DUBLIN—Research and Markets has announced the addition of the "Cybersecurity in the Connected Car: Technology, Industry, and Future" report to their offering.

Technology trends, solutions and standards and future in automotive cybersecurity, with expert interviews, exclusive case studies, and latest developments

Advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity, they become an attractive target for cyber-criminals.

Security demonstrations such as the famous Miller and Valasek Jeep Cherokee example have provided enough evidence that connected cars should be viewed as a potential attack target. But how does an industry built around making and selling cars pivot to delivering secure software and services?

Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected & autonomous vehicles.

It discusses the following elements of automotive cybersecurity:

- Attack surfaces in connected and autonomous vehicles

- Core vulnerabilities

- Regulations and policies (US, EU, China, Japan)

- Existing market solutions (OTA updates, IDPS, firewalls etc.)

- Emerging solutions (ECU Consolidation, app sandboxing, autonomous security)

- Security by design

Key questions addressed

- What does the automotive cybersecurity landscape look like today?

- What makes vehicles vulnerable?

- What's in it for the hackers?

- What are the worst-case scenarios?

- Where should automakers invest to cyber-proof connected vehicles?

- Can the CAN bus be secured?

- What is the relationship between security and privacy?

- Is legislation the answer to raise the bar of security standards in modern vehicles?

- What standards are being developed around vehicle cybersecurity?

- Can security by design ever be a commercial reality?

- What are the available market solutions and who are the key players?

Key Topics Covered:

Chapter 1: Introduction

Chapter 2: The problem

Chapter 3: Connected car technology and its vulnerability

Chapter 4: Industry responses

Chapter 5: Legislation and standards

Chapter 6: Future directions

Companies Mentioned

- Aerolink

- Apple

- Argus

- Arxan

- Bosch

- Harman

- KPMG

- Karamba

- Miller

- NCC-SBD Automotive

- NXP

- Nissan

- Rambus

- Samy Kamkar

- Symantec

- Trillium

- Uber

- Valasek

- Zubie

For more information about this report visit http://www.researchandmarkets.com/research/q433fr/cybersecurity_in

Contacts

Research and Markets
Laura Wood, Senior Manager
press@researchandmarkets.com
For E.S.T Office Hours Call 1-917-300-0470
For U.S./CAN Toll Free Call 1-800-526-8630
For GMT Office Hours Call +353-1-416-8900
U.S. Fax: 646-607-1907
Fax (outside U.S.): +353-1-481-1716
Related Topics: IT Security, Cars, Telematics and Vehicle Electronics, Internet of Things and M2M