Cyber-Security in the Connected Car Age
|
|
|
- Quentin Richard
- 10 years ago
- Views:
Transcription
1 IHS AUTOMOTIVE Presentation Cyber- in the Connected Car Age GENIVI Conference Seoul, October 21, 2015 ihs.com Egil Juliussen, Director Research & Principal Analyst ,
2 Cyber- in the Connected Car Age What is the problem? What are the risks & negative impact? What can be learned from other industries? What are the big-picture solutions? Are there automotive solutions? Summary & take-away Egil Juliussen, Ph.D. Director Research & Principal Analyst
3 Auto Problem Key Information Complacency Not needed previously It will not happen to us Too much effort vs. rewards No known actual breaches Connected Car Growth Knowledge Opens door to remote access Multiple connection points New skill set needed Rare skill in auto industry Examples Chrysler Jeep: July 2015* OnStar RemoteLink app: 7/15 Tesla (physical access): 8/15 BMW ConnectedDrive: 1/15 Many models are hackable Problem/Comments Hard to justify cost and effort Common view in all industries True, but is now changing Only R&D; proof of concept Connected cars on the road: M; M Not part of SW testing yet Shortage in most industries Open H-U port allowed access App spoofing via own device Fixed via remote SW update Fixed via remote SW update Based on hacking R&D * Resulted in Chrysler recall of 1.4M vehicles à Cost of $140M+ OnStar RemoteLink downloaded 3M+ times; BMW security flaw in 2.2M vehicles
4 What Makes Future Cars More Vulnerable to Threats? Connected Car Platform Design Attack Access Points Deployment Speed Key Information Cloud connected car content Connected ECU architecture Self-driving & driverless cars Hardware platforms Software platforms Application platforms OBDII OBDII w/wireless module Telematics modem link(s) Smartphone links Wi-Fi network link(s) Connected car growth Many current security holes is new skill set Built-in security needed Comments More wireless connections Remote software updates Always connected More standardization More system knowledge More program knowledge Need physical access Bluetooth, Wi-Fi, cellular 2.5G, 3G, 3.5G, 4G, 4.5G Bluetooth, USB & others Router & Direct Many access points Need to be found & updated Low auto security knowledge How quickly will this happen?
5 Auto System Access Points: 2015 Wi-Fi (SW loading) Embedded Modem V2X TPMS Embedded Modem Bluetooth Wi-Fi Digital Broadcast RFID Immobilizer Testing (Not removed) Wired Connection Embedded Modem Wireless Connections Core Auto ECU Networks Multiple CANs-bridges LIN & FlexRay Ethernet emerging Wired Connections OBDII Aftermarket Devices Wi-Fi Bluetooth CAN Wireless Connections Infotainment ECU Networks Infotainment CAN MOST (high-speed) Ethernet emerging Wired Connections Aux CD Media USB Slots Others? ipod-iphone SD Slot Hacking research has shown that nearly all access points can be compromised!
6 Cyber- in the Connected Car Age What is the problem? What are the risks & negative impact? What can be learned from other industries? What are the big-picture solutions? Are there automotive solutions? Summary & take-away Egil Juliussen, Ph.D. Director Research & Principal Analyst
7 Auto Threat Overview Property Theft Industrial Espionage Attack Goals Steal vehicle Steal valuable auto components Steal OEM s intellectual property Spy on OEM s expertise Deception Circumvent HW-SW functionality Manipulate auto equipment Manipulate contracts & agreements Privacy & Data Damage & Destruction Location tracking Event data recorders Credit card & financial information Harm driver and passengers Harm auto OEM s reputation Harm transportation system Comments Via unauthorized access Via unauthorized access Software & hardware Intellectual property value Speed, features, chip tuning Toll device, digital tachograph Lease, warranty Stalking, VIP tracking Accident investigations If stored in car electronics Accidentally or for-profit Accidentally or for-profit Cyber warfare
8 Auto Attacks: Financial Risks Key Information Legal Risks Cost of lawsuits Cost of negligence Business & Customer Loss Reputation Impact Summary Loss of customer contracts Software upgrade/recall cost Future business loss Most severe for auto OEMs Public likely to shun autos with cyber-security issues Successful software security attacks have the potential to be among the most costly auto recall & reputation events Comments In 10s of millions of dollars Possibly 100s of millions of dollars Possibly 100s of millions of dollars 10s to 100s of millions of dollars Until new product is re-established From $100M to $1B+ Whether real or not Even after fixes have been done Legal risk will be substantial Product update cost may be low to extreme high Reputation impact will be severe
9 Cyber- in the Connected Car Age What is the problem? What are the risks & negative impact? What can be learned from other industries? What are the big-picture solutions? Are there automotive solutions? Summary & take-away Egil Juliussen, Ph.D. Director Research & Principal Analyst
10 Lessons from Other Industries PC Industry: Early 1990s PC Industry: 2000s PC, Tablets & Smartphones 2010s Lessons Key Information Mostly standalone PC Little connectivity None or minimal security Mostly Internet connected PCs is a major problem Add-on security software Internet-connected devices Add-on security software is a major problem Smartphone/tablet: new target Infected websites: new problem has to be built-in Hardware security is lacking OS must use MPU HW security Comments LANs emerging emerging Internet was a niche market Broadband-era established Poor and add-on security Limited anti-virus software Internet drives PC/CE industries Service-based anti-virus Improved PC security, but. is lagging In addition to In hardware and software Need to be part of MPU Apps must use OS/HW security
11 Attack Sources: PC vs. Auto Hackers: White Hat Entrepreneurs Organized Crime Industrial Espionage Terrorism Motivation PC Industry Auto Industry Reputation Show vulnerable attack points Financial gains Mostly legal Financial gains Credit cards & bank accounts Valuable IP theft Co-sponsored Gov-sponsored Political goals Intention to harm Hacktivism Hacking used for political reasons Unauthorized data access Since beginning of PC Mostly positive goals, but unintended impact Mostly spam via unlimited broadband Mostly Botnet-based Phishing multiplier Moving to Smartphone Common, but little data available Competent hackers Productivity tool using standard PC apps Unauthorized access tool to databases Small group, very competent hackers First wave of hacking Have shown many auto security flaws Limited, no unlimited data plans in future Mostly via Smartphone Harm-for-hire likely Financial gains Long-term problem Likely severe problem Physical access likely* Future use, but rare Auto as lethal weapon Not likely or limited at least in auto ECUs Must know auto & very competent hackers
12 Attack Categories: PC vs. Auto Hacking Tools (Learn) Attack Tools PC Industry Purpose Auto Impact Vulnerability scanner Port scanner Password cracking Packet sniffer Spoofing, Phishing Backdoor Viruses Worms Trojans Root kits Key loggers Denial of service Find weaknesses Find open ports Recover password Find access data Illegitimate Website Bypass authentication Self-replicating, user file Self-replicating, by itself Looks benign, but is not Conceal security breach Record keystrokes Shut down a resource Yes, emerging Yes, done (Chrysler) Yes, done Yes, w/physical access Unlikely Yes, diagnostics port Via Smartphone Via Smartphone Yes done Probably, later Unlikely Works on ECUs UCSD & U of WA published 2 papers on the results of hacking MY 2009 car ECUs Methods marked in red used with physical access (able to compromise all ECUs) Methods marked in green used for remote access (able to compromise all ECUs)
13 Cyber- in the Connected Car Age What is the problem? What are the risks & negative impact? What can be learned from other industries? What are the big-picture solutions? Are there automotive solutions? Summary & take-away Egil Juliussen, Ph.D. Director Research & Principal Analyst
14 Cyber- Solution Overview Iterative Process Best Practice Assessment Phase Design Phase Implementation Phase Operational Phase Strategy Key Information Cyber-security is an iterative process over the life-time of the system, sub-system, device, software and hardware Cyber-security is a life-cycle process that includes assessment, design, implementation and operations It also includes an effective testing and certification program Establish security policy & System security evaluation Iterative risk assessment (most important element) System prioritization & architecture architecture implementation testing and evaluation Awareness and security training Intrusion detection and response (most important) Best defense is to make security attacks unprofitable Assume successful attacks and focus on detection & mitigation Build software security on top of hardware security modules Note: Most information from NHTSA Cyber-security Report
15 Connected Car Overview Wired Connections OBDII Auto Control ECUs Powertrain ECU Chassis ECUs Body ECUs Safety ECUs Wireless Connections OEM IT Center SW Updates-OTA Remote Diagnostics Gateway Wired Connections Infotainment ECUs Head-Unit ECU Telematics ECU RSE ECU Wired Wireless Wireless Connections Other Devices Cloud Content Internet radio Content Apps Smartphone
16 Big Picture Cyber- Solution Perimeter Wired Connections OBDII Auto Control ECUs Powertrain ECU Chassis ECUs Body ECUs Safety ECUs Gateway Wireless Connections Operational ECU OEM IT Center SW Updates-OTA Remote Diagnostics Perimeter & Operational Wired Connections Infotainment ECUs Head-Unit ECU Telematics ECU RSE ECU Wired Wireless Wireless Connections Other Devices Cloud Content Internet radio Content Apps Smartphone
17 Auto Cyber- Solution Perimeter Perimeter Components Operational OEM IT Center Key Information To detect and prevent unauthorized access Via wireless, wired and other access points (i.e. media) Built-in microcomputer hardware security functionality OS software security that leverage hardware security Middleware security that leverage HW & OS security Apps security that leverage HW & OS SW security Every ECU will need these layers of security to check that any in-coming content is free of malware Perimeter security will not be 100% successful Operational security is required to detect and prevent damage from malware that got through perimeter security Will need the best Perimeter & Operational security OEM IT Center has the most valuable information!
18 Cyber- in the Connected Car Age What is the problem? What are the risks & negative impact? What can be learned from other industries? What are the big-picture solutions? Are there automotive solutions? Summary & take-away Egil Juliussen, Ph.D. Director Research & Principal Analyst
19 Auto Products & Solutions Cyber- Services Hardware Hypervisor Software Over-the-air SW Update Apps Framework Function risk assessment Penetration testing Vulnerability assessment Cryptographic processing Secure microprocessor Protect at software boot-up OS & software isolation Remote software update with built-in security framework for connected car apps Company/Product Cisco OpSec IOActive Many others Freescale microcomputers TI and others OpenSynergy, Mentor Graphics Green Hills & others Arynga Redbend Secunet Application Control Unit Others expected
20 Auto Products & Solutions CAN Bus Firewall ECU Operation Analysis Tools Backend IT Function Integrated CAN bus firewall Add-on CAN bus firewall CAN bus bridge firewall ECU software monitoring Can be embedded in ECUs Deep Packet Inspection for ECU intrusion detection Framework for analysis and detection of CAN anomalies Life cycle protection of flash software (cryptography-based) Company/Product Arilou Technologies Visual Threat OBDShield Others likely in future TowerSec: ECUShield & TCUShield Others expected in future Argus Cyber IPS Other expected SWRI autotread software Reverse engineering: CAN signals Secunet Advanced Backend (ABSec)
21 Cyber- in the Connected Car Age What is the problem? What are the risks & negative impact? What can be learned from other industries? What are the big-picture solutions? Are there automotive solutions? Summary & take-away Egil Juliussen, Ph.D. Director Research & Principal Analyst
22 What Should Auto Industry Do? Check current systems Weakness Identification Incident Response Center Continued R&D on auto security Best Practice Guidelines Standards Testing & Certification Key Information Check current connected car systems for security flaws Offer rewards for finding auto security weaknesses Auto industry organization to share security incident info Continued NHTSA effort Continued SAE effort Develop security guidelines Deployment needed now Standards: NHTSA, SAE, etc. Rapid deployment needed Develop testing and certification standards Comments To find, correct and update any security issues Done by Google and other high-tech companies Share security incidents info and attack methods Leverage high-tech R&D Many security start-ups NHTSA October 2014* In progress from SAE Leverage existing standards from aerospace and others SAE and/or NHTSA Or others *DOT HS (Multiple industries)
23 Auto Requirements Requirements Hardware Integrity Software Integrity Data Integrity Communication Integrity Access Control Integrity Operational Key Information Hardware-based security is required Tamper-proof: Prevention and detection Unauthorized access must be detectable Unauthorized alteration must not be feasible Unauthorized access must be detectable Unauthorized alteration must not be feasible Unauthorized modification from outside vehicle must be detected by receiver Unauthorized in-vehicle communication must not be feasible and detectable Authorized access must be well defined Unauthorized access must be detectable Development diagnostic access must be removed Monitor ECU-to ECU messages for suspicious events Database of normal & hacked messages & events
24 Auto Cyber Evolution Operational Verify ECU-ECU Messages Hardware & Software Solution MCUs with Builtin HW IT Server & Layered Client HW-SW Emerging Software Solutions Auto Industry Research Research and Hacking Conference USCD & U-WA In-Car Access CAN Firewall & ECU SW Monitor Government: EVITA, NHTSA Consortium: ACES, others likely Other Hacking R&D USCD & U-WA Remote Access Backend & Layered Client SW Senator Markey Report & SPY Act Auto Incident Response Center Testing New SW & HW Products Defcon & Blackhat: Auto presentations-2010 Embedded in Cars: EU-2003; US-2013; AP
25 Auto Cyber- Takeaway Good News Successful auto hacking requires lots of time and expertise Business models for making money on car hacking is limited today Auto industry is investing in cybersecurity solutions Remote software update emerging for quicker fix of security flaws (OTA) Cyber-security big picture is simple: Perimeter & Operational security Bad News Good hacking tools & expertise expected in 3-5 years Better hacking business models are likely (financial, ransomeware) Deployment is lagging and may take a decade to catch up Cyber-security breaches could have many & high expenses Cyber-security implementation details are extremely difficult will require constant advances and is never done Cyber-security is a new skill set and is a limited resource
26 Questions? Egil Juliussen, Ph.D. Research Director, Principal Analyst, IHS Automotive Technology October 21, 2015
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Automotive and Industrial Data Security
André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication
Frost & Sullivan Cybersecurity Presentation
Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
Over-the-Air Software Updates: Deployment Strategies
Over-the-Air Software Updates: Deployment Strategies John Cain Head of Business Development Arynga, Inc. September, 2014 Topics Covered What is OTA/FOTA/SOTA? How does it work? How and who does it benefit?
How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER
WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and
Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions
September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
HACKING RELOADED. Hacken IS simple! Christian H. Gresser [email protected]
HACKING RELOADED Hacken IS simple! Christian H. Gresser [email protected] Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Automotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Understanding Cyber Defense A Systems Architecture Approach
NDIA 12th Annual Systems Engineering Conference, San Diego, CA, 26-29 Oct 2009 Understanding Cyber Defense A Systems Architecture Approach Tom McDermott Director of Research Georgia Tech Research Institute
FERPA: Data & Transport Security Best Practices
FERPA: Data & Transport Security Best Practices April 2013 Mike Tassey Privacy Technical Assistance Center FERPA and Data Security Unlike HIPAA and other similar federal regulations, FERPA does not require
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Vehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Cybersecurity And The Automotive Industry
Cybersecurity And The Automotive Industry Dr Andrew Brown, Jr PE, FESD, FSAE, NAE Vice President & Chief Technologist Delphi 2014 Global Symposium on Connected Vehicles & Infrastructure April 21-23, 2014
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Automotive Companies Save Costs, Gain Advantages with Red Bend s FOTA. Case Study
Automotive Companies Save Costs, Gain Advantages with Case Study Notices vlogix Mobile Notice Copyright 2002-2013, Red Bend Software. All Rights Reserved. Patented: www.redbend.com/red-bend-patents.pdf
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
What is Bitdefender BOX?
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks Alex Leemon, Sr. Manager 1 The New Cyber Battleground: Inside Your Network Over 90% of organizations have been breached
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Promoting Network Security (A Service Provider Perspective)
Promoting Network Security (A Service Provider Perspective) Prevention is the Foundation H S Gupta DGM (Technical) Data Networks, BSNL [email protected] DNW, BSNL 1 Agenda Importance of Network Security
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
Updating Car ECUs Over-The-Air (FOTA) White Paper
Updating Car ECUs Over-The-Air (FOTA) ABSTRACT As the amount of software in automobiles grows, so too does the need to effectively manage that software asset. The telecom industry has a proven solution
4/20/2015. Fraud Watch Campaign. AARP is Fighting for You. AARP is Fighting for You. Campaign Tactics. AARP can help you Spot & Report Fraud
AARP can help you Spot & Report Fraud Fraud Fighter Call Center: Talk to a volunteer trained in how to spot and report fraud. Call the Fraud Fighter Call Center at (877) 908-3360 Fraud Watch Campaign What
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Cyber Security Where Do I Begin?
ISPE Automation Forum Cyber Security Where Do I Begin? Don Dickinson Project Engineer Phoenix Contact ..50% more infected Web pages Click in the on one last and three you months won t of notice 2008 than
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Trusted Network Connect (TNC)
Trusted Network Connect (TNC) Open Standards for Integrity-based Network Access Control and Coordinated Network Security April 2011 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006 Tel
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community
Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
Information Technology in the Automotive Aftermarket
Information Technology in the Automotive Aftermarket March 2015 AASA Thought Leadership: The following white paper consists of key takeaways from three AASA surveys conducted in 2014, which focused on
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
What would you like to protect?
Network Security What would you like to protect? Your data The information stored in your computer Your resources The computers themselves Your reputation You risk to be blamed for intrusions or cyber
