DUBLIN--(BUSINESS WIRE)--Research and Markets has announced the addition of the "Cybersecurity in the Connected Car: Technology, Industry, and Future" report to their offering.
Technology trends, solutions and standards and future in automotive cybersecurity, with expert interviews, exclusive case studies, and latest developments
Advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity, they become an attractive target for cyber-criminals.
Security demonstrations such as the famous Miller and Valasek Jeep Cherokee example have provided enough evidence that connected cars should be viewed as a potential attack target. But how does an industry built around making and selling cars pivot to delivering secure software and services?
Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected & autonomous vehicles.
It discusses the following elements of automotive cybersecurity:
- Attack surfaces in connected and autonomous vehicles
- Core vulnerabilities
- Regulations and policies (US, EU, China, Japan)
- Existing market solutions (OTA updates, IDPS, firewalls etc.)
- Emerging solutions (ECU Consolidation, app sandboxing, autonomous security)
- Security by design
Key questions addressed
- What does the automotive cybersecurity landscape look like today?
- What makes vehicles vulnerable?
- What's in it for the hackers?
- What are the worst-case scenarios?
- Where should automakers invest to cyber-proof connected vehicles?
- Can the CAN bus be secured?
- What is the relationship between security and privacy?
- Is legislation the answer to raise the bar of security standards in modern vehicles?
- What standards are being developed around vehicle cybersecurity?
- Can security by design ever be a commercial reality?
- What are the available market solutions and who are the key players?
Key Topics Covered:
Chapter 1: Introduction
Chapter 2: The problem
Chapter 3: Connected car technology and its vulnerability
Chapter 4: Industry responses
Chapter 5: Legislation and standards
Chapter 6: Future directions
- NCC-SBD Automotive
- Samy Kamkar
For more information about this report visit http://www.researchandmarkets.com/research/q433fr/cybersecurity_in