Cover Image
市場調查報告書

汽車產業上的網路安全

Cybersecurity in the Automotive Industry

出版商 Frost & Sullivan 商品編碼 318239
出版日期 內容資訊 英文 76 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
汽車產業上的網路安全 Cybersecurity in the Automotive Industry
出版日期: 2014年10月30日 內容資訊: 英文 76 Pages
簡介

車內有50個以上脆弱的地方。因此安全有大幅度暴露於危險的可能性。

本報告提供汽車產業上網路安全調查分析、趨勢、配合措施、法規、案例研究等相關的系統性資訊。

本調查涵蓋內容

  • 網路安全趨勢與對汽車產業的影響為何?
  • 為了使汽車遠離電腦網路威脅OEM進行的措施為何?
  • 汽車以外的企業,為了確保汽車的安全進行的措施為何?同時其方法為何?
  • OEM產業的可能性為何?
  • 限制PII收集的法規為何?

第1章 摘要整理

第2章 調查範圍、目的、背景、手法

第3章 定義

第4章 脆弱的領域

  • 受到攻擊的脆弱領域
  • 連網汽車的網路安全解決方案的有效性
  • 汽車安全實驗

第5章 網路安全的生態系統

  • 網路安全的生態系統
  • 生態系統的調整
  • 車輛用網路安全的價值鏈整合
  • 案例研究:Harman

第6章 OEM的網路安全的關注

  • 航空產業的網路安全解決方案
  • OEM的疑慮
  • OEM的活動
  • OEM對網路安全的意願
  • 汽車安全
  • Volvo:CGI設想
  • Ford PII

第7章 案例研究

  • Tesla
  • 汽車ID的盜竊

第8章 解放出產業的可能性

  • 確保V2v(vehicle-to-vehicle)通訊
  • 在安全的網路經由解放出巨量資料的利益
  • 實現安全的OTA更新
  • 強化產業的可能性

第9章 法規

  • NHTSA的網路安全研究設想
  • 位置隱私保護法
  • PII
  • TomTom
  • Goldenshores Technologies:PII的案例研究

第10章 專業公司簡介

  • Arilou Technologies
  • Cisco AutoGuard
  • Security Innovation V2X Solutions
  • Intel Trustlets
  • Utimaco

第11章 結論

第12章 附錄

第13章 相關調查服務清單

目錄
Product Code: NE30-01-00-00-00

OEMs and Technology Vendors Focus on Safety and Privacy

More than 50 vulnerable points in a car could significantly risk its security. By 2020, Frost & Sullivan expects 85% of vehicles to be connected to the Internet. Cyber threats today are not significant, but they have a high potential to cause damage to brands and lives. The traditional automotive ecosystem was a closed environment; with the introduction of connectivity in vehicles, opportunities have opened for original equipment manufacturers (OEMs) to offer software products. This has gained significant interest from hackers. This study discusses how OEMs are addressing the cybersecurity issue.

Key Questions This Study Will Answer

  • What are the dynamics of cybersecurity and the effect on the automotive industry
  • What are OEMs working on to protect their vehicles from cyber threats
  • Which non-automotive companies are working to secure cars, and how are they doing it
  • How much business potential are OEMs unlocking because of secure infrastructure
  • What regulations restrict collection of PII

Table of Contents

1. EXECUTIVE SUMMARY

  • 1. Key Findings
  • 2. Information as a Key Enabler
  • 3. Security Threats
  • 4. Vulnerable Access Points
  • 5. Evolution of Electronics in Cars
  • 6. Vulnerability Analysis
  • 7. Cyber Threats in Fleets
  • 8. Vulnerable Cars
  • 9. Level of Involvement in the Ecosystem
  • 10. Cybersecurity Cost Split
  • 11. Secure Technology Layers that Address Safety
  • 12. Current and Future Outlook
  • 13. Current and Future Outlook (continued)

2. RESEARCH SCOPE, OBJECTIVES, BACKGROUND, AND METHODOLOGY

  • 1. Research Scope
  • 2. Research Aims and Objectives
  • 3. Key Questions This Study Will Answer
  • 4. Research Background
  • 5. Research Methodology
  • 6. Key Participants Discussed in This Study

3. DEFINITIONS

  • 1. Definitions

4. AREAS OF VULNERABILITY

  • 1. Vulnerable Areas Subjected to Attack
  • 2. Vulnerable Areas Subjected to Attack (continued)
  • 3. Relevance of Cybersecurity Solutions in Connected Vehicles
  • 4. Car Security Experiment

5. CYBERSECURITY ECOSYSTEM

  • 1. Cybersecurity Ecosystem
  • 2. Ecosystem Coordination
  • 3. Value Chain Integration of Cybersecurity in Vehicles
  • 4. Case Study-Harman

6. OEM INTEREST IN CYBERSECURITY

  • 1. Aviation Industry Cybersecurity Solutions
  • 2. OEM Concerns
  • 3. OEM Activities
  • 4. OEM Cybersecurity Intentions
  • 5. Car Security
  • 6. Volvo-CGI Initiative
  • 7. Ford PII

7. CASE STUDIES

  • 1. Tesla
  • 2. Car Identity Theft

8. UNLOCKING BUSINESS POTENTIAL

  • 1. Securing Vehicle-to-Vehicle Communication
  • 2. Unlocking Big Data Benefits through Secured Networks
  • 3. Enabling Secure OTA Updates
  • 4. Strengthening Potential Business

9. REGULATIONS

  • 1. NHTSA Cybersecurity Research Initiative
  • 2. Location Privacy Protection Act of 2014
  • 3. PII
  • 4. TomTom
  • 5. Goldenshores Technologies-PII Case Study

10. SPECIALIST COMPANY PROFILES

  • 1. Arilou Technologies
  • 2. Cisco AutoGuard
  • 3. Security Innovation V2X Solutions
  • 4. Intel Trustlets
  • 5. Utimaco

11. CONCLUSIONS

  • 1. The Last Word-3 Big Predictions
  • 2. Legal Disclaimer

12. APPENDIX

  • 1. Abbreviations and Acronyms Used
  • 2. Methodology

13. LIST OF RELATED RESEARCH SERVICES

  • 1. Passenger Vehicle Telematics
  • 2. Passenger Vehicle Telematics (continued)
  • 3. Telematics and Infotainment Research Program
  • 4. Commercial Vehicle Telematics Research Program
  • 5. Commercial Vehicle Telematics Research Program (continued)
Back to Top