Cyber security news for all


    Secure And Networked Automotive Future – CES 2020

    At the Consumer Electronics Show (CES) 2020 in Las Vegas, companies present their vision of a secure and networked automotive future. With the Secure Automotive Connectivity Platform, companies offer a fully integrated software framework secure administration and secure data exchange and thus the growing challenges of connected vehicles. The platform guarantees information security by protecting data transfer through strict encapsulation and separation of all communication channels. This partitioning is supplemented by a secure boot process, an integrated intrusion detection system and a firewall.

    CES 2020

    The Platform Uses The Hypervisor Technology Of The Real-Time Operating System

    This platform enables critical and non-critical infrastructures to be operated simultaneously with one system. By using the hypervisor functionality to execute applications in strictly separate partitions, security-critical applications in particular can be executed without interference in a given time frame. The platform is pre-certified according to the common criteria EAL3 + security standard for the automotive industry. This is advantageous because only a single hardware system is required when planning the software architecture, which reduces development and production costs and accelerates the market launch. The platform offers a flexible software framework that supports customers in designing their software architecture to secure communication and updates.

    Communication Through Proven Secure Boot Mechanism

    The demonstrator communicates with the outside world via a gateway that supports various protocols and enables a variety of applications, such as updates of applications without visiting an authorized workshop, connectivity to the cloud backend or uploading maintenance data. Internally, a WiFi hotspot set up for passengers is protected by the platform’s firewall. The vehicle’s internal network – is separated and can only be reached via secure and monitored channels. The platform uses the proven secure boot mechanism. Communication takes place using the Transport Layer Security encryption protocol. The data is encrypted and digitally signed, so that only the owner of the private key created for it can actually make changes. The Intrusion Detection System┬áruns as a separate partition and monitors network traffic.

    Recent Articles

    Twitter confirmed to bring back account verification

    Twitter is bringing back verifications for the account verification in the beginning of 2021. Certain users will then be given a control mark again,...

    350,000 Spotify users were hacked

    At the beginning of July this year, security researchers discovered an unsecured database that contained access and other information from 350,000 Spotify users. Spotify...

    Europol sees artificial intelligence as a dangerous cyber threat

    Cyber criminals can use intelligence to carry out attacks more easily and thus cause more damage. Europol is warning of this in a joint...

    Telegram messenger a disaster in terms of privacy

    Telegram messenger is becoming more and more a secure chat with privacy in certain circles. But even very simple reports, which everyone can carry...

    Enisa reports weak IT security about the European railway sector

    With 470 billion passenger kilometers and many routes per year in Europe, the rail industry plays a large and rapidly growing role in transportation....

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox