Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Automotive Cybersecurity Engineering Handbook
  • Table Of Contents Toc
Automotive Cybersecurity Engineering Handbook

Automotive Cybersecurity Engineering Handbook

By : Dr. Ahmad MK Nasser
4.9 (20)
close
close
Automotive Cybersecurity Engineering Handbook

Automotive Cybersecurity Engineering Handbook

4.9 (20)
By: Dr. Ahmad MK Nasser

Overview of this book

The Automotive Cybersecurity Engineering Handbook introduces the critical technology of securing automotive systems, with a focus on compliance with industry standards like ISO 21434 and UNECE REG 155-156. This book provides automotive engineers and security professionals with the practical knowledge needed to integrate cybersecurity into their development processes, ensuring vehicles remain resilient against cyber threats. Whether you're a functional safety engineer, a software developer, or a security expert transitioning to the automotive domain, this book serves as your roadmap to implementing effective cybersecurity practices within automotive systems. The purpose of this book is to demystify automotive cybersecurity and bridge the gap between safety-critical systems and cybersecurity requirements. It addresses the needs of professionals who are expected to make their systems secure without sacrificing time, quality, or safety. Unlike other resources, this book offers a practical, real-world approach, focusing on the integration of security into the engineering process, using existing frameworks and tools. By the end of this book, readers will understand the importance of automotive cybersecurity, how to perform threat modeling, and how to deploy robust security controls at various layers of a vehicle's architecture.
Table of Contents (15 chapters)
close
close
1
Part 1:Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture
5
Part 2: Understanding the Secure Engineering Development Process
9
Part 3: Executing the Process to Engineer a Secure Automotive Product

Cybersecurity Basics for Automotive Use Cases

In Chapter 1, we peered into the vehicle E/E architecture layer by layer to understand its layout, interfaces, networks, and various electronic components. While doing so, we got a glimpse of the objects of value that needed protection and some of the adverse consequences of successful attacks. In this chapter, we will review some fundamental security concepts, methods, and principles that are especially applicable to automotive use cases. Building this foundation is a prerequisite for the later chapters, where we will explore vehicle threats, the methodology for treating them, and the technical cybersecurity controls to mitigate them.

If you are skilled in the art of general cybersecurity, this chapter will give you an automotive perspective on how to apply the security fundamentals to automotive use cases. If you’re not, this chapter should be treated as a crash course in cybersecurity to enable future learning. Rather than...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Automotive Cybersecurity Engineering Handbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon