SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Cisco ConfidentialCisco IBSG © 2011 Cisco and/or its affiliates. All rights reserved. Internet Business Solutions Group 1
Andreas Mai
Director Smart Connected Vehicles
April 2014
Mission Critical: Security
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Daily Security IntelligenceDaily Web RequestsDeployed Security DevicesApplications
& Micro-Applications
100TB
Security
Intelligence
1.6M
Deployed
Devices
13B
Web Requests
150,000
Micro-
applications
1,000
Applications
93B
Daily Email
Messages
35%
Enterprise Email
5,500
IPS Signatures
150M
Deployed
Endpoints
3-5 min
Updates
Security Intelligence Operations:
• Broadest Visibility
• Global Footprint
• Defense in Depth
5B
Daily Email
Connections
4.5B
Daily Email Blocks
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Threat Operations Center Advanced AlgorithmsCisco SensorBase
Global
Threat
Telemetry
Global
Threat
Telemetry
8:10 GMT
All Cisco Customers Protected
Bank Branch
in Chicago
ISP Datacenter
in Moscow
Ad Agency HQ
in London
8:03 GMT
IPS Detects Hacker Probing
8:07 GMT
Web Security Detects
New Botnet
8:00 GMT
Email Security Detects
Compromised Server
OEM ..OEM 2OEM 1
8:03 GMT
IPS Detects Hacker Probing
8:07 GMT
Web Security Detects
New Botnet
8:00 GMT
Email Security Detects
Compromised Server
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Malware Attacks through all Communication Channels
Public
Clouds
Automaker
Clouds
Private
Clouds
Enterprise
Clouds
Roadside
Networks
V2I
Communications
Onboard Networks,
Devices & Apps
Onboard
Wi-Fi Hotspot
Tethered
Smartphone
Local / On-board
Communications
V2V
Communications
Onboard Diagnostic
Interface (OBD II)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
8
128 1280
32
1372
CAN CAN Virtual Package Ethernet
Security:
E.g., AES 128
bit (16 byte)
signature
Packet Size [Bits]
“Free” bytes for
user dataRoom for
security?
1,500
“160”
(Cumbersome) Workaround:
• Receiver collects 20 CAN
packets into one virtual
packet
• … but what happens if one
packet is missed ?
• Every message
broadcasted by a single
ECU: but what if a rogue
ECU is cheating?
• 11bit/29bit ‘message-ID’
field, is not verifiable
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Creates malware
on the ADAS
Exposes OBU and
starts sending
many bad packets
Sends a super-packet
Malware created in car’s
communication gateway
Enterprise Web OEM Roadside GridHome
Audio/ Video DiagnosticsTelematics ADAS ….
The car is disabled or
destroyed
Unauthorized packets
are sent
OBU
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Advanced Vehicle
Security System
Enterprise Web OEM Roadside GridHome
ADASAudio/ Video DiagnosticsTelematics ….
Secure Car
Gateway
(SCG)
Security Cloud
Vehicle Threat Defense Update
Vehicle Misbehavior Detection
Vehicle Threat Report
2
1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Vehicle System:
• Harden ECUs: HW, OS, App SW,
secure BL, incl. chemistry
• Validate and protect code integrity
• Authenticate messages, KMS
• Detect anomalies/ intrusions
• Secure OTA S/W update
• Protect privileged service mode
• Secure App sandbox
1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Security Cloud
2
4. Cloud Services: Assist
vehicle’s threat defense,
update vehicle onboard
defense, and remove
threats before they reach
vehicles
Cloud Security
5. Interactions: for
security cloud to
assist onboard
threat defense
Threat
Related
Information
Updates &
Threat
Defense
Assistance
6. Remote Mgt.
Provisioning, key and
credential mgt, remote
monitoring, malware
removal, …
6. Remote Mgt.
7.Misbehavior
Detection
Anomalies,
Context based
defense
7.Misbehavior
Detection
Local Wireless
and Physical
Connections
Onboard
Security Gateway
2. Vehicle Services:
Secure vehicle access,
secure communications,
malware defense,
onboard activity
monitoring, onboard
authentication and key
management, …
Public
Clouds
Private
Clouds
Enterprise
Clouds
Automaker
Clouds
Through
Security
Cloud
3. Secure V2I
Communications
• IPSE, SSL.,...
• Dynamically
established at
proper protocol
layers
• Scalable to support
10+ M vehicles
Not
through
Security
Cloud
Remote
Traffic
1. Vehicle
System
Security
In-Vehicle Networks
Vehicle ECUs, Sensors,
Actuators, Applications
1
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Build End to End
Security Architecture
Secure
Car Cloud
Services
Secure
Car Gateway
Secure
Car Network
Secure
NW Access
3G/
LTE
WiFi/
DSRC
Security+
On ECU
SWCrypto HW
Leverage Entire Portfolio
to Design Security System
Pay
now!
Car Theft
3G/LTE
IVI
OBU
Service Theft
Conduct Threat, Penetration
& Vulnerability Analysis
Disablement
…. ???
RansomeWare
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
• Some already established security teams
… Others are still considering whether it
is necessary
• Some already delivered security
requirements to their Tier1s
… Others have not yet written any
security requirements
• Some are fully aware and actively
engaged in security standardization
… Others are still hesitant if/how to get
involved in Vehicle Security Standards
PAY
GOV
Mandate
OEM
Required
Vehicle
Security
Standard
Tier-1
USP
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Thank you.

Contenu connexe

Tendances

Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAlcatel-Lucent Enterprise
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesAlcatel-Lucent Enterprise
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threatsgruzabb
 
The march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs EuropeThe march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs EuropeSITA
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]Ian Skerrett
 
Internet of everything
Internet of everything Internet of everything
Internet of everything Jayesh Pai
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHBlock Armour
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterOleg Konovalov
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Oleg Konovalov
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseRobb Boyd
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...Block Armour
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 

Tendances (20)

Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
Mavenir: Evolution of Real-Time Machine Learning (RRML) in Core Network Secur...
 
Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
Top 5 wi fi security threats
Top 5 wi fi security threatsTop 5 wi fi security threats
Top 5 wi fi security threats
 
The march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs EuropeThe march of the IoT - Charlie Sheridan, Intel Labs Europe
The march of the IoT - Charlie Sheridan, Intel Labs Europe
 
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro RizziEENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
EENA2019: Track2 session1 Containing IoT (...)_Mauro Rizzi
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)Block Armour Unified Secure Access Solution (based on Zero Trust principles)
Block Armour Unified Secure Access Solution (based on Zero Trust principles)
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...CASE STUDY: How Block Armour enabled  secure remote access to on- premise as ...
CASE STUDY: How Block Armour enabled secure remote access to on- premise as ...
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 

En vedette

Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2KME Automation Services, LLC
 
Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Kevin Murphy
 
AIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, EuropeAIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, EuropeGrupa AT3
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Iddan Halevy
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsAndreas Mai
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalNewellNYC
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Joseph Hennawy
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionAlexander Schellong
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner, RCDD
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Bill Harpley
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesBill Harpley
 
Librecon 2016 bilbao: kappa architecture IoT of the cars
Librecon 2016 bilbao:   kappa architecture IoT of the carsLibrecon 2016 bilbao:   kappa architecture IoT of the cars
Librecon 2016 bilbao: kappa architecture IoT of the carsJuantomás García Molina
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT SecurityBill Harpley
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate DeckDvir Reznik
 
Autonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesJeffrey Funk
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Ankit Singh
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoTAhmed Banafa
 

En vedette (20)

Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2Infographic: 2015 Trends in the Automotive Industry - part 2
Infographic: 2015 Trends in the Automotive Industry - part 2
 
Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014Cyber Sec Update Secure World Seattle Nov 13, 2014
Cyber Sec Update Secure World Seattle Nov 13, 2014
 
AIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, EuropeAIR SHOW 2013, Poland, Europe
AIR SHOW 2013, Poland, Europe
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business Models
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's Hospital
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive Revolution
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering Biography
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
 
Librecon 2016 bilbao: kappa architecture IoT of the cars
Librecon 2016 bilbao:   kappa architecture IoT of the carsLibrecon 2016 bilbao:   kappa architecture IoT of the cars
Librecon 2016 bilbao: kappa architecture IoT of the cars
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate Deck
 
Autonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and Opportunities
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 

Similaire à SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solutionxKinAnx
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?MenloSecurity
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content SecurityCisco Canada
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 

Similaire à SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars (20)

Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
Presentation cisco iron port e-mail security solution
Presentation   cisco iron port e-mail security solutionPresentation   cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 

Plus de Andreas Mai

The Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing FootprintThe Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing FootprintAndreas Mai
 
Autonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the FutureAutonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the FutureAndreas Mai
 
$5 Trillion Economic Value at Stake: Digitization of Road Transportation
$5 Trillion Economic Value at Stake:  Digitization of Road Transportation $5 Trillion Economic Value at Stake:  Digitization of Road Transportation
$5 Trillion Economic Value at Stake: Digitization of Road Transportation Andreas Mai
 
Digitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value ChainDigitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value ChainAndreas Mai
 
IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014Andreas Mai
 
CES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected VehiclesCES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected VehiclesAndreas Mai
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsAndreas Mai
 
13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-fAndreas Mai
 
The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary Andreas Mai
 
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...Andreas Mai
 
Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes Andreas Mai
 
Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads Andreas Mai
 
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...Andreas Mai
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsAndreas Mai
 
11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars F11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars FAndreas Mai
 

Plus de Andreas Mai (15)

The Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing FootprintThe Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
The Odyssee of the Auto Industry - Suppliers Changing Manufacturing Footprint
 
Autonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the FutureAutonomous Vehicles and P3s: Vision of the Future
Autonomous Vehicles and P3s: Vision of the Future
 
$5 Trillion Economic Value at Stake: Digitization of Road Transportation
$5 Trillion Economic Value at Stake:  Digitization of Road Transportation $5 Trillion Economic Value at Stake:  Digitization of Road Transportation
$5 Trillion Economic Value at Stake: Digitization of Road Transportation
 
Digitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value ChainDigitization of the Automotive Industry: Connecting The New Mobility Value Chain
Digitization of the Automotive Industry: Connecting The New Mobility Value Chain
 
IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014IoE = New Partners & Business Models @ ITS World Congress 2014
IoE = New Partners & Business Models @ ITS World Congress 2014
 
CES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected VehiclesCES 2014 - Autonomous Connected Vehicles
CES 2014 - Autonomous Connected Vehicles
 
Internet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco SystemsInternet of Cars, Andreas Mai, Cisco Systems
Internet of Cars, Andreas Mai, Cisco Systems
 
13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f13 03-28-scv-its-advisory-cisco-perspective-f
13 03-28-scv-its-advisory-cisco-perspective-f
 
The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary The Business Case for Connected Vehicles: Executive Summary
The Business Case for Connected Vehicles: Executive Summary
 
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
Connected Vehicles and Government: A Catalyst To Unlock the Societal Benefits...
 
Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes Connected Vehicles—Insurance: The Business of Preventing Crashes
Connected Vehicles—Insurance: The Business of Preventing Crashes
 
Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads Connected Vehicles—Service Providers: Service Providers at a Crossroads
Connected Vehicles—Service Providers: Service Providers at a Crossroads
 
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
Connected Vehicles--Automotive: From Building Cars to Selling Personal Travel...
 
The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business Models
 
11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars F11 10 18 Cisco Its Wc Internet Of Cars F
11 10 18 Cisco Its Wc Internet Of Cars F
 

Dernier

Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxzohiiimughal286
 
John deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance ManualJohn deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance ManualExcavator
 
Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class Service 100% Saf...
Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class  Service 100% Saf...Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class  Service 100% Saf...
Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class Service 100% Saf...shivangimorya083
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111Sapana Sha
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHot Call Girls In Sector 58 (Noida)
 
Delhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sex
Delhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sexDelhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sex
Delhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sexshivangimorya083
 
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Hot Call Girls In Sector 58 (Noida)
 
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
What Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingWhat Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingBruce Cox Imports
 
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls  Size E6 (O525547819) Call Girls In DubaiDubai Call Girls  Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubaikojalkojal131
 
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation IssueHow To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation IssueTerry Sayther Automotive
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一meq5nzfnk
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂Hot Call Girls In Sector 58 (Noida)
 
Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...
Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...
Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...shivangimorya083
 
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfJohn Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfExcavator
 
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...Hot Call Girls In Sector 58 (Noida)
 
9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay Nagar9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay NagarGenuineGirls
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryPooja Nehwal
 
Hyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai Motor Group
 

Dernier (20)

Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptx
 
John deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance ManualJohn deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance Manual
 
Call Girls In Kirti Nagar 7042364481 Escort Service 24x7 Delhi
Call Girls In Kirti Nagar 7042364481 Escort Service 24x7 DelhiCall Girls In Kirti Nagar 7042364481 Escort Service 24x7 Delhi
Call Girls In Kirti Nagar 7042364481 Escort Service 24x7 Delhi
 
Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class Service 100% Saf...
Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class  Service 100% Saf...Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class  Service 100% Saf...
Hot Modals Call Girls (Delhi) Dwarka9711199171✔️ High Class Service 100% Saf...
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
 
Delhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sex
Delhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sexDelhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sex
Delhi Call Girls Safdarjung 9711199171 ☎✔👌✔Body to body massage with sex
 
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
 
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Vikaspuri 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
What Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingWhat Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop Working
 
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls  Size E6 (O525547819) Call Girls In DubaiDubai Call Girls  Size E6 (O525547819) Call Girls In Dubai
Dubai Call Girls Size E6 (O525547819) Call Girls In Dubai
 
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation IssueHow To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
 
Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...
Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...
Hot And Sexy 🥵 Call Girls Delhi Daryaganj {9711199171} Ira Malik High class G...
 
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfJohn Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
 
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
 
9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay Nagar9990611130 Find & Book Russian Call Girls In Vijay Nagar
9990611130 Find & Book Russian Call Girls In Vijay Nagar
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
 
Hyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRCHyundai World Rally Team in action at 2024 WRC
Hyundai World Rally Team in action at 2024 WRC
 

SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars

  • 1. Cisco ConfidentialCisco IBSG © 2011 Cisco and/or its affiliates. All rights reserved. Internet Business Solutions Group 1 Andreas Mai Director Smart Connected Vehicles April 2014 Mission Critical: Security
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Daily Security IntelligenceDaily Web RequestsDeployed Security DevicesApplications & Micro-Applications 100TB Security Intelligence 1.6M Deployed Devices 13B Web Requests 150,000 Micro- applications 1,000 Applications 93B Daily Email Messages 35% Enterprise Email 5,500 IPS Signatures 150M Deployed Endpoints 3-5 min Updates Security Intelligence Operations: • Broadest Visibility • Global Footprint • Defense in Depth 5B Daily Email Connections 4.5B Daily Email Blocks
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Threat Operations Center Advanced AlgorithmsCisco SensorBase Global Threat Telemetry Global Threat Telemetry 8:10 GMT All Cisco Customers Protected Bank Branch in Chicago ISP Datacenter in Moscow Ad Agency HQ in London 8:03 GMT IPS Detects Hacker Probing 8:07 GMT Web Security Detects New Botnet 8:00 GMT Email Security Detects Compromised Server OEM ..OEM 2OEM 1 8:03 GMT IPS Detects Hacker Probing 8:07 GMT Web Security Detects New Botnet 8:00 GMT Email Security Detects Compromised Server
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Malware Attacks through all Communication Channels Public Clouds Automaker Clouds Private Clouds Enterprise Clouds Roadside Networks V2I Communications Onboard Networks, Devices & Apps Onboard Wi-Fi Hotspot Tethered Smartphone Local / On-board Communications V2V Communications Onboard Diagnostic Interface (OBD II)
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 8 128 1280 32 1372 CAN CAN Virtual Package Ethernet Security: E.g., AES 128 bit (16 byte) signature Packet Size [Bits] “Free” bytes for user dataRoom for security? 1,500 “160” (Cumbersome) Workaround: • Receiver collects 20 CAN packets into one virtual packet • … but what happens if one packet is missed ? • Every message broadcasted by a single ECU: but what if a rogue ECU is cheating? • 11bit/29bit ‘message-ID’ field, is not verifiable
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Creates malware on the ADAS Exposes OBU and starts sending many bad packets Sends a super-packet Malware created in car’s communication gateway Enterprise Web OEM Roadside GridHome Audio/ Video DiagnosticsTelematics ADAS …. The car is disabled or destroyed Unauthorized packets are sent OBU
  • 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Advanced Vehicle Security System Enterprise Web OEM Roadside GridHome ADASAudio/ Video DiagnosticsTelematics …. Secure Car Gateway (SCG) Security Cloud Vehicle Threat Defense Update Vehicle Misbehavior Detection Vehicle Threat Report 2 1
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Vehicle System: • Harden ECUs: HW, OS, App SW, secure BL, incl. chemistry • Validate and protect code integrity • Authenticate messages, KMS • Detect anomalies/ intrusions • Secure OTA S/W update • Protect privileged service mode • Secure App sandbox 1
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Security Cloud 2 4. Cloud Services: Assist vehicle’s threat defense, update vehicle onboard defense, and remove threats before they reach vehicles Cloud Security 5. Interactions: for security cloud to assist onboard threat defense Threat Related Information Updates & Threat Defense Assistance 6. Remote Mgt. Provisioning, key and credential mgt, remote monitoring, malware removal, … 6. Remote Mgt. 7.Misbehavior Detection Anomalies, Context based defense 7.Misbehavior Detection Local Wireless and Physical Connections Onboard Security Gateway 2. Vehicle Services: Secure vehicle access, secure communications, malware defense, onboard activity monitoring, onboard authentication and key management, … Public Clouds Private Clouds Enterprise Clouds Automaker Clouds Through Security Cloud 3. Secure V2I Communications • IPSE, SSL.,... • Dynamically established at proper protocol layers • Scalable to support 10+ M vehicles Not through Security Cloud Remote Traffic 1. Vehicle System Security In-Vehicle Networks Vehicle ECUs, Sensors, Actuators, Applications 1
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Build End to End Security Architecture Secure Car Cloud Services Secure Car Gateway Secure Car Network Secure NW Access 3G/ LTE WiFi/ DSRC Security+ On ECU SWCrypto HW Leverage Entire Portfolio to Design Security System Pay now! Car Theft 3G/LTE IVI OBU Service Theft Conduct Threat, Penetration & Vulnerability Analysis Disablement …. ??? RansomeWare
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 • Some already established security teams … Others are still considering whether it is necessary • Some already delivered security requirements to their Tier1s … Others have not yet written any security requirements • Some are fully aware and actively engaged in security standardization … Others are still hesitant if/how to get involved in Vehicle Security Standards PAY GOV Mandate OEM Required Vehicle Security Standard Tier-1 USP
  • 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Thank you.