Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Chapter 1: Introduction to Automotive Cybersecurity

OBJECTIVES

  • Overview
  • Introduction
    • Security and Its Impact
  • Cyber Security in Automotive Technology
    • The Rising Threat
  • Vehicular Ransomware Attack

HACKERS REMOTELY KILL A JEEP ON A HIGHWAY

https://www.youtube.com/watch?v=MK0SrxBC1xs&t=1s

AUTOMOTIVE HACKING: REMOTELY HACKING INTO A BRAND NEW CAR

https://www.youtube.com/watch?v=fPQIWawXSRI&t=3s

OVERVIEW

  • The technological progress made in sensor and navigation systems, the Internet of Things, and different types of machine learning techniques would promote new, innovative, and accessible mobility that gives rise to intelligent and autonomous vehicles.
  • However, security plays a vital role in intelligent and autonomous vehicles.
  • We discuss in detail about the different levels of autonomous vehicles from Level 0 to Level 4, different types of cybersecurity issues in autonomous vehicles, and future trends and challenges in autonomous vehicles.
  • Security must be thought as an important aspect during designing and implementation of the autonomous vehicles to prevent from numerous security threats and attacks.

INTRODUCTION

  • The term security refers to the protection of critical assets of the system from malicious threats and mitigation of their impact on the system.
  • The assets can be any valuable object or entity or an organization.
  • These assets can have certain vulnerability, which can be exploited by malicious users or attackers for their own benefits.
  • The malicious threats are generated by malicious users or intruders, which exploits the system’s vulnerability, and access or modify the critical assets of the system.
  • These malicious users can be an individual person or group of people or software, whose aim is to find a vulnerability or weak points in the system and attack at that point to collapse, harm, or just to gain access to the system.
  • The security assets are the resources of the system that need to be protected against malicious threats and attacks.
  • The security assets with its environment refer to the security context.
  • If the security environment responds friendly, then it adds for security assets and vice versa.

SECURITY AND ITS IMPACT

  • The automotive industry is experiencing massive changes as well as gaining huge opportunities.
  • The automotive industry is dealing with new technologies and autonomous vehicle concepts that have the potential to turn the vehicle itself into the autonomous computerized moving device.
  • There can be various cyber security mechanisms to provide security, and each security mechanism can have single or multiple impacts on the assets to be protected.
  • A security mechanism can level-up the security for various assets or for all assets in the system’s environment context.
  • The security mechanism may be powerful for a limited period of time or impact in such a way that there is a trade-off among assets.
  • The cybersecurity ensures safe access to hardware and protects damage to data during network access data injection and code injection.

CYBER SECURITY IN AUTOMOTIVE TECHNOLOGY

  • Every year, there are huge developments of novel automotive applications and services that are leading the production in terms of cost and technology.
  • More than 90% of automotive inventions lead to innovations in vehicle hardware and software.
  • Hardware in the vehicles has control system, which directs the vehicles to perform various tasks on the roads while driving.
  • Some basic tasks are listed below:
    • Primary systems of the vehicles, e.g., the engine, driver assistance, driveline, electric system, brake system,dashboard, etc.
    • Secondary vehicles systems, e.g., ignition, indicators, window control, wipers, lights
    • Infotainment applications, e.g., navigation systems, telematics, rear seat entertainment, music and video entertainment, and GPS-based services.

image-20241009222201476

Fig. 1.1 Automotive cybersecurity history timeline

THE RISING THREAT

  • As vehicles are getting more advanced, they use computers to control decisive operations such as brakes, stability control, and airbags functionality.
  • Vehicles become safer on one hand, but on the other hand, the safety mechanisms are controlled by the ECUs (Electronic Control Units) , adding more complexity and potential attack vectors to the system.
  • These ECUs are interconnected through a CAN (Controller Area Network) bus in an unsecured way.
  • The notion of merely securing ECUs in individual systems is inadequate in the connected and autonomous vehicle situation.
  • There are several forms of networking such as Ethernet, cellular, Internet, Wi-Fi, Bluetooth, and V2X connected in the vehicle and linking to various networks like CAN bus, Ethernet that are running applications on peripherals (USB, display, sensor, LiDAR, etc.).
  • The vehicles may be remotely hacked or immobilized.
  • Vehicles can be compromised through the wireless sensors in the vehicles, and person can be hurt physically if someone gets hold of the CAN bus and stops the vehicle suddenly through one of the external interfaces of the vehicle.
  • Even luxury vehicles such as the Jaguar suffered from flaws, causing “blue screen of death” immobilizing them.
  • The weakness in several vehicle assessments is seen as extremely vulnerable
  • security architecture with a significant number of powerful computers with wireless
  • access such as GPS, NFC, Bluetooth, cellular, IR, Wi-Fi, etc.
  • The weakness in several vehicle assessments is seen as extremely vulnerable security architecture with a significant number of powerful computers with wireless access such as GPS, NFC, Bluetooth, cellular, IR, Wi-Fi, etc.

VEHICULAR RANSOMWARE ATTACK

  • Ransomware for vehicles can be developed and injected, indicating that this ransomware attack on vehicles is real and serious.
  • As the cars are more interconnected and as digital technology begins to provide even more essential vehicle technologies and as vehicle digital technology becomes more standardized, the attack surfaces for ransomware will grow, and the value that ransomware may take hostage will increase.
  • The community that can attack a single type of ransomware will increase.

image-20241009222557469

Fig. 1.2 Ransomware attack scheme in vehicles

Last Updated:
Next
Week 02