SlideShare a Scribd company logo
1 of 12
Download to read offline
RichardWilson
Head of OperationalSecurity
GCC
Resume
UK MOD HMG DEEPTECH - AI
Operational
Security
• Vulnerability management
• Protective monitoring
• Incident management
• Configuration and change management
“Services must be operated and managed in a way to impede,
detect or prevent attacks”.
Mitigation
against
PhysicalAttack
Vectors
• Installing a network traffic monitoring and tampering alarm
in the vehicle that detects
unusual CAN messages (including messages sent at unusually
high rates) and transmit a
warning signal to fleet managers and manufacturer
cybersecurity team
• Implementing firewalls, whitelisting, and blacklisting of ECU
messages to prevent unsafe
Commands
• Employing secure coding practices and auditing the source
code
• Securing the entire vehicle’s networked functionalities with
mechanical fail-safe
mechanisms.
The challenge
Today’s cars have up to 150 electronic control units
By 2030, many observers expect them to have roughly 300
million lines of software code.
By way of comparison, today’s cars have about 100 million
lines of code. To put that into perspective:
• passenger aircraft has an estimated 15 million lines of
code.
• a modern fighter jet about 25 million.
• and a mass-market PC operating system close to 40 million.
AttackVectors
& Emerging
CyberThreats
If theSOC fits.
Part of the challenge for manufacturers is to find their way
through the huge range of cyber-security products and
services available in the marketplace.
There are very few standards against which to assess the
quality of individual products which can also make it difficult to
decide what is appropriate.
Journey PAS 1885 - the international standard on road vehicles that
discusses automotive cyber security across the lifetime.
WP. 29 The UNECE World Forum for Harmonization of Vehicle
Regulations.
UN Regulation No. 155 - Cyber security and cyber security
management system
ISO/SAE 21434 Road Vehicles – Cybersecurity Engineering
(August 2021).
CS &O-T-A
GRVA is the Working Party preparing draft regulations,
guidance documents and interpretation documents for
adoption by the parent body, WP.29.
Activities under the purview of GRVA
- Functional Requirements for Automated Vehicles (FRAV)
- Validation Method for Automated Driving (VMAD)
- Event Data Recorder and Data Storage System for Automated
Driving (EDR/DSSAD)
- Cyber Security and Over-The-Air issues (CS/OTA)
Stress testing
Cyber Insurance
& HealthChecks
Time for a cyber health check?
• Cyber insurance.
• GapAnalysis
• Maturity Modelling
TheUK’s
Public Sector
Cyber Security
Community
Local Law Enforcement. Whilst the picture varies across the
UK, almost all police forces now have a clearly identifiable
point of contact for dealing with cyber-security issues.
City of London Police andAction Fraud. Much of the cyber-
security challenge manifests itself as criminal activity and in
particular, fraud.
NationalCrime Agency (NCA). The NCA is home of the
National Cyber Crime Unit (NCCU) which coordinates the
national response to cyber-crime.
NationalCyber Security Centre (NCSC). The NCSC is
increasingly providing a central leadership and coordination
role in the public sector
So what,
what’s next?
Implementation of the raft of operational processes, developed
in accordance with the detailed requirements of the given
standard.
Compliance (including supply chain) of UNECE R-155
Handrailing ISO/SAE 21434 Road Vehicles – Cybersecurity
Engineering (August 2021). clauses 5 - 15

More Related Content

Similar to 13. CEMA - AUTOMOTIVE.pdf

Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car SecuritySuresh Mandava
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network securityFFRI, Inc.
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
Automotive Embedded Systems Handbook
Automotive Embedded Systems HandbookAutomotive Embedded Systems Handbook
Automotive Embedded Systems HandbookMaria Perkins
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communicationR prasad
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsSITA
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIfEngel
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communicationNitish Tanwar
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheValentin Scinteie
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief SummarySandeep Kar
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Peter Ashley
 

Similar to 13. CEMA - AUTOMOTIVE.pdf (20)

Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
What is Telematics & How Does It Work?
What is Telematics & How Does It Work?What is Telematics & How Does It Work?
What is Telematics & How Does It Work?
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network security
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
Automotive Embedded Systems Handbook
Automotive Embedded Systems HandbookAutomotive Embedded Systems Handbook
Automotive Embedded Systems Handbook
 
Inter vehicle communication
Inter vehicle communicationInter vehicle communication
Inter vehicle communication
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World AirportsCybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
Cybersecurity - Dominic Nessi, Former CIO, Los Angeles World Airports
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Wfcs2019
Wfcs2019Wfcs2019
Wfcs2019
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
cyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNIcyber security-in_civil_aviation_2012 august_CPNI
cyber security-in_civil_aviation_2012 august_CPNI
 
inter vehicle communication
inter vehicle communicationinter vehicle communication
inter vehicle communication
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, Karlshruhe
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief Summary
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3
 

More from PROFIBUS and PROFINET InternationaI - PI UK

More from PROFIBUS and PROFINET InternationaI - PI UK (20)

11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf
 
7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf
 
6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf
 
12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf
 
4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf
 
10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf
 
9. PA DIM presentation.pdf
9. PA DIM presentation.pdf9. PA DIM presentation.pdf
9. PA DIM presentation.pdf
 
3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf
 
2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf
 
PI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training CoursesPI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training Courses
 
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and TestingPI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
 
PI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design BasicsPI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design Basics
 
PI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET GatewaysPI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET Gateways
 
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device ConfigurationPI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
 
PI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of ThingsPI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of Things
 
PI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APLPI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APL
 
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
 
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020 PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
 
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter ThomasPROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter Thomas
 
Profinet network design webinar - Peter Thomas may 2020 - v1.0
Profinet network design webinar - Peter Thomas   may 2020 - v1.0Profinet network design webinar - Peter Thomas   may 2020 - v1.0
Profinet network design webinar - Peter Thomas may 2020 - v1.0
 

Recently uploaded

Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 

Recently uploaded (20)

Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 

13. CEMA - AUTOMOTIVE.pdf

  • 2. Resume UK MOD HMG DEEPTECH - AI
  • 3. Operational Security • Vulnerability management • Protective monitoring • Incident management • Configuration and change management “Services must be operated and managed in a way to impede, detect or prevent attacks”.
  • 4. Mitigation against PhysicalAttack Vectors • Installing a network traffic monitoring and tampering alarm in the vehicle that detects unusual CAN messages (including messages sent at unusually high rates) and transmit a warning signal to fleet managers and manufacturer cybersecurity team • Implementing firewalls, whitelisting, and blacklisting of ECU messages to prevent unsafe Commands • Employing secure coding practices and auditing the source code • Securing the entire vehicle’s networked functionalities with mechanical fail-safe mechanisms.
  • 5. The challenge Today’s cars have up to 150 electronic control units By 2030, many observers expect them to have roughly 300 million lines of software code. By way of comparison, today’s cars have about 100 million lines of code. To put that into perspective: • passenger aircraft has an estimated 15 million lines of code. • a modern fighter jet about 25 million. • and a mass-market PC operating system close to 40 million.
  • 7. If theSOC fits. Part of the challenge for manufacturers is to find their way through the huge range of cyber-security products and services available in the marketplace. There are very few standards against which to assess the quality of individual products which can also make it difficult to decide what is appropriate.
  • 8. Journey PAS 1885 - the international standard on road vehicles that discusses automotive cyber security across the lifetime. WP. 29 The UNECE World Forum for Harmonization of Vehicle Regulations. UN Regulation No. 155 - Cyber security and cyber security management system ISO/SAE 21434 Road Vehicles – Cybersecurity Engineering (August 2021).
  • 9. CS &O-T-A GRVA is the Working Party preparing draft regulations, guidance documents and interpretation documents for adoption by the parent body, WP.29. Activities under the purview of GRVA - Functional Requirements for Automated Vehicles (FRAV) - Validation Method for Automated Driving (VMAD) - Event Data Recorder and Data Storage System for Automated Driving (EDR/DSSAD) - Cyber Security and Over-The-Air issues (CS/OTA)
  • 10. Stress testing Cyber Insurance & HealthChecks Time for a cyber health check? • Cyber insurance. • GapAnalysis • Maturity Modelling
  • 11. TheUK’s Public Sector Cyber Security Community Local Law Enforcement. Whilst the picture varies across the UK, almost all police forces now have a clearly identifiable point of contact for dealing with cyber-security issues. City of London Police andAction Fraud. Much of the cyber- security challenge manifests itself as criminal activity and in particular, fraud. NationalCrime Agency (NCA). The NCA is home of the National Cyber Crime Unit (NCCU) which coordinates the national response to cyber-crime. NationalCyber Security Centre (NCSC). The NCSC is increasingly providing a central leadership and coordination role in the public sector
  • 12. So what, what’s next? Implementation of the raft of operational processes, developed in accordance with the detailed requirements of the given standard. Compliance (including supply chain) of UNECE R-155 Handrailing ISO/SAE 21434 Road Vehicles – Cybersecurity Engineering (August 2021). clauses 5 - 15