorts Agency
 
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
wsppdmt
 

Recently uploaded (20)

Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be WrongIs Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
 
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
 
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime NashikNashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
Nashik Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nashik
 
Premium Call Girls Aurangabad Call Girls 💯Call Us 🔝 6378878445 🔝 💃 Top Class ...
Premium Call Girls Aurangabad Call Girls 💯Call Us 🔝 6378878445 🔝 💃 Top Class ...Premium Call Girls Aurangabad Call Girls 💯Call Us 🔝 6378878445 🔝 💃 Top Class ...
Premium Call Girls Aurangabad Call Girls 💯Call Us 🔝 6378878445 🔝 💃 Top Class ...
 
Amreli } Russian Call Girls Ahmedabad - Phone 8005736733 Escorts Service at 6...
Amreli } Russian Call Girls Ahmedabad - Phone 8005736733 Escorts Service at 6...Amreli } Russian Call Girls Ahmedabad - Phone 8005736733 Escorts Service at 6...
Amreli } Russian Call Girls Ahmedabad - Phone 8005736733 Escorts Service at 6...
 
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdfJohn Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
John Deere Tractors 5415 Diagnostic Repair Service Manual.pdf
 
Call Girls Pimple Saudagar ( Pune ) 9352988975 Visit Shobha_De At ( beautiese...
Call Girls Pimple Saudagar ( Pune ) 9352988975 Visit Shobha_De At ( beautiese...Call Girls Pimple Saudagar ( Pune ) 9352988975 Visit Shobha_De At ( beautiese...
Call Girls Pimple Saudagar ( Pune ) 9352988975 Visit Shobha_De At ( beautiese...
 
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
 
👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...
👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...
👉Goa Call Girl Service👉📞9701288194👉📞 Just📲 Call Rajveer Call Girls Service In...
 
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Darbhanga [ 7014168258 ] Call Me For Genuine Models...
 
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
Bhubaneswar🌹Vip Call Girls Odisha❤Heer 9777949614 💟 Full Trusted CALL GIRLS I...
 
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
Harni Road ? Cheap Call Girls In Ahmedabad - 450+ Call Girl Cash Payment 8005...
 
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl ServiceFULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
FULL ENJOY 8377087607 Call Girls In Paharganj (DELHI NCr) Call Girl Service
 
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
 
Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...
Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...
Faridabad * Call Girls Badarpur | Whatsapp No 📞 8168257667 📞 VIP Escorts Serv...
 
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
 
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In DubaiStacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
 
Only Cash On Delivery Call Girls Service In Chennai 💯Niamh 📲🔝6378878445🔝Call...
Only Cash On Delivery Call Girls Service In Chennai  💯Niamh 📲🔝6378878445🔝Call...Only Cash On Delivery Call Girls Service In Chennai  💯Niamh 📲🔝6378878445🔝Call...
Only Cash On Delivery Call Girls Service In Chennai 💯Niamh 📲🔝6378878445🔝Call...
 
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service AvailableKolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
Kolkata Call Girls Bengal 👉👉 0000000000 Top Class Call Girl Service Available
 

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars

  • 1. The New Assembly Line 3 BEST PRACTICES FOR BUILDING (SECURE) CONNECTED CARS
  • 2. Connected cars are about to change the auto industry’s assembly line.
  • 3. Vehicles are becoming computers on wheels and now have more in common with your laptop than they do the Model T.
  • 4. Just as smartphones have supplanted non- Internet-connected phones, connected cars will supplant non-Internet-connected cars.
  • 5. Auto manufacturers need to become software companies if they want to survive into the 21st century.
  • 6. The auto industry must now consider cybersecurity as an integral part to how cars are built, just as physical safety became a critical part of how cars were built in the late 20th century.
  • 7. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.  
  • 8. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.   If there are clear security best practices, then most companies will (hopefully) implement those best practices.
  • 9. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.   If there are no clear best practices, companies will likely make a lot of security mistakes, resulting in major cybersecurity problems down the road.
  • 10. How do we make cars resilient in the face of cyberattacks?
  • 11. How do we make cars resilient in the face of cyberattacks? In our research, we have found that if the auto industry is to build vehicles that are resistant to cyberattack, they must implement three important measures.
  • 12. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 1
  • 13. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 2
  • 14. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 3
  • 15. Read Hacking a Tesla Model S: What we found and what we learned