O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.
The New Assembly Line
3 BEST PRACTICES FOR BUILDING
(SECURE) CONNECTED CARS
Connected cars are about to change
the auto industry’s assembly line.
Vehicles are becoming computers on wheels
and now have more in common with your
laptop than they do the Model T.
Just as smartphones have supplanted non-
Internet-connected phones, connected cars
will supplant non-Internet-connected ca...
Auto manufacturers need to become
software companies if they want to
survive into the 21st century.
The auto industry must now consider cybersecurity
as an integral part to how cars are built, just as
physical safety becam...
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two o...
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two o...
When an industry without experience from the
front lines of Internet security begins connecting
its products, one of two o...
How do we make cars
resilient in the face of
cyberattacks?
How do we make cars
resilient in the face of
cyberattacks?
In our research, we have found that if the auto industry is to
...
An over-the-air update process: Ideally without the owner having
to subscribe to a separate service.
Isolation of vehicle ...
An over-the-air update process: Ideally without the owner having to
subscribe to a separate service.
Isolation of vehicle ...
An over-the-air update process: Ideally without the owner having to
subscribe to a separate service.
Isolation of vehicle ...
Read Hacking a Tesla Model S: What we found and what we learned
Próximos SlideShares
Carregando em…5
×

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars

32.996 visualizações

Publicada em

When an industry without experience in Internet security starts connecting things to the Internet, it typically makes a number of mistakes both in how it implements secure systems, and how it interacts with the security community. With connected automobiles, the stakes for getting security right have never been higher. “What’s the worst that could happen?” is a lot more serious when you’re talking about a computer that can travel 100+ MPH.

  • DOWNLOAD THE BOOK INTO AVAILABLE FORMAT (New Update) ......................................................................................................................... ......................................................................................................................... Download Full PDF EBOOK here { https://soo.gd/irt2 } ......................................................................................................................... Download Full EPUB Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download Full doc Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download PDF EBOOK here { https://soo.gd/irt2 } ......................................................................................................................... Download EPUB Ebook here { https://soo.gd/irt2 } ......................................................................................................................... Download doc Ebook here { https://soo.gd/irt2 } ......................................................................................................................... ......................................................................................................................... ................................................................................................................................... eBook is an electronic version of a traditional print book THE can be read by using a personal computer or by using an eBook reader. (An eBook reader can be a software application for use on a computer such as Microsoft's free Reader application, or a book-sized computer THE is used solely as a reading device such as Nuvomedia's Rocket eBook.) Users can purchase an eBook on diskette or CD, but the most popular method of getting an eBook is to purchase a downloadable file of the eBook (or other reading material) from a Web site (such as Barnes and Noble) to be read from the user's computer or reading device. Generally, an eBook can be downloaded in five minutes or less ......................................................................................................................... .............. Browse by Genre Available eBOOK .............................................................................................................................. Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookBOOK, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult, Crime, EBOOK, Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, ......................................................................................................................... ......................................................................................................................... .....BEST SELLER FOR EBOOK RECOMMEND............................................................. ......................................................................................................................... Blowout: Corrupted Democracy, Rogue State Russia, and the Richest, Most Destructive Industry on Earth,-- The Ride of a Lifetime: Lessons Learned from 15 Years as CEO of the Walt Disney Company,-- Call Sign Chaos: Learning to Lead,-- StrengthsFinder 2.0,-- Stillness Is the Key,-- She Said: Breaking the Sexual Harassment Story THE Helped Ignite a Movement,-- Atomic Habits: An Easy & Proven Way to Build Good Habits & Break Bad Ones,-- Everything Is Figureoutable,-- What It Takes: Lessons in the Pursuit of Excellence,-- Rich Dad Poor Dad: What the Rich Teach Their Kids About Money THE the Poor and Middle Class Do Not!,-- The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness,-- Shut Up and Listen!: Hard Business Truths THE Will Help You Succeed, ......................................................................................................................... .........................................................................................................................
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • Hi guys! Rate my nudes here --- ONAL.ML (Find them in my profile oksi69) I'm looking for a horny guy to chat and meet
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • Get paid to post comments on Facebook - $25 per hour ♥♥♥ http://t.cn/AieX6y8B
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • My roomate's mother makes $77 an hour on the internet. She has been without a job for seven months but last month her paycheck was $16913 just working on the internet for a few hours. you could try here..................... www.Work83.com
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui
  • This Deadly Molecule Causes Diabetes (not belly fat)... ■■■ http://t.cn/AiBhrtGG
       Responder 
    Tem certeza que deseja  Sim  Não
    Insira sua mensagem aqui

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars

  1. 1. The New Assembly Line 3 BEST PRACTICES FOR BUILDING (SECURE) CONNECTED CARS
  2. 2. Connected cars are about to change the auto industry’s assembly line.
  3. 3. Vehicles are becoming computers on wheels and now have more in common with your laptop than they do the Model T.
  4. 4. Just as smartphones have supplanted non- Internet-connected phones, connected cars will supplant non-Internet-connected cars.
  5. 5. Auto manufacturers need to become software companies if they want to survive into the 21st century.
  6. 6. The auto industry must now consider cybersecurity as an integral part to how cars are built, just as physical safety became a critical part of how cars were built in the late 20th century.
  7. 7. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.  
  8. 8. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.   If there are clear security best practices, then most companies will (hopefully) implement those best practices.
  9. 9. When an industry without experience from the front lines of Internet security begins connecting its products, one of two outcomes often occurs.   If there are no clear best practices, companies will likely make a lot of security mistakes, resulting in major cybersecurity problems down the road.
  10. 10. How do we make cars resilient in the face of cyberattacks?
  11. 11. How do we make cars resilient in the face of cyberattacks? In our research, we have found that if the auto industry is to build vehicles that are resistant to cyberattack, they must implement three important measures.
  12. 12. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 1
  13. 13. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 2
  14. 14. An over-the-air update process: Ideally without the owner having to subscribe to a separate service. Isolation of vehicle and infotainment systems: With this in place, it’s important that any gateway systems receive an extreme amount of security scrutiny. Hardening each individual component: A resilient automotive cybersecurity architecture should assume that attackers will compromise some component (e.g. the web browser). That single component compromise should not affect the functionality of the system as a whole. 3
  15. 15. Read Hacking a Tesla Model S: What we found and what we learned

×