Cover Image
市場調查報告書

汽車的網路安全

Automotive Cybersecurity

出版商 ABI Research 商品編碼 346133
出版日期 內容資訊 英文 30 Pages
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
Back to Top
汽車的網路安全 Automotive Cybersecurity
出版日期: 2015年12月03日 內容資訊: 英文 30 Pages
簡介

汽車產業上網路安全,在保護車輛零件,不受不正當存取、攔截、干擾、變更危害輛相關的資料上是必要的。

本報告提供汽車功能 (節點、感測器、ECU) 用安全解決方案、軟體 (韌體、RTOS、應用保護) 、安全的網路連接性 (CAN巴士、V2X) 相關驗證之系統性資訊。

第1章 聯網汽車和基礎設施的威脅

  • 漏洞和威脅
  • 不安全的架構
  • 攻擊的動機
  • 隱私和安全性解決方案
  • HSM規格
  • 可靠的平台模組
  • 安全的硬體設備的商業實行
  • ROTS、虛擬化、超管理器
  • 可靠的實行環境
  • 車輛通訊的規格和研究計劃
  • CAN巴士的安全問題
  • 安全的OTA、密鑰管理、加密
  • 安全監視
  • 連網型安全服務
  • 資料保護和隱私
  • 生命週期:設計和管理

第2章 安全供應鏈的擴大

  • Arilou
  • Argus Cyber Security
  • BlackBerry
  • Cisco
  • Cog Systems
  • Commsignia
  • Covisint
  • Ericsson
  • Harman
  • Link Motion
  • Mentor Graphics
  • Security Innovation
  • SYSGO
  • TowerSec
  • Wind River

圖表

目錄
Product Code: AN-2218

Automotive cybersecurity is an emerging discipline resulting from the evolution of cyber physical systems and connectivity in modern vehicles. Digital modernization in connected cars is opening up new threat vectors that are capable of critically affecting the functional safety of vehicles.

Cybersecurity in this industry needs to protect vehicle components and vehicle-related data from illegal access, interception, interference and modification. The report analyzes security solutions for automotive embedded capabilities (nodes, sensors, ECUs), software (firmware, RTOS and application protection), and secure network connectivity (CAN bus and V2X).

Table of Contents

1. THREATS TO CONNECTED CARS AND INFRASTRUCTURE

  • 1.1. Vulnerabilities and Threats
  • 1.2. Insecure Architecture
  • 1.3. Attack Motivations
  • 1.4. Privacy and Security Solutions
  • 1.5. HSM Standards
  • 1.6. Trusted Platform Module
  • 1.7. Commercial Implementations of Secure Hardware
  • 1.8. ROTS, Virtualization, and Hypervisors
  • 1.9. Trusted Execution Environment
  • 1.10. Vehicle Communications Standards and Research Projects
  • 1.11. CAN Bus Security Issues
  • 1.12. Secure OTA, Key Management, and Encryption
  • 1.13. Security Monitoring
  • 1.14. Connected Security Services
  • 1.15. Data Protection and Privacy
  • 1.16. Life Cycle: Design and Management

2. A BROADENING SECURITY SUPPLY CHAIN

  • 2.1. Arilou
  • 2.2. Argus Cyber Security
  • 2.3. BlackBerry
  • 2.4. Cisco
  • 2.5. Cog Systems
  • 2.6. Commsignia
  • 2.7. Covisint
  • 2.8. Ericsson
  • 2.9. Harman
  • 2.10. Link Motion
  • 2.11. Mentor Graphics
  • 2.12. Security Innovation
  • 2.13. SYSGO
  • 2.14. TowerSec
  • 2.15. Wind River

Tables

  • 1.Cyberattacks Against Connected Vehicles: 2010 to 2015
  • 2.Global HSM Sales Volume for Vehicles Market Forecast: 2015 to 2020
  • 3.HSM Sales Volume for Consumer Vehicles by Region Market Forecast: 2015 tov 2020
  • 4.HSM Sales Volume for Commercial Vehicles by Region Market Forecast: 2015 to 2020
  • 5.Global Security Services Revenues for Automotive M2M Connections Market Forecast: 2015 to 2020

Charts

  • 1.Global HSM Sales Volume for Vehicles Market Forecast: 2015 to 2020
  • 2.HSM Sales Volume for Consumer Vehicles by Region Market Forecast: 2015 to 2020
  • 3.HSM Sales Volume for Commercial Vehicles by Region Market Forecast: 2015 to 2020
  • 4.Connected Security Services Revenues for Automotive M2M Connections Market Forecast: 2015 to 2020
Back to Top