Cyber security news for all

More

    Secure And Networked Automotive Future – CES 2020

    At the Consumer Electronics Show (CES) 2020 in Las Vegas, companies present their vision of a secure and networked automotive future. With the Secure Automotive Connectivity Platform, companies offer a fully integrated software framework secure administration and secure data exchange and thus the growing challenges of connected vehicles. The platform guarantees information security by protecting data transfer through strict encapsulation and separation of all communication channels. This partitioning is supplemented by a secure boot process, an integrated intrusion detection system and a firewall.

    CES 2020

    The Platform Uses The Hypervisor Technology Of The Real-Time Operating System

    This platform enables critical and non-critical infrastructures to be operated simultaneously with one system. By using the hypervisor functionality to execute applications in strictly separate partitions, security-critical applications in particular can be executed without interference in a given time frame. The platform is pre-certified according to the common criteria EAL3 + security standard for the automotive industry. This is advantageous because only a single hardware system is required when planning the software architecture, which reduces development and production costs and accelerates the market launch. The platform offers a flexible software framework that supports customers in designing their software architecture to secure communication and updates.

    Communication Through Proven Secure Boot Mechanism

    The demonstrator communicates with the outside world via a gateway that supports various protocols and enables a variety of applications, such as updates of applications without visiting an authorized workshop, connectivity to the cloud backend or uploading maintenance data. Internally, a WiFi hotspot set up for passengers is protected by the platform’s firewall. The vehicle’s internal network – is separated and can only be reached via secure and monitored channels. The platform uses the proven secure boot mechanism. Communication takes place using the Transport Layer Security encryption protocol. The data is encrypted and digitally signed, so that only the owner of the private key created for it can actually make changes. The Intrusion Detection System runs as a separate partition and monitors network traffic.

    Recent Articles

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Emotet to spread the malware behind email archives

    If you find an attached pack to an email these days, you should be particularly careful: the highly developed malware Emotet could be lurking...

    500,000 Activision accounts have been leaked

    Activision has taken a position on the alleged leak. According to the publisher, there has never been a data leak. In some cases it is...

    Judge issues injunction against WeChat

    The US government wanted to take action against the app WeChat. A judge stood sideways. The app should disappear from the platforms in the...

    Mail provider Tutanota becomes target of cyber attacks

    Over the weekend, ongoing DDoS attacks and an infrastructure problem resulted in downtime for hundreds of users. While some were able to mitigate most...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox