SlideShare a Scribd company logo
Cisco ConfidentialCisco IBSG © 2011 Cisco and/or its affiliates. All rights reserved. Internet Business Solutions Group 1
Andreas Mai
Director Smart Connected Vehicles
April 2014
Mission Critical: Security
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Daily Security IntelligenceDaily Web RequestsDeployed Security DevicesApplications
& Micro-Applications
100TB
Security
Intelligence
1.6M
Deployed
Devices
13B
Web Requests
150,000
Micro-
applications
1,000
Applications
93B
Daily Email
Messages
35%
Enterprise Email
5,500
IPS Signatures
150M
Deployed
Endpoints
3-5 min
Updates
Security Intelligence Operations:
• Broadest Visibility
• Global Footprint
• Defense in Depth
5B
Daily Email
Connections
4.5B
Daily Email Blocks
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Threat Operations Center Advanced AlgorithmsCisco SensorBase
Global
Threat
Telemetry
Global
Threat
Telemetry
8:10 GMT
All Cisco Customers Protected
Bank Branch
in Chicago
ISP Datacenter
in Moscow
Ad Agency HQ
in London
8:03 GMT
IPS Detects Hacker Probing
8:07 GMT
Web Security Detects
New Botnet
8:00 GMT
Email Security Detects
Compromised Server
OEM ..OEM 2OEM 1
8:03 GMT
IPS Detects Hacker Probing
8:07 GMT
Web Security Detects
New Botnet
8:00 GMT
Email Security Detects
Compromised Server
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Malware Attacks through all Communication Channels
Public
Clouds
Automaker
Clouds
Private
Clouds
Enterprise
Clouds
Roadside
Networks
V2I
Communications
Onboard Networks,
Devices & Apps
Onboard
Wi-Fi Hotspot
Tethered
Smartphone
Local / On-board
Communications
V2V
Communications
Onboard Diagnostic
Interface (OBD II)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
8
128 1280
32
1372
CAN CAN Virtual Package Ethernet
Security:
E.g., AES 128
bit (16 byte)
signature
Packet Size [Bits]
“Free” bytes for
user dataRoom for
security?
1,500
“160”
(Cumbersome) Workaround:
• Receiver collects 20 CAN
packets into one virtual
packet
• … but what happens if one
packet is missed ?
• Every message
broadcasted by a single
ECU: but what if a rogue
ECU is cheating?
• 11bit/29bit ‘message-ID’
field, is not verifiable
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Creates malware
on the ADAS
Exposes OBU and
starts sending
many bad packets
Sends a super-packet
Malware created in car’s
communication gateway
Enterprise Web OEM Roadside GridHome
Audio/ Video DiagnosticsTelematics ADAS ….
The car is disabled or
destroyed
Unauthorized packets
are sent
OBU
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Advanced Vehicle
Security System
Enterprise Web OEM Roadside GridHome
ADASAudio/ Video DiagnosticsTelematics ….
Secure Car
Gateway
(SCG)
Security Cloud
Vehicle Threat Defense Update
Vehicle Misbehavior Detection
Vehicle Threat Report
2
1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Vehicle System:
• Harden ECUs: HW, OS, App SW,
secure BL, incl. chemistry
• Validate and protect code integrity
• Authenticate messages, KMS
• Detect anomalies/ intrusions
• Secure OTA S/W update
• Protect privileged service mode
• Secure App sandbox
1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Security Cloud
2
4. Cloud Services: Assist
vehicle’s threat defense,
update vehicle onboard
defense, and remove
threats before they reach
vehicles
Cloud Security
5. Interactions: for
security cloud to
assist onboard
threat defense
Threat
Related
Information
Updates &
Threat
Defense
Assistance
6. Remote Mgt.
Provisioning, key and
credential mgt, remote
monitoring, malware
removal, …
6. Remote Mgt.
7.Misbehavior
Detection
Anomalies,
Context based
defense
7.Misbehavior
Detection
Local Wireless
and Physical
Connections
Onboard
Security Gateway
2. Vehicle Services:
Secure vehicle access,
secure communications,
malware defense,
onboard activity
monitoring, onboard
authentication and key
management, …
Public
Clouds
Private
Clouds
Enterprise
Clouds
Automaker
Clouds
Through
Security
Cloud
3. Secure V2I
Communications
• IPSE, SSL.,...
• Dynamically
established at
proper protocol
layers
• Scalable to support
10+ M vehicles
Not
through
Security
Cloud
Remote
Traffic
1. Vehicle
System
Security
In-Vehicle Networks
Vehicle ECUs, Sensors,
Actuators, Applications
1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Build End to End
Security Architecture
Secure
Car Cloud
Services
Secure
Car Gateway
Secure
Car Network
Secure
NW Access
3G/
LTE
WiFi/
DSRC
Security+
On ECU
SWCrypto HW
Leverage Entire Portfolio
to Design Security System
Pay
now!
Car Theft
3G/LTE
IVI
OBU
Service Theft
Conduct Threat, Penetration
& Vulnerability Analysis
Disablement
…. ???
RansomeWare
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
• Some already established security teams
… Others are still considering whether it
is necessary
• Some already delivered security
requirements to their Tier1s
… Others have not yet written any
security requirements
• Some are fully aware and actively
engaged in security standardization
… Others are still hesitant if/how to get
involved in Vehicle Security Standards
PAY
GOV
Mandate
OEM
Required
Vehicle
Security
Standard
Tier-1
USP
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Thank you.

More Related Content

What's hot

Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
Alcatel-Lucent Enterprise
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
Alcatel-Lucent Enterprise
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
Cisco Canada
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
gruzabb
 
The march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs EuropeThe march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs Europe
SITA
 
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro RizziEENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA (European Emergency Number Association)
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
Ian Skerrett
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
Security Innovation
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
Jayesh Pai
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
Alcatel-Lucent Enterprise
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
Block Armour
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
Oleg Konovalov
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
Risk Analysis Consultants, s.r.o.
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013
Oleg Konovalov
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
Block Armour
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 

What's hot (20)

Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
The march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs EuropeThe march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs Europe
 
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro RizziEENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 

Viewers also liked

Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2
KME Automation Services, LLC
 
Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014
Kevin Murphy
 
AIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, EuropeAIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, Europe
Grupa AT3
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010
Iddan Halevy
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
Real-Time Innovations (RTI)
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
Craig Hurst
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business Models
Andreas Mai
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's Hospital
NewellNYC
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
Joseph Hennawy
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
Harman Innovation
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive Revolution
Alexander Schellong
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner, RCDD
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Bill Harpley
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
Bill Harpley
 
Librecon 2016 bilbao: kappa architecture IoT of the cars
Librecon 2016 bilbao:   kappa architecture IoT of the carsLibrecon 2016 bilbao:   kappa architecture IoT of the cars
Librecon 2016 bilbao: kappa architecture IoT of the cars
Juantomás García Molina
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
Bill Harpley
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate Deck
Dvir Reznik
 
Autonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and Opportunities
Jeffrey Funk
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
Ankit Singh
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
Ahmed Banafa
 

Viewers also liked (20)

Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2
 
Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014
 
AIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, EuropeAIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, Europe
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business Models
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's Hospital
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive Revolution
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering Biography
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
 
Librecon 2016 bilbao: kappa architecture IoT of the cars
Librecon 2016 bilbao:   kappa architecture IoT of the carsLibrecon 2016 bilbao:   kappa architecture IoT of the cars
Librecon 2016 bilbao: kappa architecture IoT of the cars
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate Deck
 
Autonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and Opportunities
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 

Similar to SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
Cisco Russia
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
Dejan Jeremic
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
xKinAnx
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Cisco do Brasil
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
Sergey Kochergan
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
Cybera Inc.
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
MenloSecurity
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
Cisco Canada
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
Cisco Canada
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
CA API Management
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
Felipe Lamus
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
ITSitio.com
 

Similar to SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars (20)

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 

More from Andreas Mai

The Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing FootprintThe Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
Andreas Mai
 
Autonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the FutureAutonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the Future
Andreas Mai
 
$5 Trillion Economic Value at Stake: Digitization of Road Transportation
$5 Trillion Economic Value at Stake:  Digitization of Road Transportation $5 Trillion Economic Value at Stake:  Digitization of Road Transportation
$5 Trillion Economic Value at Stake: Digitization of Road Transportation
Andreas Mai
 
Digitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value ChainDigitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value Chain
Andreas Mai
 
IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014
Andreas Mai
 
CES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected VehiclesCES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected Vehicles
Andreas Mai
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
Andreas Mai
 
13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f
Andreas Mai
 
The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary
Andreas Mai
 
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Andreas Mai
 
Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes
Andreas Mai
 
Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads
Andreas Mai
 
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Andreas Mai
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business Models
Andreas Mai
 
11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars F11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars F
Andreas Mai
 

More from Andreas Mai (15)

The Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing FootprintThe Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
 
Autonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the FutureAutonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the Future
 
$5 Trillion Economic Value at Stake: Digitization of Road Transportation
$5 Trillion Economic Value at Stake:  Digitization of Road Transportation $5 Trillion Economic Value at Stake:  Digitization of Road Transportation
$5 Trillion Economic Value at Stake: Digitization of Road Transportation
 
Digitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value ChainDigitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value Chain
 
IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014
 
CES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected VehiclesCES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected Vehicles
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
 
13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f
 
The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary
 
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
 
Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes
 
Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads
 
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business Models
 
11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars F11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars F
 

Recently uploaded

EV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin DonnellyEV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin Donnelly
Forth
 
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill RoadsWhat Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
Sprinter Gurus
 
Catalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptxCatalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptx
Blue Star Brothers
 
Kaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality EngineerspptxKaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality Engineerspptx
vaibhavsrivastava482521
 
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa WarheitExpanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Forth
 
Hand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptxHand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptx
wstatus456
 
EV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker JamiesonEV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker Jamieson
Forth
 
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
afkxen
 
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
MarynaYurchenko2
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
Hyundai Motor Group
 
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) RaipurAadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects
 
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
afkxen
 
EN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptxEN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptx
aichamardi99
 
Here's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDsHere's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDs
jennifermiller8137
 
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
78tq3hi2
 
Globalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full resultsGlobalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full results
vaterland
 
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
78tq3hi2
 

Recently uploaded (17)

EV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin DonnellyEV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin Donnelly
 
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill RoadsWhat Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
 
Catalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptxCatalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptx
 
Kaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality EngineerspptxKaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality Engineerspptx
 
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa WarheitExpanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
 
Hand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptxHand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptx
 
EV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker JamiesonEV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker Jamieson
 
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
 
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
 
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) RaipurAadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) Raipur
 
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
 
EN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptxEN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptx
 
Here's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDsHere's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDs
 
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
 
Globalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full resultsGlobalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full results
 
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
 

SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars

  • 1. Cisco ConfidentialCisco IBSG © 2011 Cisco and/or its affiliates. All rights reserved. Internet Business Solutions Group 1 Andreas Mai Director Smart Connected Vehicles April 2014 Mission Critical: Security
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Daily Security IntelligenceDaily Web RequestsDeployed Security DevicesApplications & Micro-Applications 100TB Security Intelligence 1.6M Deployed Devices 13B Web Requests 150,000 Micro- applications 1,000 Applications 93B Daily Email Messages 35% Enterprise Email 5,500 IPS Signatures 150M Deployed Endpoints 3-5 min Updates Security Intelligence Operations: • Broadest Visibility • Global Footprint • Defense in Depth 5B Daily Email Connections 4.5B Daily Email Blocks
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Threat Operations Center Advanced AlgorithmsCisco SensorBase Global Threat Telemetry Global Threat Telemetry 8:10 GMT All Cisco Customers Protected Bank Branch in Chicago ISP Datacenter in Moscow Ad Agency HQ in London 8:03 GMT IPS Detects Hacker Probing 8:07 GMT Web Security Detects New Botnet 8:00 GMT Email Security Detects Compromised Server OEM ..OEM 2OEM 1 8:03 GMT IPS Detects Hacker Probing 8:07 GMT Web Security Detects New Botnet 8:00 GMT Email Security Detects Compromised Server
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Malware Attacks through all Communication Channels Public Clouds Automaker Clouds Private Clouds Enterprise Clouds Roadside Networks V2I Communications Onboard Networks, Devices & Apps Onboard Wi-Fi Hotspot Tethered Smartphone Local / On-board Communications V2V Communications Onboard Diagnostic Interface (OBD II)
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 8 128 1280 32 1372 CAN CAN Virtual Package Ethernet Security: E.g., AES 128 bit (16 byte) signature Packet Size [Bits] “Free” bytes for user dataRoom for security? 1,500 “160” (Cumbersome) Workaround: • Receiver collects 20 CAN packets into one virtual packet • … but what happens if one packet is missed ? • Every message broadcasted by a single ECU: but what if a rogue ECU is cheating? • 11bit/29bit ‘message-ID’ field, is not verifiable
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Creates malware on the ADAS Exposes OBU and starts sending many bad packets Sends a super-packet Malware created in car’s communication gateway Enterprise Web OEM Roadside GridHome Audio/ Video DiagnosticsTelematics ADAS …. The car is disabled or destroyed Unauthorized packets are sent OBU
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Advanced Vehicle Security System Enterprise Web OEM Roadside GridHome ADASAudio/ Video DiagnosticsTelematics …. Secure Car Gateway (SCG) Security Cloud Vehicle Threat Defense Update Vehicle Misbehavior Detection Vehicle Threat Report 2 1
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Vehicle System: • Harden ECUs: HW, OS, App SW, secure BL, incl. chemistry • Validate and protect code integrity • Authenticate messages, KMS • Detect anomalies/ intrusions • Secure OTA S/W update • Protect privileged service mode • Secure App sandbox 1
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Security Cloud 2 4. Cloud Services: Assist vehicle’s threat defense, update vehicle onboard defense, and remove threats before they reach vehicles Cloud Security 5. Interactions: for security cloud to assist onboard threat defense Threat Related Information Updates & Threat Defense Assistance 6. Remote Mgt. Provisioning, key and credential mgt, remote monitoring, malware removal, … 6. Remote Mgt. 7.Misbehavior Detection Anomalies, Context based defense 7.Misbehavior Detection Local Wireless and Physical Connections Onboard Security Gateway 2. Vehicle Services: Secure vehicle access, secure communications, malware defense, onboard activity monitoring, onboard authentication and key management, … Public Clouds Private Clouds Enterprise Clouds Automaker Clouds Through Security Cloud 3. Secure V2I Communications • IPSE, SSL.,... • Dynamically established at proper protocol layers • Scalable to support 10+ M vehicles Not through Security Cloud Remote Traffic 1. Vehicle System Security In-Vehicle Networks Vehicle ECUs, Sensors, Actuators, Applications 1
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Build End to End Security Architecture Secure Car Cloud Services Secure Car Gateway Secure Car Network Secure NW Access 3G/ LTE WiFi/ DSRC Security+ On ECU SWCrypto HW Leverage Entire Portfolio to Design Security System Pay now! Car Theft 3G/LTE IVI OBU Service Theft Conduct Threat, Penetration & Vulnerability Analysis Disablement …. ??? RansomeWare
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 • Some already established security teams … Others are still considering whether it is necessary • Some already delivered security requirements to their Tier1s … Others have not yet written any security requirements • Some are fully aware and actively engaged in security standardization … Others are still hesitant if/how to get involved in Vehicle Security Standards PAY GOV Mandate OEM Required Vehicle Security Standard Tier-1 USP
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Thank you.