AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.

Slides:



Advertisements
Similar presentations
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Advertisements

Crime and Security in the Networked Economy Part 4.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Chapter 17 Controls and Security Measures
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Discovering Computers 2010
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Security Architecture
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Security in ERP Systems By Jason Rhodewalt & Marcel Gibson.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Welcome Topic : Security.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Embedded system security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Information Management System Ali Saeed Khan 29 th April, 2016.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Understand Wireless Security LESSON Security Fundamentals.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Technical Implementation: Security Risks
Security Issues in Information Technology
Securing Network Servers
BUSINESS DRIVEN TECHNOLOGY
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Secure Software Confidentiality Integrity Data Security Authentication
Outline What does the OS protect? Authentication for operating systems
Network security threats
UNIT 19 Data Security 2.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Outline What does the OS protect? Authentication for operating systems
OPERATING SYSTEM OVERVIEW
COMPUTER PRIVACY.
Computer Security.
Computer Security.
Functions of an operating system
Faculty of Science IT Department By Raz Dara MA.
Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
WJEC GCSE Computer Science
Protection Mechanisms in Security Management
Cyber Security For Civil Engineering
Definition Of Computer Security
Presentation transcript:

AUTOMOBILE CYBER SECURITY David McPeak

EVOLUTION IN DESIGN/TECHNOLOGY

Older Models Mostly consisted of an engine block and was very basic Current Models Complex system computer used to control everything from transmission, navigation system, braking system, to entertainment system 4G/ Wi-Fi networking OnStar

KNOWN CASES OF VEHICLES BEING HACKED

KNOWN CASES OF VEHICLES BEING HACKED(CONT.)

HOW TO PREVENT HACKING Several Parts to system security Hardware Software Networking Cloud Supply Chain Risk Management Data Privacy

HARDWARE SECURITY Tamper protection helps with encrypting encryption keys, intellectual property, account credentials, and other valuable information at compile time and decrypts only during a small execution window, while protecting the information from reverse engineering. Active memory protection helps in reducing vulnerabilities by embedding pointer checking into the hardware, which prevents overrun errors that can be compromised.

SOFTWARE SECURITY Secure boot is a key part of software security. It checks the operating system files to make sure they haven’t been changed and if they are deemed to not be valid, then they are blocked and not allowed to run. Virtualization makes it possible to separate functions that run the vehicle and those that run other applications no essential to the operation of the vehicle. Software containers are used to separate individual systems and applications, thus making it possible to update or replace individual functions without affecting the overall operation of the system. Authentication is used to secure the vehicle and prevent unauthorized people from gaining access to parts of the software that is responsible for calling functions that run the car. This can be achieved by passwords, biometrics, or fingerprint readers.

NETWORKING SECURITY Message authentication helps with security in that it verifies that the communications being sent are from the correct sources and that messages are not being forged to appear legit when in actuality they are sent to take over the system. Firewalls are useful in permitting communication only between pre-approved systems and sensors and blocking unapproved communications.

CLOUD SECURITY Over the air (OTA) updates Remote monitoring

SUPPLY CHAIN RISK MANAGEMENT A good supply chain risk management will keep the parts throughout the build 100% genuine. This is also useful in preventing criminal groups from accessing parts during transit and assembly of the systems.

DATA PRIVACY Data privacy and anomaly it’s important with all the data that is being recorded and collected that it stays confidential. Some of this data can include: credit card information, telephone numbers, addresses, and route information.