SlideShare a Scribd company logo
The New Assembly Line
3 BEST PRACTICES FOR BUILDING
(SECURE) CONNECTED CARS
Connected cars are about to change
the auto industry’s assembly line.
Vehicles are becoming computers on wheels
and now have more in common with your
laptop than they do the Model T.
Just as smartphones have supplanted non-
Internet-connected phones, connected cars
will supplant non-Internet-connected cars.
Auto manufacturers need to become
software companies if they want to
survive into the 21st century.
The auto industry must now consider cybersecurity
as an integral part to how cars are built, just as
physical safety became a critical part of how cars
were built in the late 20th century.
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two outcomes often occurs.
 
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two outcomes often occurs.
 
If there are clear security
best practices, then most
companies will (hopefully)
implement those best
practices.
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two outcomes often occurs.
 
If there are no clear best
practices, companies will likely
make a lot of security mistakes,
resulting in major cybersecurity
problems down the road.
How do we make cars
resilient in the face of
cyberattacks?
How do we make cars
resilient in the face of
cyberattacks?
In our research, we have found that if the auto industry is to
build vehicles that are resistant to cyberattack, they must
implement three important measures.
An over-the-air update process: Ideally without the owner having
to subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place, it’s
important that any gateway systems receive an extreme amount of
security scrutiny.
Hardening each individual component: A resilient automotive
cybersecurity architecture should assume that attackers will
compromise some component (e.g. the web browser). That single
component compromise should not affect the functionality of the
system as a whole.
1
An over-the-air update process: Ideally without the owner having to
subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place,
it’s important that any gateway systems receive an extreme
amount of security scrutiny.
Hardening each individual component: A resilient automotive
cybersecurity architecture should assume that attackers will
compromise some component (e.g. the web browser). That single
component compromise should not affect the functionality of the
system as a whole.
2
An over-the-air update process: Ideally without the owner having to
subscribe to a separate service.
Isolation of vehicle and infotainment systems: With this in place, it’s
important that any gateway systems receive an extreme amount of
security scrutiny.
Hardening each individual component: A resilient automotive
cybersecurity architecture should assume that attackers will
compromise some component (e.g. the web browser). That single
component compromise should not affect the functionality of the
system as a whole.
3
Read Hacking a Tesla Model S: What we found and what we learned

More Related Content

What's hot

The Electric Car Tipping Point
The Electric Car Tipping PointThe Electric Car Tipping Point
The Electric Car Tipping Point
Boston Consulting Group
 
Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?
Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?
Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?
Dinis Guarda
 
Building the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformBuilding the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics Platform
Cloudera, Inc.
 
Digital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesDigital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologies
Accenture the Netherlands
 
Industry 4.0
Industry 4.0Industry 4.0
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
Smart City
 
Roland berger automotive_landscape_2025_20110314
Roland berger automotive_landscape_2025_20110314Roland berger automotive_landscape_2025_20110314
Roland berger automotive_landscape_2025_20110314
lauri213
 
AI and Future of Professions
AI and Future of ProfessionsAI and Future of Professions
AI and Future of Professions
Jeffrey Funk
 
Fueling the Energy Future
Fueling the Energy FutureFueling the Energy Future
Fueling the Energy Future
accenture
 
Thrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering servicesThrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering services
Accenture Technology
 
Corporate ventures in sweden
Corporate ventures in swedenCorporate ventures in sweden
Corporate ventures in sweden
Felipe Sotelo A.
 
Intelligent Operations for Future-Ready Businesses | Accenture
Intelligent Operations for Future-Ready Businesses | AccentureIntelligent Operations for Future-Ready Businesses | Accenture
Intelligent Operations for Future-Ready Businesses | Accenture
accenture
 
The Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The FutureThe Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The Future
Arturo Pelayo
 
Fintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open InnovationFintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open Innovation
accenture
 
AI, Machine Learning, and Data Science Concepts
AI, Machine Learning, and Data Science ConceptsAI, Machine Learning, and Data Science Concepts
AI, Machine Learning, and Data Science Concepts
Dan O'Leary
 
PwC's Global Technology IPO Review -- Q1 2015
PwC's Global Technology IPO Review -- Q1 2015PwC's Global Technology IPO Review -- Q1 2015
PwC's Global Technology IPO Review -- Q1 2015
PwC
 
TESLA FINAL PRESENTATION
TESLA FINAL PRESENTATIONTESLA FINAL PRESENTATION
TESLA FINAL PRESENTATION
Sindy Wang Pan
 
Shaping the Sustainable Organization | Accenture
Shaping the Sustainable Organization | AccentureShaping the Sustainable Organization | Accenture
Shaping the Sustainable Organization | Accenture
accenture
 
Artificial intelligence: Driving future growth in Singapore- Accenture
Artificial intelligence: Driving future growth in Singapore- AccentureArtificial intelligence: Driving future growth in Singapore- Accenture
Artificial intelligence: Driving future growth in Singapore- Accenture
Accenture ASEAN
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
accenture
 

What's hot (20)

The Electric Car Tipping Point
The Electric Car Tipping PointThe Electric Car Tipping Point
The Electric Car Tipping Point
 
Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?
Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?
Blockchain + AI + Crypto Economics Are We Creating a Code Tsunami?
 
Building the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics PlatformBuilding the Next Generation IoT & Telematics Platform
Building the Next Generation IoT & Telematics Platform
 
Digital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologiesDigital grid: Disruptive digital technologies
Digital grid: Disruptive digital technologies
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
Digital and Innovation Strategies for the Infrastructure Industry: Tim McManu...
 
Roland berger automotive_landscape_2025_20110314
Roland berger automotive_landscape_2025_20110314Roland berger automotive_landscape_2025_20110314
Roland berger automotive_landscape_2025_20110314
 
AI and Future of Professions
AI and Future of ProfessionsAI and Future of Professions
AI and Future of Professions
 
Fueling the Energy Future
Fueling the Energy FutureFueling the Energy Future
Fueling the Energy Future
 
Thrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering servicesThrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering services
 
Corporate ventures in sweden
Corporate ventures in swedenCorporate ventures in sweden
Corporate ventures in sweden
 
Intelligent Operations for Future-Ready Businesses | Accenture
Intelligent Operations for Future-Ready Businesses | AccentureIntelligent Operations for Future-Ready Businesses | Accenture
Intelligent Operations for Future-Ready Businesses | Accenture
 
The Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The FutureThe Future Of Work & The Work Of The Future
The Future Of Work & The Work Of The Future
 
Fintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open InnovationFintech New York: Partnerships, Platforms and Open Innovation
Fintech New York: Partnerships, Platforms and Open Innovation
 
AI, Machine Learning, and Data Science Concepts
AI, Machine Learning, and Data Science ConceptsAI, Machine Learning, and Data Science Concepts
AI, Machine Learning, and Data Science Concepts
 
PwC's Global Technology IPO Review -- Q1 2015
PwC's Global Technology IPO Review -- Q1 2015PwC's Global Technology IPO Review -- Q1 2015
PwC's Global Technology IPO Review -- Q1 2015
 
TESLA FINAL PRESENTATION
TESLA FINAL PRESENTATIONTESLA FINAL PRESENTATION
TESLA FINAL PRESENTATION
 
Shaping the Sustainable Organization | Accenture
Shaping the Sustainable Organization | AccentureShaping the Sustainable Organization | Accenture
Shaping the Sustainable Organization | Accenture
 
Artificial intelligence: Driving future growth in Singapore- Accenture
Artificial intelligence: Driving future growth in Singapore- AccentureArtificial intelligence: Driving future growth in Singapore- Accenture
Artificial intelligence: Driving future growth in Singapore- Accenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 

Similar to The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars

Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
DorleControls
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
Symantec
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
IJCI JOURNAL
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
Greg Harms
 
IRJET- Vehicle Cyber Security
IRJET- Vehicle Cyber SecurityIRJET- Vehicle Cyber Security
IRJET- Vehicle Cyber Security
IRJET Journal
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
Alan Tatourian
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
Tonex
 
SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607
Felipe Prado
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET Journal
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
accenture
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
Tyler Cragg
 
Vehicle technology software updates
Vehicle technology software updatesVehicle technology software updates
Vehicle technology software updates
Defensive Driving Garland
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
ParthaS
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Dr.Irshad Ahmed Sumra
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
CODE BLUE
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
PECB
 
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdfAutomotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
Market.us
 
Role of Cyber security in Automotive
Role of Cyber security in AutomotiveRole of Cyber security in Automotive
Role of Cyber security in Automotive
Sophia Lorenn
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
Angel Villar Garea
 

Similar to The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars (20)

Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
IRJET- Vehicle Cyber Security
IRJET- Vehicle Cyber SecurityIRJET- Vehicle Cyber Security
IRJET- Vehicle Cyber Security
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
Vehicle technology software updates
Vehicle technology software updatesVehicle technology software updates
Vehicle technology software updates
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
[CB16] Security in the IoT World: Analyzing the Security of Mobile Apps for A...
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
 
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdfAutomotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
Automotive Cyber Security Market_ Safeguarding the Future of Mobility.pdf
 
Role of Cyber security in Automotive
Role of Cyber security in AutomotiveRole of Cyber security in Automotive
Role of Cyber security in Automotive
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 

More from Lookout

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Lookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Lookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
Lookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Lookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
Lookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
Lookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
Lookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
Lookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
Lookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
Lookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
Lookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
Lookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
Lookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
Lookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
Lookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
Lookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
Lookout
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
Lookout
 

More from Lookout (20)

Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Security & Privacy at the Olympics
Security & Privacy at the OlympicsSecurity & Privacy at the Olympics
Security & Privacy at the Olympics
 

Recently uploaded

Girls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in CityGirls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in City
77sayre
 
Flinders University degree offer diploma Transcript
Flinders University degree offer diploma TranscriptFlinders University degree offer diploma Transcript
Flinders University degree offer diploma Transcript
hnugnoy
 
Volvo L35g Wheel Loader Operators Manual
Volvo L35g Wheel Loader Operators ManualVolvo L35g Wheel Loader Operators Manual
Volvo L35g Wheel Loader Operators Manual
Excavator
 
DSA Re-launch.pptx for loans for finance
DSA Re-launch.pptx for loans for financeDSA Re-launch.pptx for loans for finance
DSA Re-launch.pptx for loans for finance
SuryaReddy270237
 
Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...
Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...
Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...
avanikakapoor
 
Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
rhiannateal
 
Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...
Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...
Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...
6459astrid
 
1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf
1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf
1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf
CarlosAndresRiera
 
Definition of alcohol - NCI Dictionary of Cancer Terms
Definition of alcohol - NCI Dictionary of Cancer TermsDefinition of alcohol - NCI Dictionary of Cancer Terms
Definition of alcohol - NCI Dictionary of Cancer Terms
baalkrishankumar0980
 
High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...
gargruksana809
 
What to Do When Your Porsche Cayenne Won't Unlock
What to Do When Your Porsche Cayenne Won't UnlockWhat to Do When Your Porsche Cayenne Won't Unlock
What to Do When Your Porsche Cayenne Won't Unlock
MW4 Outfitters
 
Ec330b Lc Volvo Excavator Service Manual
Ec330b Lc Volvo Excavator Service ManualEc330b Lc Volvo Excavator Service Manual
Ec330b Lc Volvo Excavator Service Manual
Excavator
 
Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
solankikamal004
 
Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...
Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...
Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...
Momentum Motorworks
 
Birmingham degree offer diploma Transcript
Birmingham degree offer diploma TranscriptBirmingham degree offer diploma Transcript
Birmingham degree offer diploma Transcript
epxko
 
HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...
HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...
HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...
gajnagarg
 
EC180C L Volvo Service Repair Manual.pdf
EC180C L Volvo Service Repair Manual.pdfEC180C L Volvo Service Repair Manual.pdf
EC180C L Volvo Service Repair Manual.pdf
Excavator
 
High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...
jimmigarg6
 
3. Nepalko Bhougolik Awastha_watermark.pdf
3. Nepalko Bhougolik Awastha_watermark.pdf3. Nepalko Bhougolik Awastha_watermark.pdf
3. Nepalko Bhougolik Awastha_watermark.pdf
sujanchaulagain29
 
Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...
Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...
Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...
kimmi singla$A17
 

Recently uploaded (20)

Girls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in CityGirls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Borivali 9910780858 Provide Best And Top Girl Service And No1 in City
 
Flinders University degree offer diploma Transcript
Flinders University degree offer diploma TranscriptFlinders University degree offer diploma Transcript
Flinders University degree offer diploma Transcript
 
Volvo L35g Wheel Loader Operators Manual
Volvo L35g Wheel Loader Operators ManualVolvo L35g Wheel Loader Operators Manual
Volvo L35g Wheel Loader Operators Manual
 
DSA Re-launch.pptx for loans for finance
DSA Re-launch.pptx for loans for financeDSA Re-launch.pptx for loans for finance
DSA Re-launch.pptx for loans for finance
 
Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...
Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...
Independent Girls call Service Hyderabad 000XX00000 Provide Best And Top Girl...
 
Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
Best Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 i...
 
Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...
Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...
Busty Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Servi...
 
1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf
1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf
1- Diagramas Electricos EcoSport 2010 Euro IV 08-2011.pdf
 
Definition of alcohol - NCI Dictionary of Cancer Terms
Definition of alcohol - NCI Dictionary of Cancer TermsDefinition of alcohol - NCI Dictionary of Cancer Terms
Definition of alcohol - NCI Dictionary of Cancer Terms
 
High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Shimla 000XX00000 Provide Best And Top Girl Service And No1 i...
 
What to Do When Your Porsche Cayenne Won't Unlock
What to Do When Your Porsche Cayenne Won't UnlockWhat to Do When Your Porsche Cayenne Won't Unlock
What to Do When Your Porsche Cayenne Won't Unlock
 
Ec330b Lc Volvo Excavator Service Manual
Ec330b Lc Volvo Excavator Service ManualEc330b Lc Volvo Excavator Service Manual
Ec330b Lc Volvo Excavator Service Manual
 
Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
Girls Call Ahemdabad 000XX00000 Provide Best And Top Girl Service And No1 in ...
 
Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...
Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...
Preventing and Addressing Oil Leaks in Your Mercedes A Comprehensive Service ...
 
Birmingham degree offer diploma Transcript
Birmingham degree offer diploma TranscriptBirmingham degree offer diploma Transcript
Birmingham degree offer diploma Transcript
 
HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...
HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...
HiFi Girls Call Coimbatore 000XX00000 Provide Best And Top Girl Service And N...
 
EC180C L Volvo Service Repair Manual.pdf
EC180C L Volvo Service Repair Manual.pdfEC180C L Volvo Service Repair Manual.pdf
EC180C L Volvo Service Repair Manual.pdf
 
High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Mohali 000XX00000 Provide Best And Top Girl Service And No1 i...
 
3. Nepalko Bhougolik Awastha_watermark.pdf
3. Nepalko Bhougolik Awastha_watermark.pdf3. Nepalko Bhougolik Awastha_watermark.pdf
3. Nepalko Bhougolik Awastha_watermark.pdf
 
Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...
Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...
Female Girls Call Delhi 🛵🚡9711199171 💃 Choose Best And Top Girl Service And N...
 

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars

  • 1. The New Assembly Line 3 BEST PRACTICES FOR BUILDING (SECURE) CONNECTED CARS
  • 2. Connected cars are about to change the auto industry’s assembly line.
  • 3. Vehicles are becoming computers on wheels and now have more in common with your laptop than they do the Model T.
  • 4. Just as smartphones have supplanted non- Internet-connected phones, connected cars will supplant non-Internet-connected cars.
  • 5. Auto manufacturers need to become software companies if they want to survive into the 21st century.
  • 6. The auto industry must now consider cybersecurity as an integral part to how cars are built, just as physical safety became a critical part of how cars were built in the late 20th century.
  • 7. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.  
  • 8. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.   If there are clear security best practices, then most companies will (hopefully) implement those best practices.
  • 9. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.   If there are no clear best practices, companies will likely make a lot of security mistakes, resulting in major cybersecurity problems down the road.
  • 10. How do we make cars resilient in the face of cyberattacks?
  • 11. How do we make cars resilient in the face of cyberattacks? In our research, we have found that if the auto industry is to build vehicles that are resistant to cyberattack, they must implement three important measures.
  • 12. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 1
  • 13. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 2
  • 14. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 3
  • 15. Read Hacking a Tesla Model S: What we found and what we learned