1. Home
  2. chevron_right
  3. Blog
  4. chevron_right
  5. Protect Connected Cars from Emerging Cybersecurity Threats

Protect Connected Cars from Emerging Cybersecurity Threats

IoT enabled self deiving car


Protect critical functions of today’s vehicles from security threats

Watch Now

Modern vehicles are rightfully termed as ‘software on wheels.’ They are increasingly connected machines, with growing numbers of entry points and highly sophisticated internal networks controlling critical functions. Increased electric and electronic (E/E) and software complexity often invite a multi-fold increase in cyber-security incidents. Several researchers and white hat hackers have demonstrated security gaps that must be addressed before the deployment of automotive-grade embedded software. The discussions in today’s event will explore how to protect a vehicle’s critical functions from security threats.

Electrical car

Cybersecurity Threats Can Be Avoided With Secure Communication

Internet-based threats include packets with malicious connection states, contents or sources, denial of service (DoS) attacks, broadcast storms and packet flood conditions. That calls for a multilayered approach to ensure vehicle security as well as overall vehicle safety and reliability. We’ll discuss practical design examples from in-production OEM flagship projects which contain a system-level framework for secure communications by integrating firewall into existing ECU systems. We will also discuss the role of authentication and encryption in secure communication and how digital certificates and PKI enable strong identities to support secure communication between vehicles and external systems.

In this webinar you will be learning more about

  • Recent security vulnerabilities and threats for connected cars
  • Efforts by governments to define cyber-secure requirements for connected cars and legislate liabilities
  • The role of embedded firewalls, authentication, encryption and digital certificates in a multilayered vehicle security solution
  • Security architectures for protecting both vehicle network entry points and in-vehicle networks

For more information, send us an email at info@prolim.com

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.