One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1619146
Date de publication 2020-03-25 12:00:00 (vue: 2020-03-25 13:00:57)
Titre The future of cybersecurity for connected carsĀ 
Texte connected cars - pic of a dashboard Connected cars have slowly become mainstream, with more than 700 million of them expected to be operating on roads by 2030. Most new vehicles are leaving production lines with a host of features that require a connection to the online world, including GPS, lane assistance, collision avoidance, and modern infotainment systems. However, while connected vehicles offer abundant opportunities for the consumer, automakers need to seriously consider what they mean for consumer privacy and security. Any software vulnerabilities could undermine the safety of connected car systems and features, putting the user's sensitive information at risk as well as their physical safety. As such, automakers need to adopt a cybersecurity culture that not only addresses the obvious exposures in their vehicle's software, but other hidden vulnerabilities that could arise from third-party components in their vehicles.  The current state of cybersecurity in connected vehicles  Cybersecurity is still an unstandardized anomaly in the automotive industry. According to a report by the Ponemon Institute, software security is moving at a much slower pace than technology in the industry, with only 10 percent of automakers having an established cybersecurity team. The economies of cybersecurity in cars are inherently unfair; with the right tools, attacks are affordable, low-effort affairs. On the other hand, mounting a coherent defense against such attacks requires higher effort and investment. So far, the playing field is in favor of the attackers, and there have been a few incidents that have put this into perspective. For example, security researchers demonstrated that a Jeep Cherokee could be hacked when they took control of the wipers, air conditioning, brakes, and accelerator from 10 miles away. Some Tesla vehicles also had a vulnerability that could potentially allow hackers to start the vehicle or cut the motor remotely.  The role of automakers in improving cybersecurity  Automakers must start viewing security testing as an investment that will result in better quality vehicles, not as an expense with no direct payback. Since technical vulnerabilities can arise at any time, automotive players need to consider cybersecurity throughout the product life cycle, starting from the design stage. 
Envoyé Oui
Condensat  carmakers 2030 700 a jeep able abundant accelerator according address addresses adequate adopt affairs affordable against age air all allow already also although anomaly any architectural are arise assistance attackers attacking attacks automakers automotive autonomous avoidance away become been beginning better beyond bodies brakes but california can capabilities car cars carsĀ  chains challenge change changes cherokee coherent collision commission common complex compliance components conditioning connected connection connectivity consider consumer consumers control could culture current cut cyber cybercriminals cybersecurity cybersecurity  cycle cycles deal defense demonstrated design design from development different direct direction economic economies effort energy engine ensure ensuring established europe every everyone evolving example expected expense expertise experts exposures far favor features field finalize focusing from future get gps hacked when hackers had hand has have having hidden higher host however improving incidents include including increase industry information infotainment inherently institute investment issues its regulations keep lane late leaves leaving life like like changing line lines long low mainstream making mean meet miles million of modern monitor more most motor mounting moving much must nations need needed  needs new not now obvious offer oil or online only operating opportunities opportunity other ownership pace party payback percent perspective physical platforms players playing plugs ponemon posing potentially pressure privacy product production protection put putting quality ramp regularly regulation regulatory related remotely replacing report require requirement requires researchers result right risk as road roads role safe safety sales security see sensing sensitive seriously servicing should since slower slowly software some spark stage stages standards start starting state steps such supply systems taken team technical technology tesla testing than the user's them third threats throughout time took tools treated undermine unece unfair; united unstandardized updates vehicle vehicle's vehicles vehicles  viewing vulnerabilities vulnerability way well what will wipers with more world
Tags Vulnerability
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: