This document discusses automotive cyber security. It begins by outlining the evolution of automotive technology and the increased connectivity of modern vehicles. This connectivity introduces new security challenges as vehicles can be attacked remotely by hackers. The document then classifies different types of attackers and attacks, including logical and physical attacks. It discusses methods for secure component identification using cryptography and physically unclonable functions. The document also covers secure software initialization, updates, and architectures. Finally, it discusses secure vehicular communication.