The modern connected car with varied communication interfaces both internal and external, 150 ECU’s and 100 MSLOC is an example of cyber physical system rather than a mechanical system. The negative side of the seamless connectivity to the internet is the full exposure to the malicious vulnerabilities such as buffer overflow exploits, Malware, Trojans etc. to vehicles. This presentation will go through the associated cyber-risks and will address possible way forward for ensuring the security of the car in the connected world.
Internet of Things initiatives demand targeted strategies to combat the influx of new cyber risks that will invariably accompany them. Companies across all industries can learn from some of the lessons already learned by technology, media, and telecom companies. Continue reading “IoT Needs Targeted Strategies to Combat Influx of New Cyber Risks”