SlideShare a Scribd company logo
Role of Cyber security in Automotive
Connected car data security plays a crucial role as automakers enable advanced communications as well
as safety features. With this increased connectivity come better automotive cybersecurity risks as well.
The number of automotive cyberattacks has been increased. Presently, the average car includes up to
150 electronic control units as well as 100 million lines of software code. This figure is projected to reach
300 million lines of code by 2030.
Due to this, regulators have started to report the growing vulnerabilities in connected car data security.
With the increase in cybersecurity on cars and more risk, the industry needs standard procedures as well
as international regulations for automotive cybersecurity. Automakers in some countries will need to
become compliant with the new UNECE standards as well as change the way they work. The ISO 21434
standard can make the process to become compliant more transparent as well as sets the foundation to
get overall standardization.
Technological changes within the industry of automotive are complex. Many automakers will need to
align their connected car data security practices along with international regulations and standards as
well. The earlier they start preparing; they have better chance to implement the necessary changes with
automotive cyber security to comply with the new regulations as well as standards.

More Related Content

What's hot

Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training Course
Bryan Len
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
Kapil Kanugo
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2
Perforce
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway Market
Eurotech
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
Sasken Technologies Ltd.
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
CA API Management
 
WSO2 @ Connected Car
WSO2 @ Connected CarWSO2 @ Connected Car
WSO2 @ Connected CarWSO2
 
Qualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final PresentationQualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final Presentation
MookeunJi
 
Passenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and DevicesPassenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and Devices
Eurotech
 
Big Data and Internet of Things: Creating Customer Value for the Internet of ...
Big Data and Internet of Things:Creating Customer Value for the Internet of ...Big Data and Internet of Things:Creating Customer Value for the Internet of ...
Big Data and Internet of Things: Creating Customer Value for the Internet of ...
Red Bend Software
 
What is over-the-air programming
What is over-the-air programmingWhat is over-the-air programming
What is over-the-air programming
Sayed Abulhasan Quadri
 
Ppt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slidesharePpt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slideshare
Axis Communications
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
GGR Communications
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Eurotech
 
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR ToolingWebinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
KPIT
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET Journal
 
Automatic People and Passenger Counters
Automatic People and Passenger CountersAutomatic People and Passenger Counters
Automatic People and Passenger Counters
Eurotech
 
Connected Car Example
Connected Car Example Connected Car Example
Connected Car Example
Red Bend Software
 
Enable your networks to support enterprise mobility
Enable your networks to support enterprise mobilityEnable your networks to support enterprise mobility
Enable your networks to support enterprise mobility
Alcatel-Lucent Enterprise
 
S3_Group_ASIC_Control
S3_Group_ASIC_ControlS3_Group_ASIC_Control
S3_Group_ASIC_ControlAl McConnell
 

What's hot (20)

Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training Course
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2
 
IoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway MarketIoT and M2M Services for the Railway Market
IoT and M2M Services for the Railway Market
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
WSO2 @ Connected Car
WSO2 @ Connected CarWSO2 @ Connected Car
WSO2 @ Connected Car
 
Qualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final PresentationQualcomm Institute Winter IoT Program - Final Presentation
Qualcomm Institute Winter IoT Program - Final Presentation
 
Passenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and DevicesPassenger Counting / People Counting Applications and Devices
Passenger Counting / People Counting Applications and Devices
 
Big Data and Internet of Things: Creating Customer Value for the Internet of ...
Big Data and Internet of Things:Creating Customer Value for the Internet of ...Big Data and Internet of Things:Creating Customer Value for the Internet of ...
Big Data and Internet of Things: Creating Customer Value for the Internet of ...
 
What is over-the-air programming
What is over-the-air programmingWhat is over-the-air programming
What is over-the-air programming
 
Ppt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slidesharePpt citysurv as_a_service_en_slideshare
Ppt citysurv as_a_service_en_slideshare
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR ToolingWebinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
Webinar Presentation- Typical Challenges Faced by Tier 1s in AUTOSAR Tooling
 
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...IRJET-  	  Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
IRJET- Preventing Fake Page from Blackhat’s In Mobile Web Browsers using ...
 
Automatic People and Passenger Counters
Automatic People and Passenger CountersAutomatic People and Passenger Counters
Automatic People and Passenger Counters
 
Connected Car Example
Connected Car Example Connected Car Example
Connected Car Example
 
Enable your networks to support enterprise mobility
Enable your networks to support enterprise mobilityEnable your networks to support enterprise mobility
Enable your networks to support enterprise mobility
 
S3_Group_ASIC_Control
S3_Group_ASIC_ControlS3_Group_ASIC_Control
S3_Group_ASIC_Control
 

Similar to Role of Cyber security in Automotive

Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
PECB
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
Tonex
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
DorleControls
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
accenture
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
ParthaS
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
Lookout
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
IJCI JOURNAL
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
Hamzamohammed70
 
FOTA Upgrade on Automotive and IoT Industry
FOTA Upgrade on Automotive and IoT IndustryFOTA Upgrade on Automotive and IoT Industry
FOTA Upgrade on Automotive and IoT Industry
Embitel Technologies (I) PVT LTD
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismTyler Cragg
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industry
AkankshaPathak27
 
How IoT In Automotive Industry Is Transforming Smart Cars
 How IoT In Automotive Industry Is Transforming Smart Cars How IoT In Automotive Industry Is Transforming Smart Cars
How IoT In Automotive Industry Is Transforming Smart Cars
Mindfire LLC
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
Helene Andre
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
Symantec
 
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdfIoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
Lucas Lagone
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
PRIME
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Metaorange
 
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportConnected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Aranca
 
Connected cars a rising trend in the global automobile sector
Connected cars   a rising trend in the global automobile sectorConnected cars   a rising trend in the global automobile sector
Connected cars a rising trend in the global automobile sector
Aranca
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Mohan C. de SILVA
 

Similar to Role of Cyber security in Automotive (20)

Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...Design and Implementation of an Intelligent Safety and Security System for Ve...
Design and Implementation of an Intelligent Safety and Security System for Ve...
 
FOTA Upgrade on Automotive and IoT Industry
FOTA Upgrade on Automotive and IoT IndustryFOTA Upgrade on Automotive and IoT Industry
FOTA Upgrade on Automotive and IoT Industry
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industry
 
How IoT In Automotive Industry Is Transforming Smart Cars
 How IoT In Automotive Industry Is Transforming Smart Cars How IoT In Automotive Industry Is Transforming Smart Cars
How IoT In Automotive Industry Is Transforming Smart Cars
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdfIoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
IoT In Transportation Evolution_ Advancements In Autonomous Vehicles.pdf
 
IoT services in the automotive sector
IoT services in the automotive sectorIoT services in the automotive sector
IoT services in the automotive sector
 
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptxTrends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
Trends in Cybersecurity that Businesses Need to Look Out for in 2023.pptx
 
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportConnected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
 
Connected cars a rising trend in the global automobile sector
Connected cars   a rising trend in the global automobile sectorConnected cars   a rising trend in the global automobile sector
Connected cars a rising trend in the global automobile sector
 
Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016Compliance for Real-Time communications-June2016
Compliance for Real-Time communications-June2016
 

More from Sophia Lorenn

Family Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All AgesFamily Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All Ages
Sophia Lorenn
 
Medicaid Services in West Point, Mississippi
Medicaid Services in West Point, MississippiMedicaid Services in West Point, Mississippi
Medicaid Services in West Point, Mississippi
Sophia Lorenn
 
Smiling: The Universal Language
Smiling: The Universal LanguageSmiling: The Universal Language
Smiling: The Universal Language
Sophia Lorenn
 
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Sophia Lorenn
 
Ways to Boost Online Reputation
Ways to Boost Online ReputationWays to Boost Online Reputation
Ways to Boost Online Reputation
Sophia Lorenn
 
Pros and Cons of an Emergency Dentist
Pros and Cons of an Emergency DentistPros and Cons of an Emergency Dentist
Pros and Cons of an Emergency Dentist
Sophia Lorenn
 
Telehealth and Medicine
Telehealth and MedicineTelehealth and Medicine
Telehealth and Medicine
Sophia Lorenn
 
Smile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdfSmile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdf
Sophia Lorenn
 
What Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdfWhat Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdf
Sophia Lorenn
 
Healthcare IT Solutions Brochure
Healthcare IT Solutions BrochureHealthcare IT Solutions Brochure
Healthcare IT Solutions Brochure
Sophia Lorenn
 
Radian Video Wall Processor
Radian Video Wall ProcessorRadian Video Wall Processor
Radian Video Wall Processor
Sophia Lorenn
 
Pursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job OpportunitiesPursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job Opportunities
Sophia Lorenn
 
Data Center Solutions Flyer
Data Center Solutions FlyerData Center Solutions Flyer
Data Center Solutions Flyer
Sophia Lorenn
 
Black Box Flyer Conference Room Solutions
Black Box Flyer Conference Room SolutionsBlack Box Flyer Conference Room Solutions
Black Box Flyer Conference Room Solutions
Sophia Lorenn
 
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGEiCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
Sophia Lorenn
 
Power over Ethernet (PoE) Solutions
Power over Ethernet (PoE) SolutionsPower over Ethernet (PoE) Solutions
Power over Ethernet (PoE) Solutions
Sophia Lorenn
 
US Black Box control Room Solutions
US Black Box control Room SolutionsUS Black Box control Room Solutions
US Black Box control Room Solutions
Sophia Lorenn
 
US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205
Sophia Lorenn
 
Black Box Brochure Technology Solutions
Black Box Brochure Technology SolutionsBlack Box Brochure Technology Solutions
Black Box Brochure Technology Solutions
Sophia Lorenn
 
Interactive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: AdvantagesInteractive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: Advantages
Sophia Lorenn
 

More from Sophia Lorenn (20)

Family Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All AgesFamily Dental: Caring for Smiles of All Ages
Family Dental: Caring for Smiles of All Ages
 
Medicaid Services in West Point, Mississippi
Medicaid Services in West Point, MississippiMedicaid Services in West Point, Mississippi
Medicaid Services in West Point, Mississippi
 
Smiling: The Universal Language
Smiling: The Universal LanguageSmiling: The Universal Language
Smiling: The Universal Language
 
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
Unleashing the Power of a Creative Marketing Agency: Driving Innovation and S...
 
Ways to Boost Online Reputation
Ways to Boost Online ReputationWays to Boost Online Reputation
Ways to Boost Online Reputation
 
Pros and Cons of an Emergency Dentist
Pros and Cons of an Emergency DentistPros and Cons of an Emergency Dentist
Pros and Cons of an Emergency Dentist
 
Telehealth and Medicine
Telehealth and MedicineTelehealth and Medicine
Telehealth and Medicine
 
Smile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdfSmile, It Lets Your Teeth Breathe.pdf
Smile, It Lets Your Teeth Breathe.pdf
 
What Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdfWhat Are Different Dentistry Perks.pdf
What Are Different Dentistry Perks.pdf
 
Healthcare IT Solutions Brochure
Healthcare IT Solutions BrochureHealthcare IT Solutions Brochure
Healthcare IT Solutions Brochure
 
Radian Video Wall Processor
Radian Video Wall ProcessorRadian Video Wall Processor
Radian Video Wall Processor
 
Pursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job OpportunitiesPursue MBA from UP Colleges for Better Job Opportunities
Pursue MBA from UP Colleges for Better Job Opportunities
 
Data Center Solutions Flyer
Data Center Solutions FlyerData Center Solutions Flyer
Data Center Solutions Flyer
 
Black Box Flyer Conference Room Solutions
Black Box Flyer Conference Room SolutionsBlack Box Flyer Conference Room Solutions
Black Box Flyer Conference Room Solutions
 
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGEiCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
iCOMPEL SCALABLE, ROBUST DIGITAL SIGNAGE
 
Power over Ethernet (PoE) Solutions
Power over Ethernet (PoE) SolutionsPower over Ethernet (PoE) Solutions
Power over Ethernet (PoE) Solutions
 
US Black Box control Room Solutions
US Black Box control Room SolutionsUS Black Box control Room Solutions
US Black Box control Room Solutions
 
US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205US Black Box KVM Extenders and Switches 2205
US Black Box KVM Extenders and Switches 2205
 
Black Box Brochure Technology Solutions
Black Box Brochure Technology SolutionsBlack Box Brochure Technology Solutions
Black Box Brochure Technology Solutions
 
Interactive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: AdvantagesInteractive Electronic Technical Publications: Advantages
Interactive Electronic Technical Publications: Advantages
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Role of Cyber security in Automotive

  • 1. Role of Cyber security in Automotive Connected car data security plays a crucial role as automakers enable advanced communications as well as safety features. With this increased connectivity come better automotive cybersecurity risks as well. The number of automotive cyberattacks has been increased. Presently, the average car includes up to 150 electronic control units as well as 100 million lines of software code. This figure is projected to reach 300 million lines of code by 2030. Due to this, regulators have started to report the growing vulnerabilities in connected car data security. With the increase in cybersecurity on cars and more risk, the industry needs standard procedures as well as international regulations for automotive cybersecurity. Automakers in some countries will need to become compliant with the new UNECE standards as well as change the way they work. The ISO 21434 standard can make the process to become compliant more transparent as well as sets the foundation to get overall standardization. Technological changes within the industry of automotive are complex. Many automakers will need to align their connected car data security practices along with international regulations and standards as well. The earlier they start preparing; they have better chance to implement the necessary changes with automotive cyber security to comply with the new regulations as well as standards.