Presentation is loading. Please wait.

Presentation is loading. Please wait.

AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.

Similar presentations


Presentation on theme: "AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY."— Presentation transcript:

1 AUTOMOBILE CYBER SECURITY David McPeak

2 EVOLUTION IN DESIGN/TECHNOLOGY

3 Older Models Mostly consisted of an engine block and was very basic Current Models Complex system computer used to control everything from transmission, navigation system, braking system, to entertainment system 4G/ Wi-Fi networking OnStar

4 KNOWN CASES OF VEHICLES BEING HACKED

5 KNOWN CASES OF VEHICLES BEING HACKED(CONT.)

6

7 HOW TO PREVENT HACKING Several Parts to system security Hardware Software Networking Cloud Supply Chain Risk Management Data Privacy

8 HARDWARE SECURITY Tamper protection helps with encrypting encryption keys, intellectual property, account credentials, and other valuable information at compile time and decrypts only during a small execution window, while protecting the information from reverse engineering. Active memory protection helps in reducing vulnerabilities by embedding pointer checking into the hardware, which prevents overrun errors that can be compromised.

9 SOFTWARE SECURITY Secure boot is a key part of software security. It checks the operating system files to make sure they haven’t been changed and if they are deemed to not be valid, then they are blocked and not allowed to run. Virtualization makes it possible to separate functions that run the vehicle and those that run other applications no essential to the operation of the vehicle. Software containers are used to separate individual systems and applications, thus making it possible to update or replace individual functions without affecting the overall operation of the system. Authentication is used to secure the vehicle and prevent unauthorized people from gaining access to parts of the software that is responsible for calling functions that run the car. This can be achieved by passwords, biometrics, or fingerprint readers.

10 NETWORKING SECURITY Message authentication helps with security in that it verifies that the communications being sent are from the correct sources and that messages are not being forged to appear legit when in actuality they are sent to take over the system. Firewalls are useful in permitting communication only between pre-approved systems and sensors and blocking unapproved communications.

11 CLOUD SECURITY Over the air (OTA) updates Remote monitoring

12 SUPPLY CHAIN RISK MANAGEMENT A good supply chain risk management will keep the parts throughout the build 100% genuine. This is also useful in preventing criminal groups from accessing parts during transit and assembly of the systems.

13 DATA PRIVACY Data privacy and anomaly it’s important with all the data that is being recorded and collected that it stays confidential. Some of this data can include: credit card information, telephone numbers, addresses, and route information.


Download ppt "AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY."

Similar presentations


Ads by Google