Advancing Role Of A CHRO

By John Lucas, SVP, Human Resources, The Goodyear...

Advancing Role Of A CHRO

The

By Tim King, Global VP of IT, Ideal Clamp...

The "Art of No"

Decoding Emotional Purchase Decisions

By Laura Schwab, President, Aston Martin

Decoding Emotional Purchase Decisions

Automotive Connectivity Innovations Require A New Approach To Cybersecurity

By Tim Frasier, President of Automotive Electronic...

Automotive Connectivity Innovations...

Autonomous Vehicles: Cybersecurity is The Key Factor

By Auto Tech Outlook | Wednesday, February 20, 2019

The growing number of connected cars is no surprise. Manufacturers are making more of it; more people are driving them than ever which imply that the malicious actors will have a bigger target than ever. This is dangerous than a credit card mishap because a hacker getting into the vehicle’s connected system could cause a passenger or a driver to lose their lives.

Have a look at these three cybersecurity objectives that must be addressed.

1.    Legitimate Communications: One must assure that no-one can take unauthorized access or control to the car while safeguarding data in transit which is essential for privacy.

Few Automotive Companies(ASI DATAMYTE, EasyMile, Gwentech)

2.    Protecting hardware and software: Protection of hardware, software, firmware as well as the related-processed data is a real challenge especially when one has to implement cryptography mechanisms which demand significant computational.

3.    Detection of anomalies: Detection of abnormal events is a must to prevent any intrusion or cyber attack on a vehicle.

New Era of Risks, But Mitigation is Essential

The augment of autonomous cars is thrilling but it comes with numerous challenges that one needs to address. To face these challenges, one knows that solutions are not only at an initial stage, but they are also not mainly dedicated to the automotive industry. Managing and acting upon the rising security threats has become complicated, especially for large fleets. Therefore it is advisable to adopt a robust Security Operations Centre (SOC) to ensure that all alerts are handled and taken care of properly.

The detection of behavioral anomalies indicates that there is a need for sophisticated algorithms, but because of technical and cost limitation, they cannot reside in most of the vehicles today.  Hence, to be fully capable, SOCs will need to deploy the advanced anomaly detection technology to analyze the data coming from cars over the network and detect those anomalies quickly. A lot is being expected from 2019; it can be a ‘make or break’ year for vehicle cybersecurity.

Check out: Top Automotive Solution Companies.

The Application of AI in Cybersecurity

The incorporation of artificial intelligence (AI) and machine...

The Application of AI in...

Cybersecurity in Supply Chain

To safeguard their networks, organizations need to assess the internal...

Cybersecurity in Supply...

Karamba Security's Autonomous Cybersecurity Technology Ready for Expansion

Connected smart devices have become the mainstream of technology...

Karamba Security's...

ExtraHop Launches Panorama Partner Program to Accelerate NTA Adoption

ExtraHop, a leading provider of cyber analytics, unveiled the new...

ExtraHop Launches...

follow on linkedin follow on twitter Copyright © 2019 www.autotechoutlook.com All Rights Reserved | Privacy Policy
Top