Cyber Security and the Connected Vehicle How to adapt to the new - - PowerPoint PPT Presentation

cyber security and the connected vehicle
SMART_READER_LITE
LIVE PREVIEW

Cyber Security and the Connected Vehicle How to adapt to the new - - PowerPoint PPT Presentation

STEER Cyber Security and the Connected Vehicle How to adapt to the new age challenge S STEER Founded in 2016 by Automotive Cybersecurity Leaders with previous successful commercialization and acquisitions Proudly encouraging Focused on


slide-1
SLIDE 1

S

Cyber Security and the Connected Vehicle

How to adapt to the new age challenge

STEER

slide-2
SLIDE 2

STEER Founded in 2016 by Automotive Cybersecurity Leaders with previous successful commercialization and acquisitions

Proudly encouraging STEM activities and Women in the Workforce Focused on massively enabling secure self driving cars Headquartered in Columbia, Maryland

slide-3
SLIDE 3

S

The modern car ….a journey

3

slide-4
SLIDE 4

What Automotive is Today

4

slide-5
SLIDE 5

Connected to Everything

5

slide-6
SLIDE 6

Cybersecurity

S The art of protecting ones assets electronically, or

electromechanically

S Hacker vs Defender S Hacker Mentality

S Look for easiest path in

S

Unsecured entryways, unsecured interfaces, openings! S Always trying to game the system S Reward driven

S Defender mentality?

6

slide-7
SLIDE 7

Open exploitable surfaces

  • Bluetooth
  • WiFi
  • DSRC (V2V) Short Range Comm
  • Near Field Communication
  • Sensors
  • LIDAR
  • RADAR
  • Camera
  • OBD-II
  • Tire Pressure Monitoring System
  • USB
  • Remote Keyless Entry
  • Data Line for EVs

7

slide-8
SLIDE 8

8

slide-9
SLIDE 9

How else can a Hacker Penetrate a System to Cause an Inadvertent Outcome?

S Vehicle

S Using peripheral devices (smart phones, Can/JBus devices, USB

devices)

S Sensors (tpms, radar, lidar, camera) S On-board telemaGcs

S Fleet

S From a compromised vehicle into the fleet management

infrastructure

S Service Network

S From a secure, valid entry point by inserGng malware into the vehicle

being serviced

slide-10
SLIDE 10

Firewall Server

NOC

Corporate IT network

No Truck LeN Behind

  • 1. Malware from Vehicle

into Fleet Cloud

  • 2. Malware into Fleet Cloud

undetected

  • 3. Malware from Cloud

into unsuspecting fleets

slide-11
SLIDE 11

2011-2016

S 2011: First physical hack on a car

by university researchers

S 2012: First OBD-II hack on car S 2013: TPMS hack S 2014: Radio hack S 2015: Remote hack!

2 4 6 8 10

Physical Attack Remote Attack

11

slide-12
SLIDE 12

2015 – The Breakout year

S First public demonstration of a

remote hack on a vehicle

S “No-physical-contact” attack S First cyber security associated

recall in automotive history!

S First NHTSA cyber security

related fine!

S First NHTSA action on Tier1! S First time OEM $ value

associated with lack of cyber security:

S $1.4B in recall cost S $105MM in fines S First class action lawsuits S First PR firms engaged to

counter cyber security messages

S First $$ spent for cyber damage!

12

slide-13
SLIDE 13

Need for Cyber Security

  • Brand reputation damage
  • Lawsuits
  • NHTSA fines
  • Recall costs
  • Board and top executives
  • n-hook
  • Congressional hearings

13

slide-14
SLIDE 14
  • Fear of loss of life
  • Penetration of back-end

systems through vehicle

  • Penetration of other

networks through vehicle

  • Trojanization of car!
  • Just waiting for the

motivated attacker

Need for Cyber Security (cont.)

14

slide-15
SLIDE 15

Hacker conquest list

  • Ford
  • GM
  • BMW
  • Toyota
  • Mercedes
  • FCA
  • Tesla
  • Hyundai
  • Nissan
  • Audi
  • Mitsubishi
  • VW
  • Honda

15

slide-16
SLIDE 16

S

How to solve the cyber security problem?

16

slide-17
SLIDE 17

Automotive Development Cycle

Image source: Black Duck

17

slide-18
SLIDE 18

What the industry needs and, how to provide it

S Cyber security must become an integral part of all offerings S It is a qualifier S Training programs that capture cross disciplinary domains S Incident Response

18

slide-19
SLIDE 19

Goal of Automotive Cybersecurity Training

S Build cyber secure and robust electronics and systems

inside out

S Ready to face next gen of connected vehicles S Ready to face cyber adversaries, and cyber criminals S Ready to face connected automated and electrified vehicles S Ready to service and maintain all of the above in top shape

with minimum vulnerabilities

19

slide-20
SLIDE 20

Cyber Security Training Strategy

S

Corporate Training

S

Corporate Structure changes S

Processes

S

Development, testing and Operations side S

Data & Benchmark Testing

S

Service side training

S

Service –a real backdoor. S

Technology Side

S

Best practices, Secure design, verification and validation to include security requirements

20

slide-21
SLIDE 21

Corporate Structure

S Correct posture on cyber security S Risk assessments and threat analysis S Hiring key talent for cyber security operations S Staff Certifications & Training

21

slide-22
SLIDE 22

Process

S Cyber Security Framework: SAE J3061 S NHTSA Guidelines S ISAC bulletins S Secure Coding Practices S Incident Notification, Response and Handling

22

slide-23
SLIDE 23

Data & Benchmarking

S Cyber security benchmark / T&E Framework S Vulnerability assessment cataloging S Gray/Black box testing data mining S Continuous Penetration Testing

23

slide-24
SLIDE 24

Summary

S Cyber security is a necessity and not an add-on

differentiator any more

S Comprehensive cyber security needs comprehensive

attention and 4-pronged approach

S Several methodologies that can be applied internally,

incrementally, and conclusively

S Positive impact on cyber liability and cyber insurance

24

slide-25
SLIDE 25

S

Thank you!

Anuja Sonalker, Ph.D

anuja@steer-tech.com

www.steer-tech.com