Course Outline

Introduction

  • Ensuring automotive functionality, enhancing user experience, and maintaining safety standards are critical for government fleet operations.

Overview of Automotive Cybersecurity

  • This overview addresses system-level, process-level, and after-sales cybersecurity measures to protect vehicles used by government agencies.

An Automobile's Most Hackable Surfaces

Inspecting the Architecture

  • Identifying vulnerabilities in Original Equipment Manufacturer (OEM) and Tier supplier platforms is essential for securing government vehicles.

Software Loading

  • Validating software integrity through secure boot processes ensures that only authorized code runs on government vehicles.

Hardware Security

  • Verifying digital signatures and product keys is crucial for maintaining the hardware security of vehicles used by government entities.

Network Security

  • Authenticating communications between vehicle systems and external networks helps prevent unauthorized access in government fleets.

Cloud Security

  • Remote monitoring, software updates, and over-the-air (OTA) capabilities are essential for maintaining the security of government vehicles.

Hardening the Architecture

Penetration Testing

  • Utilizing automated tools to conduct penetration testing can identify vulnerabilities in government vehicle systems.

Reverse Engineering

  • Analyzing vehicle communication systems through reverse engineering helps uncover potential security weaknesses for government use.

Cryptography

  • Implementing On-Board Diagnostics (OBD) cryptography and exploring blockchain technology can enhance the cryptographic security of government vehicles.

Secure Code Development

  • Addressing the shortcomings of secure coding guidelines is necessary to improve the overall security of software used in government vehicles.

Device Testing

  • Ensuring interoperability, connectivity, and security through thorough device testing is critical for maintaining the reliability of government vehicle systems.

Best Practices

  • Implementing robust cybersecurity management, lifecycle planning, and risk management practices is essential for protecting government vehicles from cyber threats.

Summary and Next Steps

Requirements

  • Knowledge of general security principles
  • Experience in automotive design
  • Understanding of embedded systems

Audience for Government

  • Engineers
  • Architects
  • Engineering Managers
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories