SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
THE ORGANICALLY SECURE
VEHICLE OF TOMORROWAutonomy, the leading use case of the connected vehicle, promises to be one of the most significant automotive safety
mechanisms ever developed. But success depends on autonomy and trust existing in equal measure. It’s time to
rearchitect the vehicle, putting cybersecurity first, and organically securing connected cars today and beyond.
The vehicles of the future will have greatly expanded cyberattack surfaces, making
security an increasingly critical focal point for industry and government alike. FASTR is
at the forefront of efforts to address emerging threats to automotive security.
250 MILLION CONNECTED CARS FORECASTED
TO BE ON ROADS BY THE YEAR 2020
100 MILLION
Today’s modern luxury vehicle contains
L I N E S O F C O D E
100 ELECTRONIC
Within the vehicle, we expect there to soon be
C O N T R O L U N I T S ( E C U s )
THE TRANSITION TO
THE FULLY CONNECTED VEHICLE
MOVING
FORWARD
The world is moving from today’s limited-but-
expanding vehicle connectivity to a complex,fully
connected environment including vehicle-to-vehicle
(V2V),vehicle-to-infrastructure (V2I),and
vehicle-to-everything (V2X).
V2V V2I V2X
T R U S T I N DATA C O N F I D E N T I A L I T Y
Seismic shifts in the automotive
ecosystem are creating new,
interdependent requirements for
greater trust in security.
TRUST IN SECURITY
T R U S T I N DATA A N D S Y S T E M I N T E G R I T Y
T R U S T I N DATA A N D S Y S T E M AVA I L A B I L I T Y
FASTR is enabling the future of automotive security
innovation. By facilitating industry-wide collaboration on
actionable applied and theoretical R&D needed to drive
cybersecurity across the entire supply chain, FASTR is building
trust in the connected and autonomous vehicles of the future.
SM
Sources: IEEE Spectrum, Gartner
VISIT FASTR.ORG TO JOIN US AND LEARN MORE
FASTRFuture of Automotive Security Technology Research
OEMs
TIER 1s AND 2s
AUTOMOTIVE SECURITY EXPERTS
FASTR is a vendor-neutral,nonprofit consortium uniting like-minded
organizations and individuals worldwide,including OEMs,Tier 1 and 2
suppliers,software,hardware and security experts.FASTR members are
not casual observers – they’re in the vanguard of next-generation
automotive security technology R&D. FASTR members are the
visionaries driving advanced cybersecurity innovations that will reshape
the automotive industry. To learn more about the vision behind FASTR,
read our manifesto at bit.ly/FASTRmanifesto
HARDWARE/SOFTWARE SUPPLIERS
HELP CREATE TOMORROW’S
ORGANICALLY SECURE VEHICLES
Your expertise,participation and perspective are needed! Connect
with us @FASTR_org and email to learn more:info@fastr.org
FASTR APPROACH
TO DEFENSE IN DEPTH
Threat modeling,vulnerability assessment,security
architecture,trusted supply chains and cybersecurity
assurance are needed at every level of vehicle infrastructure.
IN-VEHICLE SYSTEMS
CONNECTIVITY
AND THE CLOUD
END-TO-END USE
CASES
HARDWARE
SECURITY
FEATURES
VEHICLE
SECURITY
DESIGN
LIFECYCLE
THREAT
INTELLIGENCE
Multi-layered
defense in depth
demands security
features in the
silicon. These
items are critical
to the overall
security integrity
of the vehicle
architecture
An intentional and
proactive
approach to
interconnection of
vehicle systems
must be present
from the design
stages and through
production and
operation stages
Risk assessment
must be continual;
threat intelligence
can help prioritize
cybersecurity
threats by
associated risk
and illuminate
appropriate
incident response
(AUTONOMOUS DRIVING)
ADDED TO IN-VEHICLE SYSTEMS
WITH MORE ATTACK SURFACES, MORE COMPLEXITY
Today,the average person generates
about 650MB/day - through PCs,phones,
etc. The autonomous vehicle of 2020 will use
about 3000 people’s worth of data per day
GPS
50KB/s
CAMERA
20-60
MB/s
Sources: Brian Krzanich, CEO, Intel Corporation.
Keynote at Automobility LA 2016, Bloomberg, Jan.
2015, Kelley Blue Book, March 2016 Self-driving cars may claim one-quarter of worldwide auto sales by 2035
Consumers care about security: 44% of consumers believe the vehicle manufacturer is the party most responsible
for securing a vehicle against hacking. 30% say the makers of mobile software and apps are most responsible.
Automotive and transportation industries will be among the first to
see immediate growth from smart and connected technologies
4000MB OF DATA
BY 2020, A SINGLE AUTONOMOUS VEHICLE WILL GENERATE
RADAR
1-10
KB/s
SONAR
10-100
KB/s
FASTRFuture of Automotive Security Technology Research
SM
SM

Weitere ähnliche Inhalte

Was ist angesagt?

How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?Megan Thudium
 
ConsumerLab: Public safety goes personal - presentation
ConsumerLab: Public safety goes personal - presentationConsumerLab: Public safety goes personal - presentation
ConsumerLab: Public safety goes personal - presentationEricsson
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...ProductNation/iSPIRT
 
Selfdriving technology
Selfdriving technologySelfdriving technology
Selfdriving technologyTrafficSchool3
 
The Internet of Things, Opportunities and Challenges
 The Internet of Things, Opportunities and Challenges The Internet of Things, Opportunities and Challenges
The Internet of Things, Opportunities and ChallengesConstant Wette Tchouati
 
Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Liz Slocum
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsSaad Ahmad
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
Indonesia: 2025 Mobile Economy Forecast
Indonesia: 2025 Mobile Economy ForecastIndonesia: 2025 Mobile Economy Forecast
Indonesia: 2025 Mobile Economy ForecastForest Interactive
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Marc Jadoul
 
Android Security: Art of Exploitation
Android Security: Art of ExploitationAndroid Security: Art of Exploitation
Android Security: Art of ExploitationSatria Ady Pradana
 
Mobile cafe news 2
Mobile cafe news 2Mobile cafe news 2
Mobile cafe news 2Andriy M
 
Branding for Tech companies
Branding for Tech companiesBranding for Tech companies
Branding for Tech companiesMiri Peled
 
George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014Rick Huijbregts
 
ADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSapplephye
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...Black Duck by Synopsys
 
Getting smart about identity management in air transport - Renaud Irminger, D...
Getting smart about identity management in air transport - Renaud Irminger, D...Getting smart about identity management in air transport - Renaud Irminger, D...
Getting smart about identity management in air transport - Renaud Irminger, D...SITA
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsAndreas Mai
 

Was ist angesagt? (20)

How large is the cyber security skills gap?
How large is the cyber security skills gap?How large is the cyber security skills gap?
How large is the cyber security skills gap?
 
ConsumerLab: Public safety goes personal - presentation
ConsumerLab: Public safety goes personal - presentationConsumerLab: Public safety goes personal - presentation
ConsumerLab: Public safety goes personal - presentation
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
Selfdriving technology
Selfdriving technologySelfdriving technology
Selfdriving technology
 
The Internet of Things, Opportunities and Challenges
 The Internet of Things, Opportunities and Challenges The Internet of Things, Opportunities and Challenges
The Internet of Things, Opportunities and Challenges
 
Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
Techvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutionsTechvorm com-android-security-issues-solutions
Techvorm com-android-security-issues-solutions
 
4 elit week 32
4 elit week 324 elit week 32
4 elit week 32
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
Indonesia: 2025 Mobile Economy Forecast
Indonesia: 2025 Mobile Economy ForecastIndonesia: 2025 Mobile Economy Forecast
Indonesia: 2025 Mobile Economy Forecast
 
Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)Connected Cars Europe keynote (2017)
Connected Cars Europe keynote (2017)
 
Android Security: Art of Exploitation
Android Security: Art of ExploitationAndroid Security: Art of Exploitation
Android Security: Art of Exploitation
 
Mobile cafe news 2
Mobile cafe news 2Mobile cafe news 2
Mobile cafe news 2
 
Branding for Tech companies
Branding for Tech companiesBranding for Tech companies
Branding for Tech companies
 
George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014George Brown College - TECH DAY 2014
George Brown College - TECH DAY 2014
 
ADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESSADAB OF DIGITAL AWARENESS
ADAB OF DIGITAL AWARENESS
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
 
Getting smart about identity management in air transport - Renaud Irminger, D...
Getting smart about identity management in air transport - Renaud Irminger, D...Getting smart about identity management in air transport - Renaud Irminger, D...
Getting smart about identity management in air transport - Renaud Irminger, D...
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
 

Andere mochten auch

The need for ice detection standards Jarkko Latonen, Labkotec
The need for ice detection standards Jarkko Latonen, Labkotec The need for ice detection standards Jarkko Latonen, Labkotec
The need for ice detection standards Jarkko Latonen, Labkotec Winterwind
 
ICE NAVIGATOR DETECTION AND NAVIGATION SYSTEM
ICE NAVIGATOR DETECTION AND NAVIGATION SYSTEMICE NAVIGATOR DETECTION AND NAVIGATION SYSTEM
ICE NAVIGATOR DETECTION AND NAVIGATION SYSTEMEdgeLab
 
Black ice technologies rdas (finance)
Black ice technologies rdas (finance)Black ice technologies rdas (finance)
Black ice technologies rdas (finance)phillyjevs
 
Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...
Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...
Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...Thomas Bamonte
 
Vestas de-icing development Morten Sloth, Vestas
Vestas de-icing development Morten Sloth, VestasVestas de-icing development Morten Sloth, Vestas
Vestas de-icing development Morten Sloth, VestasWinterwind
 
Intelligent transportation systems
Intelligent transportation systemsIntelligent transportation systems
Intelligent transportation systemsEngin Karabulut
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesPriyanka Aash
 
Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015
Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015
Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015Jukka Sassi
 
Electronic Toll Collection Global Study
Electronic Toll Collection Global StudyElectronic Toll Collection Global Study
Electronic Toll Collection Global StudyJustin Hamilton
 
Real Time Object Tracking
Real Time Object TrackingReal Time Object Tracking
Real Time Object TrackingVanya Valindria
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 
Electronic Toll Collection System
Electronic Toll Collection SystemElectronic Toll Collection System
Electronic Toll Collection SystemArshad Shareef
 

Andere mochten auch (18)

The need for ice detection standards Jarkko Latonen, Labkotec
The need for ice detection standards Jarkko Latonen, Labkotec The need for ice detection standards Jarkko Latonen, Labkotec
The need for ice detection standards Jarkko Latonen, Labkotec
 
ICE NAVIGATOR DETECTION AND NAVIGATION SYSTEM
ICE NAVIGATOR DETECTION AND NAVIGATION SYSTEMICE NAVIGATOR DETECTION AND NAVIGATION SYSTEM
ICE NAVIGATOR DETECTION AND NAVIGATION SYSTEM
 
Intevencion de espacial
Intevencion de espacialIntevencion de espacial
Intevencion de espacial
 
Black ice technologies rdas (finance)
Black ice technologies rdas (finance)Black ice technologies rdas (finance)
Black ice technologies rdas (finance)
 
Sliding around on an icy road
Sliding around on an icy roadSliding around on an icy road
Sliding around on an icy road
 
Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...
Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...
Connected/ Automated Vehicle Privacy Issues: Lessons From Toll Highway Author...
 
Connected vehicles
Connected vehiclesConnected vehicles
Connected vehicles
 
Vestas de-icing development Morten Sloth, Vestas
Vestas de-icing development Morten Sloth, VestasVestas de-icing development Morten Sloth, Vestas
Vestas de-icing development Morten Sloth, Vestas
 
Intelligent transportation systems
Intelligent transportation systemsIntelligent transportation systems
Intelligent transportation systems
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
 
Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015
Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015
Oil Detection among Ice and Snow_Lessons learned_Sassi_Rytkönen 24 March 2015
 
Electronic Toll Collection Global Study
Electronic Toll Collection Global StudyElectronic Toll Collection Global Study
Electronic Toll Collection Global Study
 
Real Time Object Tracking
Real Time Object TrackingReal Time Object Tracking
Real Time Object Tracking
 
Object tracking
Object trackingObject tracking
Object tracking
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Electronic Toll Collection System
Electronic Toll Collection SystemElectronic Toll Collection System
Electronic Toll Collection System
 
The Connected Vehicle Movement
The Connected Vehicle MovementThe Connected Vehicle Movement
The Connected Vehicle Movement
 
Toll plaza ppt
Toll plaza pptToll plaza ppt
Toll plaza ppt
 

Ähnlich wie FASTRInfographic2017

ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPGreg Harms
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfCIO Look Magazine
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11coachdave
 
Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systemsHongwenZhang4
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityVertex Holdings
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 James Nesbitt
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief SummarySandeep Kar
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETDr.Irshad Ahmed Sumra
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview PresentationBlock Armour
 

Ähnlich wie FASTRInfographic2017 (20)

ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdfMost Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
Most Impressive Leaders in Cybersecurity, Making Waves in the Industry 2023.pdf
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
 
Real-time threat detection and prevention for connected autonomous systems
Real-time threat detection  and prevention  for connected autonomous systemsReal-time threat detection  and prevention  for connected autonomous systems
Real-time threat detection and prevention for connected autonomous systems
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway Cybersecurity
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief Summary
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
Forming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANETForming Vehicular Web of Trust in VANET
Forming Vehicular Web of Trust in VANET
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Block Armour Overview Presentation
Block Armour Overview PresentationBlock Armour Overview Presentation
Block Armour Overview Presentation
 

FASTRInfographic2017

  • 1. THE ORGANICALLY SECURE VEHICLE OF TOMORROWAutonomy, the leading use case of the connected vehicle, promises to be one of the most significant automotive safety mechanisms ever developed. But success depends on autonomy and trust existing in equal measure. It’s time to rearchitect the vehicle, putting cybersecurity first, and organically securing connected cars today and beyond. The vehicles of the future will have greatly expanded cyberattack surfaces, making security an increasingly critical focal point for industry and government alike. FASTR is at the forefront of efforts to address emerging threats to automotive security. 250 MILLION CONNECTED CARS FORECASTED TO BE ON ROADS BY THE YEAR 2020 100 MILLION Today’s modern luxury vehicle contains L I N E S O F C O D E 100 ELECTRONIC Within the vehicle, we expect there to soon be C O N T R O L U N I T S ( E C U s ) THE TRANSITION TO THE FULLY CONNECTED VEHICLE MOVING FORWARD The world is moving from today’s limited-but- expanding vehicle connectivity to a complex,fully connected environment including vehicle-to-vehicle (V2V),vehicle-to-infrastructure (V2I),and vehicle-to-everything (V2X). V2V V2I V2X T R U S T I N DATA C O N F I D E N T I A L I T Y Seismic shifts in the automotive ecosystem are creating new, interdependent requirements for greater trust in security. TRUST IN SECURITY T R U S T I N DATA A N D S Y S T E M I N T E G R I T Y T R U S T I N DATA A N D S Y S T E M AVA I L A B I L I T Y FASTR is enabling the future of automotive security innovation. By facilitating industry-wide collaboration on actionable applied and theoretical R&D needed to drive cybersecurity across the entire supply chain, FASTR is building trust in the connected and autonomous vehicles of the future. SM Sources: IEEE Spectrum, Gartner VISIT FASTR.ORG TO JOIN US AND LEARN MORE FASTRFuture of Automotive Security Technology Research OEMs TIER 1s AND 2s AUTOMOTIVE SECURITY EXPERTS FASTR is a vendor-neutral,nonprofit consortium uniting like-minded organizations and individuals worldwide,including OEMs,Tier 1 and 2 suppliers,software,hardware and security experts.FASTR members are not casual observers – they’re in the vanguard of next-generation automotive security technology R&D. FASTR members are the visionaries driving advanced cybersecurity innovations that will reshape the automotive industry. To learn more about the vision behind FASTR, read our manifesto at bit.ly/FASTRmanifesto HARDWARE/SOFTWARE SUPPLIERS HELP CREATE TOMORROW’S ORGANICALLY SECURE VEHICLES Your expertise,participation and perspective are needed! Connect with us @FASTR_org and email to learn more:info@fastr.org FASTR APPROACH TO DEFENSE IN DEPTH Threat modeling,vulnerability assessment,security architecture,trusted supply chains and cybersecurity assurance are needed at every level of vehicle infrastructure. IN-VEHICLE SYSTEMS CONNECTIVITY AND THE CLOUD END-TO-END USE CASES HARDWARE SECURITY FEATURES VEHICLE SECURITY DESIGN LIFECYCLE THREAT INTELLIGENCE Multi-layered defense in depth demands security features in the silicon. These items are critical to the overall security integrity of the vehicle architecture An intentional and proactive approach to interconnection of vehicle systems must be present from the design stages and through production and operation stages Risk assessment must be continual; threat intelligence can help prioritize cybersecurity threats by associated risk and illuminate appropriate incident response (AUTONOMOUS DRIVING) ADDED TO IN-VEHICLE SYSTEMS WITH MORE ATTACK SURFACES, MORE COMPLEXITY Today,the average person generates about 650MB/day - through PCs,phones, etc. The autonomous vehicle of 2020 will use about 3000 people’s worth of data per day GPS 50KB/s CAMERA 20-60 MB/s Sources: Brian Krzanich, CEO, Intel Corporation. Keynote at Automobility LA 2016, Bloomberg, Jan. 2015, Kelley Blue Book, March 2016 Self-driving cars may claim one-quarter of worldwide auto sales by 2035 Consumers care about security: 44% of consumers believe the vehicle manufacturer is the party most responsible for securing a vehicle against hacking. 30% say the makers of mobile software and apps are most responsible. Automotive and transportation industries will be among the first to see immediate growth from smart and connected technologies 4000MB OF DATA BY 2020, A SINGLE AUTONOMOUS VEHICLE WILL GENERATE RADAR 1-10 KB/s SONAR 10-100 KB/s FASTRFuture of Automotive Security Technology Research SM SM