for Vehicle Cyber Security
|
|
|
- Arnold Daniel
- 10 years ago
- Views:
Transcription
1 Guidelines for Vehicle Cyber Security Hiro Onishi Alpine Electronics Research of America, Inc. la.com 2013 Alpine Electronics, Inc. Not for commercial distribution. 1
2 INDEX 1. Cyber Physical System Risks 2. Vehicle Cyber Risks Vulnerabilities in maintaining vehicle cyber security 3. Vehicle Cyber Security Approaches Risk analysis Concept of system security 4. Vehicle Cyber Security Guidelines European project EVITA Japanese agency (IPA) sguide SAE committee s approach 5. Summary 2
3 1. Risks for Cyber Physical System Case 1 Davis Besse Nuclear Plant, Ohio (Jan. 25, 03) 16:00: Noticed network slow down 16:50: Safety Parameter Display System (SPDS) crashed 17:13: Plant process computer crashed (had analog backup) Reference: Edward Fok. (Dec. 7, 11) Introduction d i to Cyber Cb Security Issues for Transportation [Web seminar] 3
4 1. Risks for Cyber Physical System Case 2 Air plane manipulation (Apr. 13, US) + Security consultants pointed out: They were able to manipulate airplane s navigation system with android application *. + 4 days later, Dept. of Transportation denied the possibility **. Reference: *: ~ WIRED 04/11/android plane hijack **: ~ Information Weekly security /faa dismisses android app airplane takeo/
5 1. Risks for Cyber Physical System Case 3 Lodz, Poland (Jan. 08) 4 light rail trams derailed, 12 people injured Tool used: Converted television IRremote Exploit: Locks, disabling track changes when vehicle presented were not installed Reference: Edward Fok. (Dec. 7, 11) Introduction to Cyber Security Issues for Transportation [Web seminar] Pictures: Courtesy of EUROPICS 5
6 1. Cyber Physical System Risks Currently, Cyber physical b h i lsystem risks ik can be a serious social concern, as it may impact the following: + (Nuclear / chemical) plants + Military facilities and weapons + Government facilities and systems + Transportation (Trains, Airplanes, Vehicles, Ships, etc) + Utilities i (Electric grid, id Water line, etc) + Finance (ATM, Ticket machines, etc) + Medical / Health related equipment and others 6
7 2. Vehicle Cyber Risks Vehicles can be targets of cyber attacks, because + Vehicles can be used to inflict serious bodily injury + Vehicles are high value items + Vehicles are frequently parked in un secured locations + Vehicle could be targeted for anti social activity (ex. terrorism) Stop/control massive number of vehicles Cause massive panic through false information References: ~ A. Weimerskirch, Do Vehicles Need Data Security? SAE World Congress, Detroit, MI, Apr. 11 ~ Information Technology Promotion Agency. (Apr. 11) Movements of Vehicle Cyber Security, (Japanese) 7
8 2. Vehicle Cyber Risks Cruise control ABS Car Telephone?? Air Bag Telematics V2I communication Navigation ACC V2V communication Emergency call LDW Autonomous driving electronics based Modern cars can come with up to 80 CPUs, 2 miles of cable, several hundred MB of software, and 5 in vehicle networks, Vehicle is NO longer just a Mechanical System Reference: A. Weimerskirch ESCRYPT, Security Considerations for Connected Vehicles, in SAE Government and Industry Meeting, Washington DC, Jan. 12 8
9 2. Vehicle Cyber Risks Internet Smart-phone Hacker Music-player Computer Virus or malware carried in smart phones or music players can easily invade automotive electronics 9
10 2. Vehicle Cyber Risks Special risks CASE 1 Communication for crash avoidance Limited time (100ms order) CASE 2 Vehicles are only able to communicate externally through mobile phones Base station Vehicle Vehicle A Mobile phone Vehicle ce B 10
11 2. Cyber Risks for Vehicle Additional vulnerabilities, compared to computer/internet t tsecurity. VULNERABILITY 1: Limited vehicle external connectivity Difficulty in updating security software Difficulty in monitoring automotive electronics status VULNERABILITY2: Limitedcomputational performance, Due to high endurance and long vehicle life cycle (10 years) Vulnerability to compete against hacker s PC VULNERABILITY 3: Real time operation OEM VULNERABILITY 4: Vehicle consists of various components/parts. Large g industry pyramid from suppliers to OEM VULNERABILITY 5: Unpredictable attack scenarios and threats VULNERABILITY 6: Hazard to drivers and passengers lives Tier 1 Tier 2 Parts suppliers Reference: ~ Information Technology Promotion Agency (of Japanese government). (Apr. 11) 10 report: Movements of Vehicle Cyber security, (Japanese) ~ A. Weimerskirch, Security Considerations for Connected Vehicles, in SAE Government and Industry Meeting, Washington DC, Jan. 12 ~ P. Kleberger, T. Olovsson and E. Jonsson, "Security aspects of the in vehicle network in the connected car, Intelligent Vehicles Symposium (IV), 11 IEEE, vol., no., pp , 5 9 Jun
12 3. Vehicle Cyber Security Approaches Additional complicated vulnerabilities, compared to computer/internet security Industry expects both proper guidelines & competitive approaches. To dfi define proper guidelines, well defined risk analysis is required. 12
13 3. Vehicle Cyber Security Approaches Proper security requires well defined riskanalysis. Vehicle cyber security is vulnerable, but Risk = Vulnerability Inputs: Risk=function(Vulnerability, Hackers motivation/skills, Hazard) Vulnerability: Vulnerability of system security Hackers motivation/skills: Adversary ROI Investment /risk /return Hazard: aad Magnitude of hazards, when security is compromised. Reference: ~ D. Etue (SafeNet), web seminar Cyber Security in Highly Innovative World, (Jul, 13) 13
14 3. Vehicle Cyber Security Approaches Risk analysis: Hackers motivations/skills New types Aims Hacker Type Target Approaches Type (potential) ) Skill Financial Financial, Harm to individual Harm to individual Damage to community Vehicle, Components/parts Driver, Driver s property Driver Community Classic: Steal vehicle, components or parts Acquire driving log or history and physically attack drivers or steal/damage drivers property Manipulate single or small number of vehicles to cause (severe) accidents Manipulate large number of (e.g. police) vehicles to cause (severe) accidents and damage to community Individual, Group Individual, Group Individual, Group Group, Organization (i.e. terrorism) Low, Medium Medium Medium, High High + In general, the person who invents a tool to break security possesses a much higher skills than the person who is only using the tool. e.g.: the case of immobilizer cutter + Inside hackers possess deeper knowledge about the security mechanism. References: ~ A. Weimerskirch, Do Vehicles Need Data Security? SAE World Congress, Detroit, MI, Apr. 11 ~ Information Technology Promotion Agency. (Apr. 11) Movements of Vehicle Cyber Security, (Japanese) ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 14 14
15 3. Vehicle Cyber Security Approaches * Risk analysis: Hazard assessment ISO 26262(Automotive Functional Safety) ) Functions CD/DVD control Sample of hazard assessment Vehicle center console Sample Malfunctions CD/DVD is not working Erroneous guidance, Navigation e.g. opposite direction on freeway Emergency call is not placed at accident Rearview camera When backing up, image of rear view (Monitoring) camera freezes (shows old image) Air conditioner Heater is not working during the winter in Canada Exposure Controllability Severity ASIL E3 C1 S1 QM E2 C2 S3 Emergency Call E1 C3 S3 A E3 C2 S2 A Control E3 C3 S3 Turn signal Shows signal activation in cluster, In cluster panel though actual signal is not working E1 C2 S3 ** Power window Unwanted window closing E2 C2 S3 A Air bag Fault activation during driving E4 C3 S3 A C QM D Reference: *: H. Onishi, Approach for Vehicle Cyber Security with Functional Safety Concept in SAE World Congress, Detroit, MI, Apr. 13 **: R. Hamann et al., ISO Release Just Ahead: Remaining Problems and Proposals for Solutions" in SAE World Congress, Detroit, MI, Apr
16 3. Vehicle Cyber Security Approaches Concepts of system security + 6 security phases should be covered by both process/management and technologies ~CIP(Critical Infrastructure Protection)byNERC(North American Electric Reliability Corporation) * 6 phases Analysis and Assessment Remediation Indications and Warnings Mitigation ii i Incident Response Reconstitution + New concept: Trustworthy (computing)design approaches ** Initialdesignsystem system in consideration of Security, Privacy, Reliability and Business Integrity. e.g. Brake should be reliable Rf References: *: **: Craig Mundie (Microsoft CTO and Senior VP), ( 02) 16
17 4. Vehicle Cyber Security Guidelines Guidelines samples for cyber physical systems Guideline Name Publisher IEC62443 (Industrial network & system security) Domain Industrial system Contents Process Technology Description Cover broader industrial systems NIST Guide to Industrial Control System security CIP (Critical Infrastructure Protection) NIST NERC PC/internet & Industrial system Industrial system PC/internet & Industrial system (mainly) (part of) Handle incidents (including attack analysis, recovery, etc) Cover broader industrial systems, from management & technical sides Cover broader critical infrastructures, Considering, 6 phases (e.g. mitigation, recovery) EVITA deliverables Vehicle information security guide EU agency IPA Vehicle Vehicle Outputs from research project J3061(Cyber security Guidebook for Cyber Physical Automotive Systems) ) ** Vehicle Under development References: *: **: 17
18 4. Vehicle Cyber Security Guidelines European project EVITA Created possible attack trees for selected use cases (18 use case for 6 groups). Attack goal Attack methods Sample of attacktree Compromise driver s privacy Reference: ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 18
19 4. Vehicle Cyber Security Guidelines European project EVITA Provide security requirements, based on the identified attack trees. Sample of security requirements Privacy/confidentiality Reference: ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 19
20 4. Vehicle Cyber Security Guidelines European project EVITA Provide reference architecture including HSW(Hardware( Security Module) ) + Development of Hardware Security Modules deployed with ECUs Key protection Trusted computing base Secured Storage Cost effective + In car cryptographic protocols to secure ECU ECU and sensor communication + Software framework integrating authentication, encryption & access control, etc Reference: ~ B. Weyl, et al., The EVITA Project: Securing the Networked Vehicle in escar (Dresden, Gemany 11) 20
21 4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide + Covers whole life cycle of vehicle ( Planning ~ Disposal ). + Covers all players related to vehicle life cycle. Information Technology Promotion Agency Reference: ~ 21
22 4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide Vehicle system model of IPA guideline Categorized functions in 3 groups Reference: ~ 22
23 4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide Threats and countermeasures (based on vehicle system model) : Direct threats thru physical I/O : Indirect threats thru vehicle bus :Potentialeffective countermeasures Reference: ~ 23
24 4. Vehicle Cyber Security Guidelines SAE Electrical system security committee s approach Automotive Security Guidelines & Risk Management Taskforce (under Vehicle Electrical System Security committee ) + Creates Cyber security Guidebook for Cyber Physical Automotive Systems Complies with Risk Methodology in ISO Functional Safety Standard Contains automotive cyber security framework and processes Evaluates Threat Analysis and Risk Assessment (TARA) methods Follows simple approach to allow effective implementation across the automotive industry Contains elements of existing industry security standards Provides definitions, Acronyms and sample templates + Expected to be completed by Mid 2014 Reference: ~L. Boran (SAE Committee Chair) Automotive Cyber Security, escar (Nov, 13, Frankfurt, Germany) 24
25 5. Summary Vulnerabilities in vehicle cyber security: Limited vehicle external connectivity Limited computational performance Real time operation Various components/parts from various suppliers Unpredictable attack scenario and threats Hazardto driversand passengers lives Proper security requires well defined riskanalysis Risk depends on hackers motivation/skills, magnitude of hazard and vulnerability of security. Many guidelines have been issued or are under development for the automotive industry. EVITA(E safety vehicle intrusion protected applications) guideline IPA(Information ( Promotion Agency) guideline SAE guideline under development 25
26 Thank you for your attention!! Hiro Onishi Alpine Electronics Research of America, Inc. la.com Tel: Slide design: Mari Hatazawa la.com l 26
Paradigm Change of Vehicle Cyber Security
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 NATO CCD COE Publications, Tallinn Permission to make digital or hard copies of this publication for
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
Cybersecurity And The Automotive Industry
Cybersecurity And The Automotive Industry Dr Andrew Brown, Jr PE, FESD, FSAE, NAE Vice President & Chief Technologist Delphi 2014 Global Symposium on Connected Vehicles & Infrastructure April 21-23, 2014
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
Automotive and Industrial Data Security
André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
- Toward Trustful IoT Life -
CCDS Introduction - Toward Trustful IoT Life - Connected Consumer Device Security Council (CCDS) Kosuke Ito, Secretary General Copyright 2015 Connected Consumer Device Security Council Proprietary 1 ISSUE:
Vehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software
133 Hitachi Review Vol. 63 (2014), No. 2 Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software Yoshinobu Fukano, Dr. Sci. Kosei Goto Masahiro Matsubara
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Challenges for the European Automotive Software Industry
Challenges for the European Automotive Software Industry Viewpoint of a safety supplier 28 th April 2010 Franck Lesbroussart What Trends do we see? Integration of functions Functionalities are expanding
Connected and Automated Vehicles and the Cybersecurity Threat
Connected and Automated Vehicles and the Cybersecurity Threat How the Industry is Responding Dr Andrew Brown, Jr, PE, FESD, FSAE, NAE Vice President & Chief Technologist CAR Breakfast Briefing Series February
PEDESTRIAN AND BICYCLE ACCIDENT DATA. Irene Isaksson-Hellman If Insurance Company P&C Ltd.
PEDESTRIAN AND BICYCLE ACCIDENT DATA Irene Isaksson-Hellman If Insurance Company P&C Ltd. Vulnerable road users 2 Number Number Official accident statistics 45 35 4 3 35 25 3 25 2 2 15 15 1 1 5 5 5 4 5
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Nuclear Security Requires Cyber Security
Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Car Connections. Johan Lukkien. System Architecture and Networking
Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
Thatcham Research The Insurers Automotive Research Centre
Thatcham Research The Insurers Automotive Research Centre 15 th October 2014 Mike Briggs- Vehicle Crime Research Manager Overview of Thatcham The Motor Insurance Research Centre Owned by the major UK Motor
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
www.siemens.com / gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities.
www.siemens.com / gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities. Cyber Security: Security from the very start More and more, we are networking
Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us
Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services
Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Safety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1
Claes Rytoft, ABB, 2009-10-27 Security in Power Systems October 29, 2009 Slide 1 A global leader in power and automation technologies Leading market positions in main businesses 120,000 employees in about
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Cyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM
ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM Domain I: Feasibility Study - identify, scope and justify the automation project Task 1: Define the preliminary scope through currently
References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract
An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Authors(s): Arthur Carter, David Freeman, and Cem Hatipoglu National Highway Traffic Safety Administration (NHTSA) Paper
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith [email protected] AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,
Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led
Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing
Crucial Role of ICT for the Reinvention of the Car
Joint EC / EPoSS / ERTRAC Expert Workshop 2011 Electric Vehicle System Integration and Architecture Crucial Role of ICT for the Reinvention of the Car Karl-Josef Kuhn Siemens Corporate Research and Technologies
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
GE Measurement & Control. Cyber Security for Industrial Controls
GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account
Effective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
How To Make A Car A Car Into A Car With A Car Stereo And A Car Monitor
Designing 1000BASE-T1 Into Automotive Architectures Alexander E Tan Ethernet PHY and Automotive PLM [email protected] Ethernet IP & Automotive Tech Day October 23 & 24th, 2014 Agenda What Does 1000BASE-T1
8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day
Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.
Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager
Breakthrough Cyber Security Strategies Introducing Honeywell Risk Manager About the Presenter Eric D. Knapp @ericdknapp Global Director of Cyber Security Solutions and Technology for Honeywell Process
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Smart Grid Security: A Look to the Future
Smart Grid Security: A Look to the Future SESSION ID: TECH-W03A Gib Sorebo Chief Cybersecurity Technologist Leidos @gibsorebo Overview Distributed Energy Plug-in Vehicles Evolving Threats: Market Manipulation,
Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
Testing the Internet of Things
Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
The Importance of Information Technology (IT) for Transportation Security
The Importance of Information Technology (IT) for Transportation Security John C. Falcocchio and Rae Zimmerman WISSP10, Abu Dhabi, October 4, 2010 This presentation is for use at WISSP10, and not for further
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
U.S. Department of Homeland Security s National Cybersecurity and Communications Integration Center
U.S. Department of s National Cybersecurity and Communications Integration Center Rick Lichtenfels Director, Assist and Assess Branch National Cybersecurity and Communications Integration Center (NCCIC)
