Technology Overdrive Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car Dr. Barbara L. Ciaramitaro,

Slides:



Advertisements
Similar presentations
From 0–60: Privacy and the New Generation of Connected Cars Josh Harris Director of Policy Future of Privacy Forum.
Advertisements

Monitor. Manage. Maintain.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Cyber Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Safety support in the automotive industry Jacob Bangsgaard Director of External Affairs and Communications 1st Annual International Conference on ICTs.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Intelligent and Non-Intelligent Transportation Systems 32 Foundations of Technology Standard 18 Students will develop an understanding of and be able to.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Global Worldwide Connected Cars Market “Global Connected Cars Market, By Technology (2G, 3G, 4G, GNSS), By Connectivity (Embedded, Integrated, Tethered),
Challenge: Numerous Governmental Layers
Principles Identified - UK DfT -
SAE Cybersecurity Standards Activity
Koji Nakao, Dai Arisue NICT, Japan
Cybersecurity - What’s Next? June 2017
A+: A Fresh Look at an Old Favorite
3.6 Fundamentals of cyber security
Security of In-Vehicle Software
Overview 1. Phishing Scams
Wireless Network Security
Researcher and Lecturer Assistant at FCI Assiut University
Smart Car through IoT 라이 아샤리 리날디
CYBERSECURITY FOR AUTONOMOUS VEHICLES
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Year 10 ICT ECDL/ICDL IT Security.
Today’s Risk. Today’s Solutions. Cyber security and
STOP. THINK. CONNECT. Online Safety Quiz.
Both Luxurious and Sporty 2018 Chevrolet Malibu Mid-Size Car – Westside Chevrolet
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Automotive Cybersecurity Market to reach $837.1mn by 2024: Global Market.
Connected Car Market - Global Forecast to 2025.
Connected Car Market by Service (Connected Services, Safety & Security, and Autonomous Driving), Form (Embedded, Tethered, and.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 On-board Diagnostics Aftermarket.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Risk of the Internet At Home
Cyber Issues Facing Medical Practice Managers
Internet of Things Vulnerabilities
Connected and Autonomous Vehicle Cybersecurity Controller Area Network
INTERNET OF THINGS CYBERSECURITY
Accelerating the Introduction of
IoT – Retail O.P Khanduja.
Property & Casualty Market Suffers Significant Losses
Faculty of Science IT Department By Raz Dara MA.
Cybercrime and Canadian Businesses
Network and security practices in automotive systems
ONLINE SECURE DATA SERVICE
Computer Security By: Muhammed Anwar.
Security in mobile technologies
Module 4 System and Application Security
Microsoft Data Insights Summit
Marcial Quinones-Cardona
Mobile Commerce and Ubiquitous Computing
A proposal for approach to proceed work in Cybersecurity TF
Cybersecurity Simplified: Phishing
©2018 Graphical Research. All rights reserved. Europe Automotive Camera Market to witness gains upto $5bn by 2025: Graphical.
Presentation transcript:

Technology Overdrive Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car Dr. Barbara L. Ciaramitaro, CISSP, CSSLP, PMP Director, Center for Cybersecurity Leadership Walsh College

Brief History of Automobile Technology http://www.theverge.com/sponsored/9104175/onstar-the-evolution-of-automobile-technology-infographic

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds 1958 – Cruise Control

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds 1958 – Cruise Control

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds 1958 – Cruise Control 1973 – Air Bag

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds 1958 – Cruise Control 1973 – Air Bag

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds 1958 – Cruise Control 1996 – Standardized On-Board Diagnostics 1973 – Air Bag

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds 1958 – Cruise Control 1996 – Standardized On-Board Diagnostics 1973 – Air Bag

Brief History of Automobile Technology 1946 – First Car Phone at 80 pounds 1958 – Cruise Control 1996 – Standardized On-Board Diagnostics 1973 – Air Bag 1996 – Onstar

Brief History of Automobile Technology

Brief History of Automobile Technology 2000 – In Car GPS

Brief History of Automobile Technology 2000 – In Car GPS

Brief History of Automobile Technology 2000 – In Car GPS 2001 – Blue Tooth Connectivity

Brief History of Automobile Technology 2000 – In Car GPS 2001 – Blue Tooth Connectivity

Brief History of Automobile Technology 2000 – In Car GPS 2001 – Blue Tooth Connectivity 2003 – Crash Avoidance Systems

Brief History of Automobile Technology 2000 – In Car GPS 2001 – Blue Tooth Connectivity 2003 – Crash Avoidance Systems 2008 – On Board WiFi

Brief History of Automobile Technology 2000 – In Car GPS 2001 – Blue Tooth Connectivity 2003 – Crash Avoidance Systems 2008 – On Board WiFi 2008 – On Board WiFi

2015 - The Connected Car

Customers want Connected Cars “A recent global survey of over 14,000 consumers across five continents indicates that car owners are now looking for new models with these technologies integrated as standard. Almost 40% of those questioned said that in-car technology is their first and foremost consideration when purchasing a new car, above the driving performance of the vehicle.” http://click-accenture.com/connected-cars-growing-importance-in-car-technologies/ But they also want safety, privacy and security.

Privacy and Security Concerns http://www.mckinsey.com/industries/automotive-and-assembly/our-insights/whats-driving-the-connected-car

Safety First http://click-accenture.com/connected-cars-growing-importance-in-car-technologies/

Complexity The more complex a computer and software system is, the more vulnerabilities it will have. Today’s car has the computing power of 20 personal computers, features about 100 million lines of programming code, and processes up to 25 gigabytes of data an hour. The average “bug” rate in software development in 1 error in 4,000 lines of code. That translates to 25,000 errors. As we have learned from recent breaches, it only takes one vulnerability in a line of code to open it to malicious attackers. http://www.mckinsey.com/industries/automotive-and-assembly/our-insights/whats-driving-the-connected-car

Complexity Automobiles contain 20 to 100 Electronic Control Units (ECUs). Individual ECUs are responsible for one or more features but must also pass data from one ECU to another through the CAN bus. ECU’s communicate both internally and with the outside world. The ECU’s most at risk from malicious attacks are those that communicate to the outside world. http://www.mckinsey.com/industries/automotive-and-assembly/our-insights/whats-driving-the-connected-car

Connected Car Cybersecurity Concerns “The connectivity necessary for providing the features offered by Connected Cars may pose privacy and security dangers and vulnerabilities. Connected Cars can contain more than 50 separate electronic control units (ECUs) connected through a controller area network (CAN) or other network. Those ECUs communicate with each other and the CAN through use of digital messages called CAN packets. If CAN packets are not authenticated or encrypted, they may be susceptible to remote hacking through the vehicles’ wireless and phone components. This wireless technology may also enable unauthorized access to other systems and data collected by the vehicle, such as location data and potentially payment card data used for dashboard shopping.” http://www.dataprivacymonitor.com/online-privacy/legal-developments-in-connected-car-arena-provide-glimpse-of-privacy-and-data-security-regulation-in-internet-of-things/

Connected Car Cybersecurity Concerns “For decades, cars didn’t have issues with hackers because they weren’t connected to the internet and provided no way to access their internal operating system. “As a result, the auto industry never worried about cyber security and someone taking control of the vehicle from outside,” …” Now, with connected cars wired for everything from voice recognition, Bluetooth, and GPS to eye-gaze tracking and driver monitoring, there are many more ways in and potential for terrifying outcomes.” http://qz.com/461576/here-are-all-the-ways-a-hacker-can-take-control-of-your-car/

Connected Car Threat Vectors http://qz.com/461576/here-are-all-the-ways-a-hacker-can-take-control-of-your-car/

Give Credit for Experts in Vehicle Cybersecurity A Survey of Remote Automotive Attack Surfaces by Charlie Miller and Chris Valasek Car Hacker’s Handbook by Craig Smith (Available through Amazon or other publishers) These and other researchers who have, and continue to, pave the way for us.

Is a Car really Hackable? According to Miller & Valasek there are 3 steps to malicious attacks against automobiles: Remotely gaining access to an internal automotive network through available vulnerabilities commonly in the wireless, cellular or Bluetooth connected ECU’s. Bridge the malware message from the one or more compromised ECUs to the internal target ECU. Attack the target ECU to cause it to behave in an unsafe manner.

Is a Car really Hackable? One question, according to researchers, is the ability of an external attacker to cross into the internal vehicle network. Vehicles have multiple CAN networks that house their own ECU’s There are specific ECU’s that bridge communications between various CAN networks The real threat may come from aftermarket devices particularly in the area of telematics.

Is a Car really Hackable? Credit to Craig Smith and the Car Hacker’s Handbook

The Connected Car – Remote Attack Vectors Diagnostic OBD2 Port

The Connected Car – Remote Attack Vectors Diagnostic OBD2 Port Diagnostic tools are often connected to internal wireless networks. When breached, the diagnostic tool can be used for transmission of malicious code.

The Connected Car – Remote Attack Vectors Bluetooth

The Connected Car – Remote Attack Vectors Bluetooth Bluetooth is considered to be one of the most viable attack services due to the complexity and wide use.

The Connected Car – Remote Attack Vectors Telematics, Cellular and WiFi http://blog.rogerscorp.com/2014/12/

The Connected Car – Remote Attack Vectors Telematics, Cellular and WiFi “This is the holy grail of automotive attacks…” http://blog.rogerscorp.com/2014/12/

The Connected Car – Remote Attack Vectors Internet / Apps Miller & Valasek, A survey of remote automotive attack surfaces,

The Connected Car – Remote Attack Vectors Internet / Apps Access to the Internet now opens the automobile to a number of well known attacks through the web browser and malicious applications. Miller & Valasek, A survey of remote automotive attack surfaces,

The Connected Car – Remote Attack Vectors Cyber – Physical Features (Park Assist, Adaptive Cruise Control, Collision Prevention, Lane Keep Assistance) Miller & Valasek, A survey of remote automotive attack surfaces,

The Connected Car – Remote Attack Vectors Cyber – Physical Features (Park Assist, Adaptive Cruise Control, Collision Prevention, Lane Keep Assistance) These features connect physical vehicle response to external stimuli gathered through a variety of sensors and communication channels. These access points can be accessed to cause cyber physical malfunction. Miller & Valasek, A survey of remote automotive attack surfaces,

How hackable is your car? ++ = more hackable - = less hackable Miller and Valasek’s findings represented in a single chart. A plus sign represents “more hackable,” a minus sign “less hackable.” Credit: Charlie Miller and Chris Valasek

More Concerns - Terrorism “Driverless cars are vulnerable to hackers who could bring cities to a standstill, steal cars remotely or even commit deadly terror attacks, experts have warned.” http://www.telegraph.co.uk/news/science/11243376/Driverless-cars-could-be-hacked-by-terrorists-warn-transport-experts.html

More Concerns - Ransomware “…The worse-case scenario is that multiple vehicles could be infected from a single source, and the manufacturer is then held to ransom. The infection could start in multiple ways: with a compromised app that drivers download, or through a batch of components that have embedded malware that is not detected when the vehicles are manufactured, or even with social engineering…” http://www.networkworld.com/article/2972234/microsoft-subnet/drive-a-dumb-car-but-buy-tesla-stocks.html

More Concerns - Litigation “Class actions alleging claims based on privacy and security issues related to Connected Cars have already been filed. … The plaintiffs alleged that the CAN system is susceptible to being hacked, which could allow for the collection of data stored on the CAN system and for the control of certain vehicle functions such as steering, braking, and acceleration. The plaintiffs asserted claims for express and implied breach of warranty, fraud, false advertising, and violations of consumer protection laws.” http://www.dataprivacymonitor.com/online-privacy/legal-developments-in-connected-car-arena-provide-glimpse-of-privacy-and-data-security-regulation-in-internet-of-things/

The Future “The market for Connected Cars is projected to reach $54 billion in the next two years. It is estimated that by 2020 there will be 250 million Connected Cars on the road, and about 90 percent of new vehicles in Western Europe will be connected to the Internet.” http://www.dataprivacymonitor.com/online-privacy/legal-developments-in-connected-car-arena-provide-glimpse-of-privacy-and-data-security-regulation-in-internet-of-things/

Questions? Please feel free to contact me at bciara2@walshcollege.edu Good resources to begin your education journey: A Survey of Remote Automotive Attack Surfaces by Charlie Miller and Chris Valasek Car Hacker’s Handbook by Craig Smith (Available through Amazon or other publishers)