版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
Mckunsey
&company
Cybersecurity
inautomotive
Masteringthechallenge
March2020
Cybersecurityinautomotive
Masteringthechallenge
Authors
OndrejBurkacky
JohannesDeichmannBenjaminKlein
KlausPototzkyGundbertScherf
Acknowledgements
ThisstudywasconductedbyMcKinsey&Company,Inc.WewishtoexpressourappreciationandgratitudetoGSAanditsmembersfortheircontinuedsupportandvaluablecontributions.
Cybersecurityinautomotive2
Contents
Introductionandkeyinsights 4
1.Cybersecurityisbecominganewdimensionofqualityforautomobiles 5
2.Automotiveindustryisrethinkingcybersecurityalongtheentirevaluechain 9
3.Managingcyberriskthroughoutthevehiclelifecyclewillrequirenewworkingpractices 17
4.Automotiveexecutivesshouldpreparetheircybersecuritystrategy 21
Outlook 28
Appendix 29
Keyaspectsofthemarketmodel 30
Listofabbreviations 31
Contactsandauthors 32
Importantnotice 33
Cybersecurityinautomotive3
Introduction
andkeyinsights
ThefourACESdisruptions–autonomousdriving,connectedcars,electricvehicles,andsharedmobil-ity–havedominatedtheagendaofautomotiveindus-tryleadersinrecentyears.Theseinnovations,builtonthedigitizationofin-carsystems,theextensionofcarITsystemsintothebackend,andthepropagationofsoftware,turnmoderncarsintoinformationclear-inghouses.Hackingofconnectedcarsbysecurityresearchershasmadeheadlinesoverthepastfew
years,andconcernsaboutthecybersecurityofmodernvehicleshavebecomereal.Lately,regu-latorshavealsostartedworkingondefiningtheminimumcybersecurityrequirementsfornewcars.TheUNECEWP.291regulationoncybersecurityandsoftwareupdatesisonthehorizonandwill
triggeraparadigmshiftintheautomotiveindustryintheUNECEmembercountries.OthercountriesliketheUSandChinahaveissuedbestpracticesandframeworksbutnoregulationsyet.GiventheinfluenceofUNECE,however,abroadadoptionofitsregulationacrosstheworldisexpected.
Withthesefirstregulatoryprogramsforcyber-securityandsoftwareupdatesintheautomotivesector,theregulatorwillrequireautomotive
OEMs–theresponsiblepartiesforvehiclehomo-logation–todemonstrateadequatecyber-riskmanagementpracticesthroughoutdevelopment,production,andpostproductionoftheirvehicles,includingtheabilitytofixsoftwaresecurityissuesafterthesaleofvehiclesandovertheair.
Inthiscontextandbasedonourextensiveresearchandanalyses,weofferaperspectiveonthreekeyquestionsfortheautomotiveindustry:
—Whatarethespecifictrendsanddriversofcyber-securityintheautomotiveindustryandwhyisthisaparadigmshiftfortheindustry?
—Howarethesedriversgoingtoaffecttheauto-motiveindustry’slong-establishedvaluechains?
—Howcanplayersinsideandoutsidetheindustry
prepareandpositionthemselvesfortheupcom-ingmarketdevelopmentsandanticipatedseg-mentgrowth?
Whilethefollowingparagraphsprovideasummaryofourresearch,theremainderofthereportwilladdressthesequestionsindetail.
Enginepower,fuelconsumption,drivingcomfort,andtheprecisionofacar’schassisandbodyarejustafewdimensionsthatdefinethequalityofacar.Withmoreandmorecorevehiclefunctionsenabledbysoftwarerunningonspecializedhardwarechips,thesecurityofthosecomponents–cybersecurity–willbecomeyetanotherdimensionofqualityintheautomotiveindustry,inmuchthesamewaythatphysicalsafetyisamajorconcernandqualityparametertoday.
Thismeasureofqualityisunderpinnedbyregulatoryactivitiesthatimposeminimumstandardsforman-agingcybersecurityrisksandrequireOEMstohavetheabilitytofixsecurityissuesviasoftwareupdates.Cybersecuritywillbecomenonnegotiablefortheindustry.
Inordertoexcelatcybersecurity,newprocesses,skills,andworkingpracticesalongtheautomotivevaluechainwillberequired.Thisincludesidentifyingcyberrisks,designingsecuresoftwareandhardwarearchitectures,anddevelopingandtestingsecurecodeandchips,ensuringthatissuescanbefixed–evenyearslater–viasoftwareupdates.
Therisingneedforcybersecuritywilltriggerinvest-mentsoverthenextfewyears.WeexpecttoseethemarketgrowfromUSD4.9billionin2020toUSD9.7billionin2030,withsoftwarebusinessrepresentinghalfofthemarketby2030.Thestronggrowthofthemarketwillcreatemanynewbusinessopportunitiesforsuppliers,establishedITfirms,specialistnichefirms,start-ups,andmanyothers,especiallyinthesoftwaredevelopmentandservicesmarket.Atthesametime,thedynamicsofthegrowingmarketwillalsochallengetoday’sleadersinthemarket.
1UNECE,ProposalforanewUNRegulationonuniformprovisionsconcerningtheapprovalofvehicleswithregardtocybersecurityandoftheircybersecuritymanagementsystems;UNECE,ProposalforanewUNRegulationonuniformprovisionsconcerningtheapprovalofvehicleswithregardtosoftwareupdateprocessesandofsoftwareupdatemanagementsystems.
Cybersecurityinautomotive4
1.Cybersecurityis
becominganew
dimensionofqualityforautomobiles
Cybersecurityinautomotive5
Softwareisoneofthekeyinnovationsinmodernvehicles
Softwareandelectrical/electronic(E/E)compo-nentsareandwillcontinuetobeamongthekeyinnovationsinmodernvehicles.ThemarketisexpectedtogrowfromUSD238billionin2020toUSD469billionin2030,correspondingtoanannualgrowthofover7percentperyear.2
Thisgrowthisdriventoalargeextentbysoftware,whichisbecomingakeydifferentiator.SoftwareisdrivinginnovationinthefourACEScategories:
—Autonomous.Autonomouscars,whichhavebeenthesubjectoffantasyforalongtime,arebecomingreality.Leadingcompanieshavealreadydrivenmillionsofmilesonpublicroadswiththem,butsofaralwaysunderthewatchfuleyeofahumanbehindthesteeringwheel.Thedisengagementrateinfieldtests,i.e.,howoftenthehumandriverneedstotakeovercontrol,israpidlydeclining,puttingfullyautonomouscarsinreachwithinmereyears.Whilethe
autonomouscaroffersgreatadvantages,itcomeswiththeriskofhackersinterferingwithsteeringorbreaking.Suchincidentswouldfosterfearofautonomouscarsandputthewholetechnologyatrisk.
—Connected.Carsarebecomingmoreandmoreconnected.Theservicesenabledbyconnectivitytodayrangefromsendingdestinationaddress-estothevehicle,toreceivingreal-timetrafficinformation,toparkingthevehicleremotelyviaasmartphoneapp.However,theconnectivityofcarsisapotentialattackvectorforhackerstocompromiseafullfleetofcars,whichistheworstnightmareofeveryOEM.
—Electric.Theriseofelectriccarsstartedseveralyearsagoandtheyaregainingmoreandmoretractionastheirrangeincreasesandtheirpricedecreases.Challengedbymanystart-ups,
almostallincumbentOEMshaveembarkedonthejourneytoincludingelectriccarsintheirproductportfolios.Theelectriccarperseisnotmoresusceptibletosabotagethanacon-ventionalcar,butattacksoncharginginfra-structurecanhavesevereeffects,frompoweroutagestofires.
—Shared.Enabledbyconnectivity,newbusi-nessmodelsfortransportationhavebecomeviable,suchascarsharingandridehailing.Thetrendinmobilityismovingawayfromcarownershipandtowardsshared-carsolutions,
whichissignificantlyincreasingvehicleutilization.Thistrendrequiresfullprotectionofuserdata–abreachofsensitivedatacouldfostermassivedistrustofthebusinessmodel.
Adeeperlookintotheconnectedcarshowsthreetypesofsoftwarethatwilldriveinnovationin
thisarea:
—In-vehicleservices:Allsoftwarewithinthe
vehiclethatrunsonelectroniccontrolunits(ECUs)ordomaincontrolunits(DCUs)withinthecar
—OEMback-endservices:Cloudservicesforboththevehicleanduser
—Infrastructureandthird-partyservices:
Softwarelinksbetweenthevehicleandinfra-structure,e.g.,gas/charging,parking,insurance.
Whiletheindustryisinvestingininnovationsacrossthesetypesofsoftwaretoenhancethecustomerexperienceandincreasethevalueofmoderncars,manufacturersmustalsobuildincybersecurityfromthebeginningtoavoidcreatingcyberattack-pronedigitalplatformsandvehicles.
Witheverylineofcode,thecyberrisktomodernvehiclesincreases,andsecurityresearchershave
demonstrateditsimpactandcost
Overthelastseveralyears,moderncarshavebecomedatacentersonwheels.ComparingthelinesofcodeinmodernconnectedcarswithaircraftsandPCsprovidesaglimpseintothechallengesofsecuringthesevehicles.Today’scarshaveupto150ECUsandabout100millionlinesofcode;
by2030,manyobserversexpectthemtohave
roughly300millionlinesofsoftwarecode.Toputthisintoperspective,apassengeraircrafthasanestimated15millionlinesofcode,amodernfighterjetabout25million,andamass-marketPCoperatingsystemcloseto40million.3Thisabundanceofcomplexsoftwarecodeisaresultofboththelegacyofdesigningelectronicsystemsinspecificwaysforthepast35yearsandthegrowingrequirementsandincreasingcomplexityofsystemsinconnectedandautonomouscars.Thisamountofcodecreatesampleopportunityforcyberattacks–notonlyonthecaritselfbutalsoonallcomponentsofitseco-system(e.g.,backend,infrastructure).
Thecyberriskofconnectedcarshasbecomeclearoverthepastfewyears,assecurityresearchershaverevealedvarioustechnicalvulnerabilities.Inthesescenarios,the“attackers”werenotexploitingthevulnerabilitieswithbadintentionsbutrather
2Source:McKinsey,“Mappingtheautomotivesoftware-and-electronicslandscapethrough2030,”July2019.
3Source:McKinsey,“Theraceforcybersecurity:Protectingtheconnectedcarintheeraofnewregulation,”O(jiān)ctober2019.
Cybersecurityinautomotive6
disclosinginformationtoOEMstohelpthemfixthoseissuesbeforemaliciousattackerscausedactualharm.Someoftherecentlyreportedvulnera-bilitiesarelistedinExhibit1.
Afterbecomingawareofthevulnerabilities,OEMsfixedtheissuesandprovidedsoftwareupdates.But,dependingontheaffectedcarmodel,itsE/Earchitecture,andtheOEM’sabilitytoprovidesoft-wareupdatesovertheair,somesoftwareupdatesrequiredvisitstodealerships,resultinginmuchhighercostsforcarmakers.
Cybersecuritywillbenonnegotiableforsecuringmarketaccessandtypeapprovalinthefuture
Unlikeinotherindustries,suchasfinancialser-vices,energy,andtelecommunications,cyber-securityhassofarremainedunregulatedintheautomotivesector–butthisischangingnow
withtheupcomingUNECEWP.29regulationson
cybersecurityandsoftwareupdates.4Underthisframework,OEMsinUNECEmembercountries(seeExhibit2)willneedtoshowevidenceofsufficientcyber-riskmanagementpracticesendtoend,i.e.,fromvehicledevelopmentthroughproductionallthewaytopostproduction.Thisincludesthedemon-stratedabilitytodeployover-the-airsoftware-securityfixesevenafterthesaleofthevehicle.
OthercountrieslikeChinaandtheUShavesofarnotissuedsimilarregulations,onlyguidelinesandbestpractices.WeexpectthenewUNECEregulationtobecomeadefactostandardevenbeyondits
members.
Lookingattoday’spassengercarmarketvolumesinonlythetenlargestcountriesregulatedunderUNECEWP.29,thenewregulationswilllikelyaffectover20millionvehiclessoldworldwide.Thisdoesnotevenincludecommercialvehicles,oranyothertypeofmotorvehicleregulatedunderUNECEWP.29.
Exhibit1
Softwarevulnerabilitieshavebeenobservedacrosstheentiredigitalcarecosystem
In-vehicleservices
2018:Researchersdemonstrated>10vulnerabilitiesinvariouscarmodels,gaininglocalandremoteaccesstoinfotainment,telematics,andCANbuses
2018:Researchersexploitedvulnerabilitiesofsomeinfotainmentsystemsandgainedcontrolofmicrophones,speakers,andnavigationsystems
2015:ResearchersremotelysentcommandstotheCANbusofaspecificcarthathadanOBD2dongleinstalledtocontrolthecar’swindshieldwipersandbreaks
OEMback-endservices
2019:Malwareinfectedthebackend,makinglaptopsinstalledinpolicecarsunusable
2019:Vehicledataexposedduringregistrationallowedforremotedenial-of-serviceattacksoncars
2015:Researchersdemonstratedvulnerabilitieswithinthebackend,gainingaccesstodoorcontrol
Infrastructure/third-partyservices
2018:EVhomechargerscouldbecontrolledbyaccessingthehomeWi-Finetwork
2018:Securityissuesdiscoveredin13car-sharingapps
2017:Rentalcarcompaniesexposedpersonaldata
Enterprisetechnology
2019:Memoryvulnerabilityatacloudproviderexposeddataincl.passwords,APIkeys,andtokens
2019:HackofanOEM’sautomotivecloudviathird-partyservicesandtier-1suppliernetwork
2018:Cloudservershackedandusedforcryptomining
Productionandmaintenancesystems
2019:Amalwareinfectioncausedsignificantproductiondisruptionatacarpartsmanufacturer
2018:Anex-employeebreachedthecompanynetworkanddownloadedlargevolumesofpersonalinformation
2017:Ransomwarecausedthestopofproductionacrossseveralplants
Source:Presssearch
4UNECE,ProposalforanewUNRegulationonuniformprovisionsconcerningtheapprovalofvehicleswithregardtocybersecurityandoftheircybersecuritymanagementsystems;UNECE,ProposalforanewUNRegulationonuniformprovisionsconcerningtheapprovalofvehicleswithregardtosoftwareupdateprocessesandofsoftwareupdatemanagementsystems.
Cybersecurityinautomotive7
WhatisUNECE’sroleinregulatingautomotive
cybersecurity?
TheWorldForumforHarmonizationofVehicleRegulations(WP.29)isaworldwideregulatoryforumwithintheinstitutionalframeworkoftheUNEconomicCommissionforEurope(UNECE).Itestablishesregulatoryinstrumentsconcern-ingmotorvehiclesandmotorvehicleequip-mentinover60marketsglobally,basedon
threeUNagreementsadoptedin1958,1997,and1998.
Atthetimeofwritingthisreport,UNECEisdraftingaproposalfortwonewUNregulations.Thefirstregulationisonuniformprovisions
concerningtheapprovalofvehicleswithregardtocybersecurityandcybersecuritymanage-
mentsystems.Thesecondregulationisonvehiclesoftwareupdateprocessesandsoft-wareupdatemanagementsystems.Foreaseofreadability,we’llrefertobothregulationsastheUNECEWP.29regulationsoncybersecurityandsoftwareupdatesthroughoutthisreport.
OncethisproposalisacceptedbyUNECEandtheregulationsareadoptedbyitsmember
countries,OEMswillberequiredtoimplementspecificcybersecurityandsoftware-updatepracticesandcapabilitiesforvehicletypeapprov-als–effectivelyrenderingcybersecurityanonnegotiablecomponentoffuturevehicles.
Exhibit2
Carsinover60countrieswillbeaffectedunderthenewWorldForumforHarmonizationofVehicleRegulationsframeworkoncybersecurityandsoftwareupdates
WorldForumforHarmonizationofVehicleRegulations(WP.29)undertheUNEconomicCommissionforEurope(UNECE)
Countriespartytothe1958agreement1(asofDecember2018)
1“AgreementconcerningtheAdoptionofHarmonizedTechnicalUnitedNationsRegulationsforWheeledVehicles,EquipmentandPartswhichcanbeFittedand/orbeusedonWheeledVehiclesandtheConditionsforReciprocalRecognitionofApprovalsGrantedontheBasisoftheseUnitedNationsRegulations”(originalversionadoptedinGenevaonMarch20,1958)
Source:UNECEECE/TRANS/WP.29/343/Rev.27–StatusoftheAgreement,oftheannexedRegulationsandoftheamendmentsthereto–Revision27
Cybersecurityinautomotive8
2.Theautomotive
industryisrethinkingcybersecurity
alongtheentirevaluechain
Cybersecurityinautomotive9
Gettingcybersecurityrightrequireseffortsfrommultiplepartiesalongthevaluechain,fortheentiredigitallifecycleofmodernvehicles
Ultimately,OEMsareresponsibleforthehomo-logationoftheirvehiclesanddemonstratingtheiradherencetoregulationsandmandatorylegal
requirements.However,sinceOEMssourcea
largeshareoftheirvehiclecomponentsfrom
suppliersandsemiconductormanufacturers,
theirupstreamvaluechainpartnerswillalsobe
requiredtofollowandimplementstate-of-the-
artpracticestomitigatecybersecurityrisksand
producevehiclesthataresecurebydesign.Thesepartnersmustprovideevidenceofadheringtothe
regulationstosupportthetype-approvalprocess,whichistheresponsibilityoftheOEM.LookingatthecurrentdraftsoftheUNECEWP.29regu-lationsoncybersecurityandsoftwareupdates,itbecomesevidentthatthevaluechainisaffected
acrossfourareas(seeExhibit3):
—Cyber-riskmanagement.Automotiveplayersmustensureend-to-endcyber-riskmanage-mentandidentifyrelevantcyberrisksintheirvehicletypes(andinadjacentecosystem
componentsthatmightimpactvehiclesafetyorsecurity)andensurethattheyimplementmeasurestomitigatesuchrisks.Thisincludesreactingtoevolvingthreats.
—Securitybydesign.OEMsmustdevelopsecurevehiclesfromsteponebyadoptingstate-of-the-artpracticesinhardwareandsoftwareengineering,andensuringthatvehicletypes(andadjacentecosystemcomponentsthatmightimpactvehiclesafetyorsecurity)aredesigned,built,andtestedforsecurityissuesandanycyberrisksaremitigatedproperly.AlthoughOEMsareultimatelyresponsibleforcybersecurity,allparticipantsinthevaluechainneedtocontribute.
—Detectionandresponse.Vehiclemanufacturersmustbeabletodetecttechnicalvulnerabilitiesandsecurityissues(e.g.,cyberattacks)intheirvehiclesandadjacentecosystemcomponents(e.g.,thebackendorthird-partyservices)thatmightimpactvehiclesafetyorsecurity.
—Safeandsecureupdates.Automotiveplayersmustbeabletorespondtoanydetectedsecurityeventandprovidesoftwareupdatestofixsecu-rityissues.Todoso,theymustsystematicallyidentifytargetvehiclesforupdatesandensurethatsoftwareupdateswillnotharmcertifiedsafety-relevantsystemsandarecompatiblewiththevehicles’configuration.
Cybersecurityinautomotive10
Exhibit3
TheUNECEregulationisbrokendowninto4concreteareasof
cybersecurityandspansacrosstheentirevehiclelifecycleSIMPLIFIED
Connected-carlifecycle
DevelopmentProductionPost-production
Cyber-securitylifecycle
Manage
vehicle
cyberrisks
Identifyandmanagecyberriskstocertainvehicletypesacrossthesupplychain
Ensuretestingofsecurityofsystems
Reacttonewandevolvingcyberthreatsandvulnerabilities
Secure
vehicles
bydesign
Ensuresecurityinthedetaildesignphase,testinformation,andcollectevidenceacrossthefullsupplychain
Analyzecyberthreatsandcreatearisktreatmentplan
Buildsecurityintosystemdesignandcontainknownvulnerabilitiesin(re)usedHW/SW1components
TestthesecurityofHW/SW1
components(e.g.,withvulnerabilityscans,pentesting,codeanalysis)
ProtecttheintegrityofHW/SW1componentsfromsuppliers(e.g.,withcontractualclauses)
Protectaccesstotheproductionenvironment
(e.g.,softwareserversandtheflashingprocess)andunitsreceivedfromsuppliers
Detectandrespondtosecurity
incidents
Monitorandrespondtocyberattacksonvehiclesandtheirecosystem
Provide
safeandsecure
softwareupdates
Ensurefulltraceabilityofsoftwareversionsandvehicleconfigurationalongthevehiclelifecycle(initialandupdatedsoftware/configuration)
Identifytargetvehiclesforupdatesandassessimpacttocertifiedsystemsandcompatibilitywithvehicleconfiguration
Providesoftwareupdateswithout
impactingsafetyandsecurityimpact
1Hardware/software
Source:UNECEWP.29,“DraftRecommendationonSoftwareUpdatesoftheTaskForceonCybersecurityandOver-the-airissues,”ISO/SAE21434:2018committeedraft;McKinsey
Cybersecurityinautomotive11
Whilecertainpracticesarealreadyinplacetoday,theupcomingregulations,higherlevelsofenforce-ment,andpotentialliabilityimplicationswillrequireamuchmoreexplicitagreementbetweenpartiesalongtheautomotivevaluechainonwhatexact-lyisexpectedofeachother.Toadheretothis
higherlevelofrigor,weareexpectingautomotiveplayersto:
—Defineclearrolesandresponsibilitiesforvehiclecybersecurity(notjustenterprisecybersecurity)andestablishinterfacesandpointsofcontactforvehiclecybersecuritybetweenplayers
—Agreeonaminimumsetofcyber-riskmanage-mentandcybersecuritypracticesincon-tractualagreementsandderivemeasurableservicelevelssimilartowhathasbeengoodpracticeinotherdimensionsofvehiclequality(e.g.,safety)
—Clarifyorganizational,technical,andlegal
(e.g.,IP)prerequisitesthatallowsecuritytestingandattestationofvehiclesoftwaresecurityoftheentireE/EvehiclearchitectureordowntotheindividualECU.
However,securitydoesnotstopattheproductionofvehicles–itisimportantthroughouttheentirevehiclelifecycle,assecurityvulnerabilitiescanbediscoveredatanygiventime.ItwillrequireOEMsandsupplierstocontinuallydetectandreactto
securityissuesuntilvehicleshavereachedtheirendoflife,justasweexpectaircraftorengineman-ufacturerstocontinuouslymonitortheiraircraftsandenginestodetectandfixanyoperational,
safety,orsecurityissuesforaslongasthatequip-mentisinusebyanyowner.
Cybersecurityinautomotive12
Newstandardswillraisethebarforvehiclecybersecurityandallowforindependentattestationofanauto-motivecompany’ssecuritypractices
Currently,onlynarrowstandardsandguidelinesexistforspecifictechnicalproceduresforsecuringhardwareandsoftwareinvehicles,e.g.,standardsforhardwareencryptionorsecurecommunicationofECUs(seeExhibit4).WhiletheUNECEWP.29regulationsoncybersecurityandsoftwareupdates
setanorganizationalframeworkandminimumrequirementsthatimpactallautomotiveplayersalongthevaluechain,theydonotprovideanydetailedguidanceonoperationalpractices.
However,thenewISO/SAE21434standard,
“Roadvehicles–cybersecurityengineering,”(stillaworkingdraft)isseenbyindustryexpertsasthefirststandardthatlaysoutclearorganiza-tional,procedural,andtechnicalrequirementsthroughoutthevehiclelifecycle,fromdevelopmenttoproductiontoafter-sales.Inparallel,theISO/
Exhibit4(1/2)
Unlikeinotherindustries,cybersecurityhasremainedunregulatedintheautomotiveindustrybeyondgeneralITregulations
Regulation/law
Standard
Bestpractice/framework
Draft/notpublished
Ecosystemcomponent
OperatingtechnologyInformationtechnology
OrganizationConnectedcar
OEMproductionOT
Vehicleinfrastructure
OEMback-endservices
AutomotiveplayerenterpriseIT
AUTOMOTIVEENGINEERING
UNECE
WP.29regulationoncy
bersecurityandsoftware
updates
NHTSA
CybersecurityBestPract
icesforModernVehicles
AutomatedDrivingSystems2.0
VDA
InformationSecurityAssessment
IPA
ApproachesforVehicleInformationSecurity
MIIT
NationalGuidelinesfor
DevelopingtheStandar
dsSystemoftheTelema
ticsIndustry
AutoSAR
SecureOnboardCommunications
ISO
ISO26262
ISO/SAE21434
ISO/AWI24089
ISO/AWI24089
SAE
SAEJ3061
SAEJ3101
AUTOSIG
AutomotiveSPICE
AutoAlliance
ConsumerPrivacyProt
ectionPrinciples(CPPP)
forVehicleTechnologies
andServices
Cybersecurityinautomotive13
AWI24089standard,“Roadvehicles–softwareupdateengineering,”isalsocurrentlyunderdevel-opment.Althoughitisnotdedicatedtocyber-security,weexpectittocontaincybersecurity-relatedcontent.Afirstdraftisexpectedbymid-2020andsomemoretimewillbeneededtofinalizeit.
Thesestandardswillallowtheindustrytoimplementcommoncybersecuritypracticesspecifictovehicledevelopmentandmanufacturing.Theywillalsoallowanassessmentofadh
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年濟南護理職業(yè)學院單招職業(yè)適應(yīng)性測試題庫附答案解析
- 2025年山西職業(yè)技術(shù)學院單招職業(yè)適應(yīng)性考試題庫附答案解析
- 校園安全管理工作臺賬歸檔制度
- 拍賣行人員情緒疏導技巧提升
- 物質(zhì)消失現(xiàn)象課件
- 物流運輸市場課件
- 2026年黑龍江單招錯題集含答案職業(yè)技能高頻錯題解析
- 2026年海南單招動物醫(yī)學專業(yè)基礎(chǔ)題必刷含答案
- 2026年重慶單招城市軌道交通運營管理題庫含答案
- 2026年河北單招電子商務(wù)專業(yè)技能測試題庫含答案直播電商方向
- 機電設(shè)施設(shè)備安裝施工方案
- 【MOOC】健康傳播:基礎(chǔ)與應(yīng)用-暨南大學 中國大學慕課MOOC答案
- 至美無相-現(xiàn)代數(shù)學天文物理漫談智慧樹知到期末考試答案章節(jié)答案2024年中國海洋大學
- 《創(chuàng)傷失血性休克中國急診專家共識(2023)》解讀
- 王立銘進化論講義
- Hyperion預算管理信息系統(tǒng)介紹
- 2023版設(shè)備管理體系標準
- 第三、四單元綜合測試卷(含答案)-統(tǒng)編版語文高一下學期必修下冊
- 基本心理需要滿足量表BPNS
- 焊縫外觀檢驗規(guī)范(5817 VT)
- YY 1045.2-2010牙科手機第2部分:直手機和彎手機
評論
0/150
提交評論