SlideShare a Scribd company logo
1 of 4
Download to read offline
www.pecb.org 
Are we going to have security 
issues on connected cars?
2 
It has been over a century that society is using one of the greatest inventions of everyday life which 
are cars. Their industry is one of the largest in the world and one of the most profitable sectors, 
which has made a huge number of people not just use their cars for everyday needs but to fall in 
love with them. 
This may sounds strange, but it is true, there are a lot of people that basically love metal and other 
materials which are used to produce cars. It seems that their admiration will enhance more because 
car industry is not just sticking with driving processes, continual achievements of technology have 
brought smart innovations in cars also. 
Thanks to this, in less than one year from now 25% of cars will be connected to the internet and just 
two years later, by 2017, more than 60% of them will end up the same. This means that very soon a 
huge number of people will have internet access even while they are driving. 
What is going to happen? We are going to see more and more "smart" cars with incorporated 
Bluetooth, radio and GPS systems, wireless and satellite systems and advanced touch screen in 
front, etc., moreover, a possibility to exchange data among cars, cars to roadside equipment, and 
car–to-mobile devices. As a result, drivers will face enormous number of services, applications and 
cooperation with different systems. 
Sending information to one another, cars will be able to reduce problems like traffic jam and road 
blockage, then by using crash-avoidance applications cars will have more wheel control which would 
reduce accidents. Furthermore, location based services will enable promotion advertisements; locate 
nearest restaurants, gas stations, hospitals, etc. In addition to this, checking e-mail, news headlines, 
connecting to social networks like Facebook and Twitter, and access to home safety systems, see 
weather updates, downloading music are now part of modern cars, and lots of other applications 
are to come. 
In recent years, the idea of modern cars with internet connection is taking off. These ideas have 
derived from continual improvements of technology, which of course have influenced carmakers, 
eventhough they tend to lag behind the latest technology. Besides software developments and 
smart ideas about different applications, there are various different hardware technologies which 
enable all these developments. 
The fact that the car itself is a complex system, its inside has distributed computer systems 
comprising millions of lines of code executing on tens of heterogeneous processors with rich 
connectivity provided by internal networks. From the outside there are a lot of systems which make 
internet connection possible. Some of manufactures have achieved this by making smartphone 
access possible in the cars, or wireless USB adapter, some of them are using Autonet Mobile router 
which connects to the Internet through a 3G or 4G cellular connection, etc. 
All this brings significant benefit to the car manufactures, application developers and telecommunication 
companies, but it brings something else as well, new jobs and opportunities for attackers!
So at the same level that involved people in this process, the same process is optimistic for the future of modern 
cars, they are concerned about car security issues or better to say car resistance to cyber-security threats and 
vulnerability. 
Is this just a concern or something more? 
There are already some famous car brands which are considered vulnerable to get attacked by hackers, so the 
idea of this phenomenon is already a fact. 
According to experts, hackers could do anything by having access to radio part with short-range and long-range 
wireless access. This would give them the ability to install so-called malware and have remote access on car's 
network wirelessly. As a result they could manipulate the GPS system and track the car, influence slamming 
on the brakes, control systems such as steering, braking and accelerating, lock or unlock doors, etc. Gaining 
access to all of the car's network features for now is very vulnerable thanks to the fact that all radio functions, 
Bluetooth, and car navigation system have the same network as car's engine and brakes, so hackers need to 
break just into one network. 
Therefore, these situations can occur and can expose us to serious threats which consequences can be very big. 
This is one of the main research topics in the last years which have united automotive manufacturers, component 
suppliers, telecommunication companies, universities and research institutions and public authorities. 
However, this will not be easy. Car manufactures and designers need years to incorporate, test and implement 
a technology achievement in their products. The paradox is that innovation and achievement in technology gets 
old within two years. 
In addition to this, the trends of achievements regarding the security in connected cars seem to be developed 
in different perspectives. This divergence of course is because of different types of technology used to provide 
these kinds of services, but even so, there should be a number of standardized requirements as a reference for 
every organization incorporated here. Requirements should be concluded after the identification of user and 
system risks, their types and severity; examine the varying levels of security options available to address the 
risks; examine the institutional issues associated with this approach and resulting impacts on safety, privacy, user 
acceptance, and cost. These standardized requirements should include policy, and institutional requirements 
for communication security based on industry and stakeholder’s needs. All this would result in industry’s best 
practices for preventing, detecting, and mitigating security risks in interconnected cars. 
3
4 
Conclusion 
Advantages and benefits of using technology will always overcome the fear of possible vulnerabilities that 
would bring harm, but because of the huge risk that can result on the malfunctioning of the cars, issues like 
this should be considered very important. Some pragmatic recommendations for future automotive security, 
as well as identify fundamental challenges should be given very soon and they have to be standardized to 
speak with same language for every included part of carmaker process. 
In addition to this proposed roles and responsibilities for organizational and operational management entities 
should be defined, they need to understand key requirements of security protection, therefore, certified 
personnel is more than needed. 
Professional Evaluation and Certification Board (PECB) is a certification body for persons on a wide range of 
professional standards. It offers ISO 27001, ISO 31000 and ISO 27005 training and certification services for 
professionals wanting to support organizations on the implementation of these management systems. ISO 
Standards and Professional Trainings offered by PECB: 
• Certified Lead Implementer (5 days) 
• Certified Lead Auditor (5 days) 
• Certified Foundation (2 days) 
• ISO Introduction (1 day) 
Lead Auditor, Lead Implementer and Master are certification schemes accredited by ANSI ISO/IEC 17024. 
Rreze Halili is the Technology, Security and Continuity (TSC) Product Manager at PECB. She is in charge of 
developing and maintaining training courses related to TSC. If you have any questions, please do not hesitate 
to contact: tsc@pecb.org. 
For further information, please visit www.pecb.org/en/training

More Related Content

What's hot

Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015AppTractor
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5GaNumak & Company
 
Mobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva SundararamanMobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva Sundararamanagilemaine
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsInfo-Tech Research Group
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Why job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your businessWhy job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your businessIvo Brett
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11coachdave
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataJohn Davis
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Dr.Irshad Ahmed Sumra
 

What's hot (10)

Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015Mobility Index Report за 2 квартал 2015
Mobility Index Report за 2 квартал 2015
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Public safety is reshaped with 5G
Public safety is reshaped with 5GPublic safety is reshaped with 5G
Public safety is reshaped with 5G
 
Mobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva SundararamanMobile Automation and Best Practices - Siva Sundararaman
Mobile Automation and Best Practices - Siva Sundararaman
 
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App TrendsStay on Top of Today’s and Tomorrow’s Mobile App Trends
Stay on Top of Today’s and Tomorrow’s Mobile App Trends
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Why job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your businessWhy job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your business
 
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
V2 V V2 I Apps Come To Michigan Test Bed Article 9 1 11
 
App Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing DataApp Developers Urged to Take Greater Care in Accessing Data
App Developers Urged to Take Greater Care in Accessing Data
 
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
Using Trusted Platform Module (TPM) to Secure Business Communication (SBC) in...
 

Viewers also liked

Connected Car Services - Generalizing and Simplifying Telematics
Connected Car Services - Generalizing and Simplifying TelematicsConnected Car Services - Generalizing and Simplifying Telematics
Connected Car Services - Generalizing and Simplifying TelematicsToralf Richter
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckSecurity Innovation
 
IoT Smart Home, Connected Car, Health Patents Data Use Cases
IoT Smart Home, Connected Car, Health Patents Data Use CasesIoT Smart Home, Connected Car, Health Patents Data Use Cases
IoT Smart Home, Connected Car, Health Patents Data Use CasesAlex G. Lee, Ph.D. Esq. CLP
 

Viewers also liked (7)

Connected car slides
Connected car slidesConnected car slides
Connected car slides
 
Connected Car Services - Generalizing and Simplifying Telematics
Connected Car Services - Generalizing and Simplifying TelematicsConnected Car Services - Generalizing and Simplifying Telematics
Connected Car Services - Generalizing and Simplifying Telematics
 
Connected Cars: Automotive Technology M&A
Connected Cars: Automotive Technology M&AConnected Cars: Automotive Technology M&A
Connected Cars: Automotive Technology M&A
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
7 Predictive Analytics, Spark , Streaming use cases
7 Predictive Analytics, Spark , Streaming use cases7 Predictive Analytics, Spark , Streaming use cases
7 Predictive Analytics, Spark , Streaming use cases
 
Connected Vehicle Data Platform
Connected Vehicle Data PlatformConnected Vehicle Data Platform
Connected Vehicle Data Platform
 
IoT Smart Home, Connected Car, Health Patents Data Use Cases
IoT Smart Home, Connected Car, Health Patents Data Use CasesIoT Smart Home, Connected Car, Health Patents Data Use Cases
IoT Smart Home, Connected Car, Health Patents Data Use Cases
 

Similar to Are we going to have security issues on connected cars?

Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Blockchain for the Automotive Industry the 2018 Worldwide Survey Results
Blockchain for the Automotive Industry the 2018 Worldwide Survey ResultsBlockchain for the Automotive Industry the 2018 Worldwide Survey Results
Blockchain for the Automotive Industry the 2018 Worldwide Survey ResultsRichard Jones
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptxStrategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptxNiteshKumar958846
 
Role of Cyber security in Automotive
Role of Cyber security in AutomotiveRole of Cyber security in Automotive
Role of Cyber security in AutomotiveSophia Lorenn
 
SapientNitro_Insights_Automotive_Technologies_Final
SapientNitro_Insights_Automotive_Technologies_FinalSapientNitro_Insights_Automotive_Technologies_Final
SapientNitro_Insights_Automotive_Technologies_FinalTimothy Cory
 
Interview with Aldric Loyer, PSA / France
Interview with Aldric Loyer, PSA / FranceInterview with Aldric Loyer, PSA / France
Interview with Aldric Loyer, PSA / FranceMaria Willamowius
 
Interview: What is the main security and privacy risks associated with the ad...
Interview: What is the main security and privacy risks associated with the ad...Interview: What is the main security and privacy risks associated with the ad...
Interview: What is the main security and privacy risks associated with the ad...Ersin KARA
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET Journal
 
The Connected Vehicle: Viewing the Road Ahead
The Connected Vehicle: Viewing the Road AheadThe Connected Vehicle: Viewing the Road Ahead
The Connected Vehicle: Viewing the Road AheadAccenture Insurance
 
Connected cars a rising trend in the global automobile sector
Connected cars   a rising trend in the global automobile sectorConnected cars   a rising trend in the global automobile sector
Connected cars a rising trend in the global automobile sectorAranca
 
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportConnected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportAranca
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industryAkankshaPathak27
 
DEW w.e.f 17 11 2021.pdf
DEW w.e.f 17 11 2021.pdfDEW w.e.f 17 11 2021.pdf
DEW w.e.f 17 11 2021.pdfanoopkumarm
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTTekRevol LLC
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16Alex Lima
 

Similar to Are we going to have security issues on connected cars? (20)

Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Blockchain for the Automotive Industry the 2018 Worldwide Survey Results
Blockchain for the Automotive Industry the 2018 Worldwide Survey ResultsBlockchain for the Automotive Industry the 2018 Worldwide Survey Results
Blockchain for the Automotive Industry the 2018 Worldwide Survey Results
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptxStrategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptx
 
Role of Cyber security in Automotive
Role of Cyber security in AutomotiveRole of Cyber security in Automotive
Role of Cyber security in Automotive
 
SapientNitro_Insights_Automotive_Technologies_Final
SapientNitro_Insights_Automotive_Technologies_FinalSapientNitro_Insights_Automotive_Technologies_Final
SapientNitro_Insights_Automotive_Technologies_Final
 
Revolution in Mobility
Revolution in MobilityRevolution in Mobility
Revolution in Mobility
 
Interview with Aldric Loyer, PSA / France
Interview with Aldric Loyer, PSA / FranceInterview with Aldric Loyer, PSA / France
Interview with Aldric Loyer, PSA / France
 
Interview: What is the main security and privacy risks associated with the ad...
Interview: What is the main security and privacy risks associated with the ad...Interview: What is the main security and privacy risks associated with the ad...
Interview: What is the main security and privacy risks associated with the ad...
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoTIRJET - Automobile Enhanced Security System using LabVIEW based on IoT
IRJET - Automobile Enhanced Security System using LabVIEW based on IoT
 
The Connected Vehicle: Viewing the Road Ahead
The Connected Vehicle: Viewing the Road AheadThe Connected Vehicle: Viewing the Road Ahead
The Connected Vehicle: Viewing the Road Ahead
 
Connected cars a rising trend in the global automobile sector
Connected cars   a rising trend in the global automobile sectorConnected cars   a rising trend in the global automobile sector
Connected cars a rising trend in the global automobile sector
 
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-reportConnected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
Connected cars-a-rising-trend-in-the-global-automobile-sector-thematic-report
 
5 g in automotive industry
5 g in automotive industry5 g in automotive industry
5 g in automotive industry
 
AutonomousCars29
AutonomousCars29AutonomousCars29
AutonomousCars29
 
DEW w.e.f 17 11 2021.pdf
DEW w.e.f 17 11 2021.pdfDEW w.e.f 17 11 2021.pdf
DEW w.e.f 17 11 2021.pdf
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
The Internet of Things - IoT and EHS - Alex Lima - 3 15 16
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...nilamkumrai
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 

Recently uploaded (20)

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 

Are we going to have security issues on connected cars?

  • 1. www.pecb.org Are we going to have security issues on connected cars?
  • 2. 2 It has been over a century that society is using one of the greatest inventions of everyday life which are cars. Their industry is one of the largest in the world and one of the most profitable sectors, which has made a huge number of people not just use their cars for everyday needs but to fall in love with them. This may sounds strange, but it is true, there are a lot of people that basically love metal and other materials which are used to produce cars. It seems that their admiration will enhance more because car industry is not just sticking with driving processes, continual achievements of technology have brought smart innovations in cars also. Thanks to this, in less than one year from now 25% of cars will be connected to the internet and just two years later, by 2017, more than 60% of them will end up the same. This means that very soon a huge number of people will have internet access even while they are driving. What is going to happen? We are going to see more and more "smart" cars with incorporated Bluetooth, radio and GPS systems, wireless and satellite systems and advanced touch screen in front, etc., moreover, a possibility to exchange data among cars, cars to roadside equipment, and car–to-mobile devices. As a result, drivers will face enormous number of services, applications and cooperation with different systems. Sending information to one another, cars will be able to reduce problems like traffic jam and road blockage, then by using crash-avoidance applications cars will have more wheel control which would reduce accidents. Furthermore, location based services will enable promotion advertisements; locate nearest restaurants, gas stations, hospitals, etc. In addition to this, checking e-mail, news headlines, connecting to social networks like Facebook and Twitter, and access to home safety systems, see weather updates, downloading music are now part of modern cars, and lots of other applications are to come. In recent years, the idea of modern cars with internet connection is taking off. These ideas have derived from continual improvements of technology, which of course have influenced carmakers, eventhough they tend to lag behind the latest technology. Besides software developments and smart ideas about different applications, there are various different hardware technologies which enable all these developments. The fact that the car itself is a complex system, its inside has distributed computer systems comprising millions of lines of code executing on tens of heterogeneous processors with rich connectivity provided by internal networks. From the outside there are a lot of systems which make internet connection possible. Some of manufactures have achieved this by making smartphone access possible in the cars, or wireless USB adapter, some of them are using Autonet Mobile router which connects to the Internet through a 3G or 4G cellular connection, etc. All this brings significant benefit to the car manufactures, application developers and telecommunication companies, but it brings something else as well, new jobs and opportunities for attackers!
  • 3. So at the same level that involved people in this process, the same process is optimistic for the future of modern cars, they are concerned about car security issues or better to say car resistance to cyber-security threats and vulnerability. Is this just a concern or something more? There are already some famous car brands which are considered vulnerable to get attacked by hackers, so the idea of this phenomenon is already a fact. According to experts, hackers could do anything by having access to radio part with short-range and long-range wireless access. This would give them the ability to install so-called malware and have remote access on car's network wirelessly. As a result they could manipulate the GPS system and track the car, influence slamming on the brakes, control systems such as steering, braking and accelerating, lock or unlock doors, etc. Gaining access to all of the car's network features for now is very vulnerable thanks to the fact that all radio functions, Bluetooth, and car navigation system have the same network as car's engine and brakes, so hackers need to break just into one network. Therefore, these situations can occur and can expose us to serious threats which consequences can be very big. This is one of the main research topics in the last years which have united automotive manufacturers, component suppliers, telecommunication companies, universities and research institutions and public authorities. However, this will not be easy. Car manufactures and designers need years to incorporate, test and implement a technology achievement in their products. The paradox is that innovation and achievement in technology gets old within two years. In addition to this, the trends of achievements regarding the security in connected cars seem to be developed in different perspectives. This divergence of course is because of different types of technology used to provide these kinds of services, but even so, there should be a number of standardized requirements as a reference for every organization incorporated here. Requirements should be concluded after the identification of user and system risks, their types and severity; examine the varying levels of security options available to address the risks; examine the institutional issues associated with this approach and resulting impacts on safety, privacy, user acceptance, and cost. These standardized requirements should include policy, and institutional requirements for communication security based on industry and stakeholder’s needs. All this would result in industry’s best practices for preventing, detecting, and mitigating security risks in interconnected cars. 3
  • 4. 4 Conclusion Advantages and benefits of using technology will always overcome the fear of possible vulnerabilities that would bring harm, but because of the huge risk that can result on the malfunctioning of the cars, issues like this should be considered very important. Some pragmatic recommendations for future automotive security, as well as identify fundamental challenges should be given very soon and they have to be standardized to speak with same language for every included part of carmaker process. In addition to this proposed roles and responsibilities for organizational and operational management entities should be defined, they need to understand key requirements of security protection, therefore, certified personnel is more than needed. Professional Evaluation and Certification Board (PECB) is a certification body for persons on a wide range of professional standards. It offers ISO 27001, ISO 31000 and ISO 27005 training and certification services for professionals wanting to support organizations on the implementation of these management systems. ISO Standards and Professional Trainings offered by PECB: • Certified Lead Implementer (5 days) • Certified Lead Auditor (5 days) • Certified Foundation (2 days) • ISO Introduction (1 day) Lead Auditor, Lead Implementer and Master are certification schemes accredited by ANSI ISO/IEC 17024. Rreze Halili is the Technology, Security and Continuity (TSC) Product Manager at PECB. She is in charge of developing and maintaining training courses related to TSC. If you have any questions, please do not hesitate to contact: tsc@pecb.org. For further information, please visit www.pecb.org/en/training