SlideShare a Scribd company logo
1 of 1
Download to read offline
Role of Cyber security in Automotive
Connected car data security plays a crucial role as automakers enable advanced communications as well
as safety features. With this increased connectivity come better automotive cybersecurity risks as well.
The number of automotive cyberattacks has been increased. Presently, the average car includes up to
150 electronic control units as well as 100 million lines of software code. This figure is projected to reach
300 million lines of code by 2030.
Due to this, regulators have started to report the growing vulnerabilities in connected car data security.
With the increase in cybersecurity on cars and more risk, the industry needs standard procedures as well
as international regulations for automotive cybersecurity. Automakers in some countries will need to
become compliant with the new UNECE standards as well as change the way they work. The ISO 21434
standard can make the process to become compliant more transparent as well as sets the foundation to
get overall standardization.
Technological changes within the industry of automotive are complex. Many automakers will need to
align their connected car data security practices along with international regulations and standards as
well. The earlier they start preparing; they have better chance to implement the necessary changes with
automotive cyber security to comply with the new regulations as well as standards.

More Related Content

What's hot

Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseBryan Len
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Perforce
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketEurotech
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
WSO2 @ Connected Car
WSO2 @ Connected CarWSO2 @ Connected Car
WSO2 @ Connected CarWSO2
 
Qualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final PresentationQualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final PresentationMookeunJi
 
Passenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and DevicesPassenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and DevicesEurotech
 
Big Data and Internet of Things: Creating Customer Value for the Internet of ...
Big Data and Internet of Things:Creating Customer Value for the Internet of ...Big Data and Internet of Things:Creating Customer Value for the Internet of ...
Big Data and Internet of Things: Creating Customer Value for the Internet of ...Red Bend Software
 
Ppt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slidesharePpt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slideshareAxis Communications
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsGGR Communications
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Eurotech
 
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR ToolingWebinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR ToolingKPIT
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET Journal
 
Automatic People and Passenger Counters
Automatic People and Passenger CountersAutomatic People and Passenger Counters
Automatic People and Passenger CountersEurotech
 
Enable your networks to support enterprise mobility
Enable your networks to support enterprise mobilityEnable your networks to support enterprise mobility
Enable your networks to support enterprise mobilityAlcatel-Lucent Enterprise
 
S3_Group_ASIC_Control
S3_Group_ASIC_ControlS3_Group_ASIC_Control
S3_Group_ASIC_ControlAl McConnell
 

What's hot (20)

Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training Course
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway Market
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
WSO2 @ Connected Car
WSO2 @ Connected CarWSO2 @ Connected Car
WSO2 @ Connected Car
 
Qualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final PresentationQualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final Presentation
 
Passenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and DevicesPassenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and Devices
 
Big Data and Internet of Things: Creating Customer Value for the Internet of ...
Big Data and Internet of Things:Creating Customer Value for the Internet of ...Big Data and Internet of Things:Creating Customer Value for the Internet of ...
Big Data and Internet of Things: Creating Customer Value for the Internet of ...
 
What is over-the-air programming
What is over-the-air programmingWhat is over-the-air programming
What is over-the-air programming
 
Ppt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slidesharePpt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slideshare
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR ToolingWebinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
 
Automatic People and Passenger Counters
Automatic People and Passenger CountersAutomatic People and Passenger Counters
Automatic People and Passenger Counters
 
Connected Car Example
Connected Car Example Connected Car Example
Connected Car Example
 
Enable your networks to support enterprise mobility
Enable your networks to support enterprise mobilityEnable your networks to support enterprise mobility
Enable your networks to support enterprise mobility
 
S3_Group_ASIC_Control
S3_Group_ASIC_ControlS3_Group_ASIC_Control
S3_Group_ASIC_Control
 

Similar to Role of Cyber security in Automotive

Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?PECB
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Hamzamohammed70
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismTyler Cragg
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industryAkankshaPathak27
 
How IoT In Automotive Industry Is Transforming Smart Cars
 How IoT In Automotive Industry Is Transforming Smart Cars How IoT In Automotive Industry Is Transforming Smart Cars
How IoT In Automotive Industry Is Transforming Smart CarsMindfire LLC
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sectorHelene Andre
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdfIoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdfLucas Lagone
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sectorPRIME
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxMetaorange
 
Connected cars a rising trend in the global automobile sector
Connected cars   a rising trend in the global automobile sectorConnected cars   a rising trend in the global automobile sector
Connected cars a rising trend in the global automobile sectorAranca
 
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportConnected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportAranca
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Mohan C. de SILVA
 

Similar to Role of Cyber security in Automotive (20)

Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
 
FOTA Upgrade on Automotive and IoT Industry
FOTA Upgrade on Automotive and IoT IndustryFOTA Upgrade on Automotive and IoT Industry
FOTA Upgrade on Automotive and IoT Industry
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industry
 
How IoT In Automotive Industry Is Transforming Smart Cars
 How IoT In Automotive Industry Is Transforming Smart Cars How IoT In Automotive Industry Is Transforming Smart Cars
How IoT In Automotive Industry Is Transforming Smart Cars
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdfIoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
Connected cars a rising trend in the global automobile sector
Connected cars   a rising trend in the global automobile sectorConnected cars   a rising trend in the global automobile sector
Connected cars a rising trend in the global automobile sector
 
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportConnected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
 

More from Sophia Lorenn

Family Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All AgesFamily Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All AgesSophia Lorenn
 
Medicaid Services in West Point, Mississippi
Medicaid Services in West Point, MississippiMedicaid Services in West Point, Mississippi
Medicaid Services in West Point, MississippiSophia Lorenn
 
Smiling: The Universal Language
Smiling: The Universal LanguageSmiling: The Universal Language
Smiling: The Universal LanguageSophia Lorenn
 
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...Sophia Lorenn
 
Ways to Boost Online Reputation
Ways to Boost Online ReputationWays to Boost Online Reputation
Ways to Boost Online ReputationSophia Lorenn
 
Pros and Cons of an Emergency Dentist
Pros and Cons of an Emergency DentistPros and Cons of an Emergency Dentist
Pros and Cons of an Emergency DentistSophia Lorenn
 
Telehealth and Medicine
Telehealth and MedicineTelehealth and Medicine
Telehealth and MedicineSophia Lorenn
 
Smile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdfSmile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdfSophia Lorenn
 
What Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdfWhat Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdfSophia Lorenn
 
Healthcare IT Solutions Brochure
Healthcare IT Solutions BrochureHealthcare IT Solutions Brochure
Healthcare IT Solutions BrochureSophia Lorenn
 
Radian Video Wall Processor
Radian Video Wall ProcessorRadian Video Wall Processor
Radian Video Wall ProcessorSophia Lorenn
 
Pursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job OpportunitiesPursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job OpportunitiesSophia Lorenn
 
Data Center Solutions Flyer
Data Center Solutions FlyerData Center Solutions Flyer
Data Center Solutions FlyerSophia Lorenn
 
Black Box Flyer Conference Room Solutions
Black Box Flyer Conference Room SolutionsBlack Box Flyer Conference Room Solutions
Black Box Flyer Conference Room SolutionsSophia Lorenn
 
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGEiCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGESophia Lorenn
 
Power over Ethernet (PoE) Solutions
Power over Ethernet (PoE) SolutionsPower over Ethernet (PoE) Solutions
Power over Ethernet (PoE) SolutionsSophia Lorenn
 
US Black Box control Room Solutions
US Black Box control Room SolutionsUS Black Box control Room Solutions
US Black Box control Room SolutionsSophia Lorenn
 
US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205Sophia Lorenn
 
Black Box Brochure Technology Solutions
Black Box Brochure Technology SolutionsBlack Box Brochure Technology Solutions
Black Box Brochure Technology SolutionsSophia Lorenn
 
Interactive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: AdvantagesInteractive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: AdvantagesSophia Lorenn
 

More from Sophia Lorenn (20)

Family Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All AgesFamily Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All Ages
 
Medicaid Services in West Point, Mississippi
Medicaid Services in West Point, MississippiMedicaid Services in West Point, Mississippi
Medicaid Services in West Point, Mississippi
 
Smiling: The Universal Language
Smiling: The Universal LanguageSmiling: The Universal Language
Smiling: The Universal Language
 
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
 
Ways to Boost Online Reputation
Ways to Boost Online ReputationWays to Boost Online Reputation
Ways to Boost Online Reputation
 
Pros and Cons of an Emergency Dentist
Pros and Cons of an Emergency DentistPros and Cons of an Emergency Dentist
Pros and Cons of an Emergency Dentist
 
Telehealth and Medicine
Telehealth and MedicineTelehealth and Medicine
Telehealth and Medicine
 
Smile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdfSmile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdf
 
What Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdfWhat Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdf
 
Healthcare IT Solutions Brochure
Healthcare IT Solutions BrochureHealthcare IT Solutions Brochure
Healthcare IT Solutions Brochure
 
Radian Video Wall Processor
Radian Video Wall ProcessorRadian Video Wall Processor
Radian Video Wall Processor
 
Pursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job OpportunitiesPursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job Opportunities
 
Data Center Solutions Flyer
Data Center Solutions FlyerData Center Solutions Flyer
Data Center Solutions Flyer
 
Black Box Flyer Conference Room Solutions
Black Box Flyer Conference Room SolutionsBlack Box Flyer Conference Room Solutions
Black Box Flyer Conference Room Solutions
 
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGEiCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
 
Power over Ethernet (PoE) Solutions
Power over Ethernet (PoE) SolutionsPower over Ethernet (PoE) Solutions
Power over Ethernet (PoE) Solutions
 
US Black Box control Room Solutions
US Black Box control Room SolutionsUS Black Box control Room Solutions
US Black Box control Room Solutions
 
US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205
 
Black Box Brochure Technology Solutions
Black Box Brochure Technology SolutionsBlack Box Brochure Technology Solutions
Black Box Brochure Technology Solutions
 
Interactive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: AdvantagesInteractive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: Advantages
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Role of Cyber security in Automotive

  • 1. Role of Cyber security in Automotive Connected car data security plays a crucial role as automakers enable advanced communications as well as safety features. With this increased connectivity come better automotive cybersecurity risks as well. The number of automotive cyberattacks has been increased. Presently, the average car includes up to 150 electronic control units as well as 100 million lines of software code. This figure is projected to reach 300 million lines of code by 2030. Due to this, regulators have started to report the growing vulnerabilities in connected car data security. With the increase in cybersecurity on cars and more risk, the industry needs standard procedures as well as international regulations for automotive cybersecurity. Automakers in some countries will need to become compliant with the new UNECE standards as well as change the way they work. The ISO 21434 standard can make the process to become compliant more transparent as well as sets the foundation to get overall standardization. Technological changes within the industry of automotive are complex. Many automakers will need to align their connected car data security practices along with international regulations and standards as well. The earlier they start preparing; they have better chance to implement the necessary changes with automotive cyber security to comply with the new regulations as well as standards.