Vehicle Computer Security Jeff Smith. Am I safe operating my computer controlled vehicle?  Most people don’t understand the computers that run their.

Slides:



Advertisements
Similar presentations
New Security Issues Raised by Open Cards Pierre GirardJean-Louis Lanet GERMPLUS R&D.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
NetPay provides best and effective solution for company Managers to maintain their employee scheduling task (including staff in/out details, overtime,
From 0–60: Privacy and the New Generation of Connected Cars Josh Harris Director of Policy Future of Privacy Forum.
It has taken an entire semester to uncover the definition… lets see what it has come to…
Fire Prevention Internship Brian Collins. What I Do 1.Assist in building a database. o I update information and add new information into the computers.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
Monks use computers to preserve their books. The information can be stored on CDs and uploaded to the Internet so that the whole world can learn from.
The Internet & New Media Week 10 Technical Communication Fall 2003, DAHMEN.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Networks IGCSE ICT Section 4.
B.RAMAMURTHY UNIVERSITY AT BUFFALO Introduction to Hardware (& Software) 5/30/2013 Amrita-UB-MSES-CSE
The Operating System. Operating Systems (F) What you need to know about –operating system as a program; –directory/folder.
Development in Mobile Technologies Mobile Technology is a collective term used to describe the various types of cellular communication technology.
Exploring Engineering Chapter 9, Part 2 Logic and Computers.
Introduction Our Topic: Mobile Security Why is mobile security important?
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Chapter 16 The World Wide Web Chapter Goals ( ) Compare and contrast the Internet and the World Wide Web Describe general Web processing.
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
Computer Engineering II Computer and Network Security Rabie A. Ramadan
M2M Connecting Real-World Things with Cloud Computing T. Osawa 1IoT+Cloud.
Digital Automata Unit 7-1 Managing the Digital Enterprise By Professor Michael Rappa.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Computing Revision Notes. Index Software System Software Internet.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Introduction To Internet
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
Mechanical Engineering MOHAMED BAZZI MATEUS VILLAS BOAS MALTHUS RODRIGUES.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Cryptography and Network Security (CS435) Part One (Introduction)
Potential Consequences of an Executive Order vs. Sample Law to Ban Texting Greg Fitch, Ph.D. Senior Research Associate Virginia Tech Transportation Institute.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
Please don’t fix your car! Stephen Townsend Course Project CAP480.
Module 11: Designing Security for Network Perimeters.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
 It’s an advanced looking car  It can fit several people in the back seats  It has good mileage.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
My career choices Game designer, Software designer, Engineer.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
CTAP 295 Teaching with Technology FINAL PRESENTATION Jill Breslin Self Defense,by.
COURSE DESCRIPTION: This course is designed to introduce the students to new and emerging technologies that are impacting the way we input information.
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
SARAH FRYE CEO Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just for communication purpose.
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
Twesige Richard.  Advanced RISC Machines.  Set of instruction set architectures related to programing registers, CPU’s also I/O devices.  RISC acronym.
Advance startup options Shift Restart. Restart options.
EMBRACE THE MOBILE MIND SHIFT. MOBILE GROWTH IS ASTONISHING Never try to change people’s behavior. Always meet your users and customers where they are.
Presented by: Weslee Adams Project 15 – CAR PURCHASE 4/29/12.
Feedback Systems and Driving Clinton Matney AT Workshop 2016.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
ITE101: FUNDAMENTALS OF COMPUTING AND INFORMATION
Introduction to Computers
By- Sushma Sumant.  User experience (UX) design is the process of creating products that provide meaningful and relevant experiences to users.  This.
Moral Compass Questions Rights and Responsibilities
VEHICLE TECHNOLOGY BRAKE SYSTEMS.
Network and security trends in connected cars
Introduction to Hardware
I am a student. We are students. You are a student. You are students. He is a student. She is a student. It is a student. They are students.
Information Systems.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Vehicle Computer Security Jeff Smith

Am I safe operating my computer controlled vehicle?  Most people don’t understand the computers that run their cars  Many people feel a virus could potentially infect their car and “take over”  Disastrous effects if this were to happen

What are these computers that are so common in modern vehicles?  Two categories  Vehicle Systems Control (VSC)  Navigation Tools  No interaction between the two systems

Vehicle Systems Control (VSC)  Control the operations involved in the mechanical duties of the vehicle  Engine Control Module (ECM)  Anti-Lock Brake Systems (ABS)  Ride height control  Four-Wheel-Drive Engagement  Transmission Shift Point Determination  Horsepower Delivery  Road Hazard Analysis

How VSC Work  ROM computers that contain no RAM to run applications  Simply perform tasks written into them and report errors  These errors are read through a port underneath the dash  If changes need to me made to computer, an entire new unit must be installed

VSC Vulnerabilities  To compromise these systems one would have to do the following…  Know how the system is written and rewrite a new process that did the newly desired task  Locate current computers and replace with new unit  While possible, the attack would have to be vehicle specific and very specialized

Navigation Systems  Find directions  Locate Stores  Endless opportunity with interaction between vehicle, cell phones, and GPS

How They Work  Many variations, most use GPS to run the navigation systems  Recently, these systems have gained the capability to connect through cell phones and even the internet to run the navigation systems

Navigation Systems Vulnerabilities.  Open to a wide range of vulnerabilities  Through use of cell phones and internet, attacks have various platforms to attack from  Main thing to realize, if an attack was successful, the worst-case scenario would be an “error” message on the screen

What is being done to prevent attacks?  From the beginning of computer controlled vehicles, engineers have realized the major effects of an infected system and have designed with this in mind  Do not give any capabilities of VSC computers to run outside programs, virus or not  Give no connection between navigation systems and the VSC  Provide little access to the VSC to prevent tampering with

In the Future?  Vehicle manufacturers are looking into the idea of making the VSC computers interact with the internet  This would open up huge opportunity for systems to become compromised  Many advances in internet security will have to occur before this is safe enough to become possible

Sources    ction=newsDetails&newsUID=c794e3d0-7b af07-c65dfd75fcd6&newsType=News ction=newsDetails&newsUID=c794e3d0-7b af07-c65dfd75fcd6&newsType=News  omobile_viru_1.html omobile_viru_1.html 