PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Send a file File manager PDF Toolbox Search Help Contact



ConnectedCars Printed 20160321 .pdf


Original filename: ConnectedCars_Printed_20160321.pdf
Title: Print

This PDF 1.5 document has been generated by Adobe Illustrator CC 2015 (Windows) / Adobe PDF library 10.01, and has been sent on pdf-archive.com on 22/03/2016 at 20:54, from IP address 66.216.x.x. The current document download page has been viewed 182 times.
File size: 927 KB (1 page).
Privacy: public file




Download original PDF file









Document preview


Understand the Attack Surface

ATTACKER

AFTERMARKET NETWORKS
The numerous applications hosted
in connected vehicles present
potential vulnerabilities for hackers
to exploit. Aftermarket devices,
applications and utilities expand
the attack surface through their
own Internet connectivity and
vulnerabilities. Add-ons present a
social engineering opportunity for
hackers, who could send drivers
purportedly-official, but in reality,
already-hacked add-ons for
insertion in cars.

-

+

CARS
Attackers will attempt to connect to the car through one of its many points of
connectivity and then pivot along its network to reach the components that
help them execute their plan, whether that be to control some aspect of the
car, corrupt or steal customer information, or find and publicize vulnerabilities.

CORPORATE NETWORKS

MANUFACTURING NETWORKS
Attackers might look to access
manufacturing systems by gaining a
beachhead on the corporate
network and then pivoting to the
manufacturing network. Once on
the manufacturing network, attackers could disrupt operations,
destroy equipment, or corrupt
software. Corrupted software could
introduce backdoors to remotely
control the cars.

With multiple public-facing components,
carmakers’ corporate networks represent
an easy way in for attackers. On these
networks are sensitive assets and systems
that attackers covet, and potentially
gateways to the manufacturing network.
Given that hackers have been known to
attack trusted third-party connections, the
attack surface extends to a car company’s
partners and vendors.


Document preview ConnectedCars_Printed_20160321.pdf - page 1/1

Related documents


PDF Document connectedcars printed 20160321
PDF Document block chain software 4
PDF Document help pc online suggestions about virus and destructive software attacks 2
PDF Document 54i14 ijaet0514374 v6 iss2 1032to1036
PDF Document wtp
PDF Document first step to learn hacking compiled by qamar abbas


Related keywords