Top 5 Threat Vectors in Connected Cars and How to Combat Them

Top 5 Threat Vectors in Connected Cars and How to Combat Them

Plug-in electric and at least partially autonomous connected cars are a common sight on roads around the world. 


The software and electronic component market for those vehicles is projected to grow from $238 billion to $469 billion between 2020 and 2030. Both cybersecurity and ‘privacy by design and default’ have been holistically embedded into operations across many manufacturers, supply chains and delivery infrastructures. But, these are vulnerable to cyberattacks, as are the vehicles themselves once they leave the assembly line. They need cyber resilience standards as much as any other computer. 


On Oct. 7, 2020, X-Force Red, IBM Security’s team of hackers, and IBM’s global automotive team will present a webinar about new security mandates for connected cars. They will discuss common attack scenarios the mandates should help protect against, and what manufacturers can do today to begin the compliance process.


Register now

Bringing Security Out of the Assembly Line 


Securing intellectual property, such as new designs, concepts, tooling/technologies and strategic plans, has been a focus in manufacturing plants for many years. Once they get on the road, connected and automated vehicles (CAVs) are vulnerable to cyberattacks. This includes the physical vehicles, technologies and services they connect to and communicate with. 


While manufacturers have excelled in security in development, production and engineering, they do not consider cybersecurity gaps as often. For example, they may dismiss cybersecurity monitoring of connected cars on the road. Thre ..

Support the originator by clicking the read the rest link below.