Freescale Semiconductor

Slides:



Advertisements
Similar presentations
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Advertisements

Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
C OMPUTER S ECURITY C ONCEPTS By: Qubilah D’souza TE computer.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
HIPAA COMPLIANCE WITH DELL
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Chapter VII Security Management for an E-Enterprise -Ramyah Rammohan.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
SAFESPOT SP2 Meeting September 14 th and 15 th 2006 Rome 1 Integrated Project Co-operative Systems for Road Safety “Smart Vehicles on Smart Roads” Tamas.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
12/18/20151 Computer Security Introduction. 12/18/20152 Basic Components 1.Confidentiality: Concealment of information (prevent unauthorized disclosure.
Security in Wireless Sensor Networks by Toni Farley.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Computer Security Introduction
Secure Connected Cars – SONG LI
FF-ICE A CONCEPT TO SUPPORT THE ATM SYSTEM OF THE FUTURE
Security of In-Vehicle Software
Outcome TFCS-05 // May OICA, Paris
Comments on 18 mitigations proposed by OICA(TFCS-06-11)
COMPUTER SECURITY CONCEPTS
Information Security.
Fully Networked Car and Climate Change
CS 450/650 Fundamentals of Integrated Computer Security
Concept of ACSF TAN (Type Approval Number)
BINF 711 Amr El Mougy Sherif Ismail.
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
Infotainment (1) General description
Computer and Network Security
Security Protection Goals
Chapter 17: Confinement Problem
Mitigation Principles PROPOSAL OICA/CLEPA
Session 4: Standards Roundtable
Another perspective on Network Security
Standards Roundtable Bernard Dugerdil
Chapter 27 Security Engineering
Cryptography and Network Security
Securing a Connected Transportation System
How to Mitigate the Consequences What are the Countermeasures?
IoTSec Taxonomy Proposal
Computer Security Introduction
AP-AC communications and Functional Architecture
Technology leadership Manufacturing competence
Security in SDR & cognitive radio
Security.
Introduction to Cryptography
Protection Mechanisms in Security Management
Chapter 4: Security Policies
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
Mobile Commerce and Ubiquitous Computing
Cryptography and Network Security
Definition Of Computer Security
Presentation transcript:

Freescale Semiconductor Safety & Security Bernard Dugerdil Europe, Middle East & Africa (EMEA) Standards & Strategy Senior Manager Freescale Semiconductor

Some Security Definitions Authenticity The ability to ensure that the given information is without modification Authority The relationship between access criteria and permissions Confidentiality The property that information is not made available or disclosed to unauthorized individuals, entities or processes. Integrity A property by which the information content of an object is prevented from being modified in an unauthorized manner.

Automotive Constraints Embedded devices & Nomadic Devices Trusted devices and may be untrusted devices Car to Car & Car to X Communication Radio Communication No pre-defined relationships Time limited communication Machine to Machine (M2M) communication Human-Machine-Interface (Safety) Long Life Vehicle (more than 10 years)

Intrusion Detection Mechanism Elements of Solution Intrusion Detection Mechanism Michael Muter, Daimler AG Secure Vehicular Deployment Panos Papadimitratos, SaVeCom New Navigation system to meet e112 EC directive Francesco Di Corpo, TeMa.Mobility Consortium