Product Code: NE30-01-00-00-00
OEMs and Technology Vendors Focus on Safety and Privacy
More than 50 vulnerable points in a car could significantly risk its security. By 2020, Frost & Sullivan expects 85% of vehicles to be connected to the Internet. Cyber threats today are not significant, but they have a high potential to cause damage to brands and lives. The traditional automotive ecosystem was a closed environment; with the introduction of connectivity in vehicles, opportunities have opened for original equipment manufacturers (OEMs) to offer software products. This has gained significant interest from hackers. This study discusses how OEMs are addressing the cybersecurity issue.
Key Questions This Study Will Answer
- What are the dynamics of cybersecurity and the effect on the automotive industry
- What are OEMs working on to protect their vehicles from cyber threats
- Which non-automotive companies are working to secure cars, and how are they doing it
- How much business potential are OEMs unlocking because of secure infrastructure
- What regulations restrict collection of PII
Table of Contents
1. EXECUTIVE SUMMARY
- 1. Key Findings
- 2. Information as a Key Enabler
- 3. Security Threats
- 4. Vulnerable Access Points
- 5. Evolution of Electronics in Cars
- 6. Vulnerability Analysis
- 7. Cyber Threats in Fleets
- 8. Vulnerable Cars
- 9. Level of Involvement in the Ecosystem
- 10. Cybersecurity Cost Split
- 11. Secure Technology Layers that Address Safety
- 12. Current and Future Outlook
- 13. Current and Future Outlook (continued)
2. RESEARCH SCOPE, OBJECTIVES, BACKGROUND, AND METHODOLOGY
- 1. Research Scope
- 2. Research Aims and Objectives
- 3. Key Questions This Study Will Answer
- 4. Research Background
- 5. Research Methodology
- 6. Key Participants Discussed in This Study
3. DEFINITIONS
4. AREAS OF VULNERABILITY
- 1. Vulnerable Areas Subjected to Attack
- 2. Vulnerable Areas Subjected to Attack (continued)
- 3. Relevance of Cybersecurity Solutions in Connected Vehicles
- 4. Car Security Experiment
5. CYBERSECURITY ECOSYSTEM
- 1. Cybersecurity Ecosystem
- 2. Ecosystem Coordination
- 3. Value Chain Integration of Cybersecurity in Vehicles
- 4. Case Study-Harman
6. OEM INTEREST IN CYBERSECURITY
- 1. Aviation Industry Cybersecurity Solutions
- 2. OEM Concerns
- 3. OEM Activities
- 4. OEM Cybersecurity Intentions
- 5. Car Security
- 6. Volvo-CGI Initiative
- 7. Ford PII
7. CASE STUDIES
- 1. Tesla
- 2. Car Identity Theft
8. UNLOCKING BUSINESS POTENTIAL
- 1. Securing Vehicle-to-Vehicle Communication
- 2. Unlocking Big Data Benefits through Secured Networks
- 3. Enabling Secure OTA Updates
- 4. Strengthening Potential Business
9. REGULATIONS
- 1. NHTSA Cybersecurity Research Initiative
- 2. Location Privacy Protection Act of 2014
- 3. PII
- 4. TomTom
- 5. Goldenshores Technologies-PII Case Study
10. SPECIALIST COMPANY PROFILES
- 1. Arilou Technologies
- 2. Cisco AutoGuard
- 3. Security Innovation V2X Solutions
- 4. Intel Trustlets
- 5. Utimaco
11. CONCLUSIONS
- 1. The Last Word-3 Big Predictions
- 2. Legal Disclaimer
12. APPENDIX
- 1. Abbreviations and Acronyms Used
- 2. Methodology
13. LIST OF RELATED RESEARCH SERVICES
- 1. Passenger Vehicle Telematics
- 2. Passenger Vehicle Telematics (continued)
- 3. Telematics and Infotainment Research Program
- 4. Commercial Vehicle Telematics Research Program
- 5. Commercial Vehicle Telematics Research Program (continued)