DUBLIN, Mar 29, 2017 /PRNewswire/ --
Research and Markets has announced the addition of the "Cybersecurity in the Connected Car: Technology, Industry, and Future" report to their offering.
Technology trends, solutions and standards and future in automotive cybersecurity, with expert interviews, exclusive case studies, and latest developments
Advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity, they become an attractive target for cyber-criminals.
Security demonstrations such as the famous Miller and Valasek Jeep Cherokee example have provided enough evidence that connected cars should be viewed as a potential attack target. But how does an industry built around making and selling cars pivot to delivering secure software and services?
Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected & autonomous vehicles.
It discusses the following elements of automotive cybersecurity:
- Attack surfaces in connected and autonomous vehicles
- Core vulnerabilities
- Regulations and policies (US, EU, China, Japan)
- Existing market solutions (OTA updates, IDPS, firewalls etc.)
- Emerging solutions (ECU Consolidation, app sandboxing, autonomous security)
- Security by design
Key questions addressed
- What does the automotive cybersecurity landscape look like today?
- What makes vehicles vulnerable?
- What's in it for the hackers?
- What are the worst-case scenarios?
- Where should automakers invest to cyber-proof connected vehicles?
- Can the CAN bus be secured?
- What is the relationship between security and privacy?
- Is legislation the answer to raise the bar of security standards in modern vehicles?
- What standards are being developed around vehicle cybersecurity?
- Can security by design ever be a commercial reality?
- What are the available market solutions and who are the key players?
Key Topics Covered:
Chapter 1: Introduction
Chapter 2: The problem
2.1 Research experiments and demonstrations
2.2 Early industry and media responses
2.3 Consumer concerns
2.4 Hackers' motivation
Chapter 3: Connected car technology and its vulnerability
3.1 ECU proliferation
3.2 CAN and other bus systems
3.3 Code proliferation
3.4 Specific cyberattack surfaces
3.5 Autonomous vehicles
3.6 Over-the-air (OTA) software updates
3.7 Supply chain security
Chapter 4: Industry responses
4.1 Justifying cybersecurity investments
4.2 Establishing cybersecurity departments
4.3 Collaboration with third-party security providers
4.4 Software updating
Chapter 5: Legislation and standards
5.1 Government initiatives
5.2 Industry initiatives
Chapter 6: Future directions
6.1 Security by design
6.2 Vehicle cybersecurity in layers
6.3 ECU consolidation
6.4 Increased specificity in requests for proposals from suppliers
6.5 Lessons from other industry sectors
6.6 Suggestions for the automotive industry
- NCC-SBD Automotive
- Samy Kamkar
For more information about this report visit http://www.researchandmarkets.com/research/j7nznb/cybersecurity_in
Research and Markets
Laura Wood, Senior Manager
For E.S.T Office Hours Call +1-917-300-0470
For U.S./CAN Toll Free Call +1-800-526-8630
For GMT Office Hours Call +353-1-416-8900
U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716
SOURCE Research and Markets