Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Automotive Cybersecurity Engineering Handbook
  • Table Of Contents Toc
Automotive Cybersecurity Engineering Handbook

Automotive Cybersecurity Engineering Handbook

By : Dr. Ahmad MK Nasser
4.9 (20)
close
close
Automotive Cybersecurity Engineering Handbook

Automotive Cybersecurity Engineering Handbook

4.9 (20)
By: Dr. Ahmad MK Nasser

Overview of this book

The Automotive Cybersecurity Engineering Handbook introduces the critical technology of securing automotive systems, with a focus on compliance with industry standards like ISO 21434 and UNECE REG 155-156. This book provides automotive engineers and security professionals with the practical knowledge needed to integrate cybersecurity into their development processes, ensuring vehicles remain resilient against cyber threats. Whether you're a functional safety engineer, a software developer, or a security expert transitioning to the automotive domain, this book serves as your roadmap to implementing effective cybersecurity practices within automotive systems. The purpose of this book is to demystify automotive cybersecurity and bridge the gap between safety-critical systems and cybersecurity requirements. It addresses the needs of professionals who are expected to make their systems secure without sacrificing time, quality, or safety. Unlike other resources, this book offers a practical, real-world approach, focusing on the integration of security into the engineering process, using existing frameworks and tools. By the end of this book, readers will understand the importance of automotive cybersecurity, how to perform threat modeling, and how to deploy robust security controls at various layers of a vehicle's architecture.
Table of Contents (15 chapters)
close
close
1
Part 1:Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture
5
Part 2: Understanding the Secure Engineering Development Process
9
Part 3: Executing the Process to Engineer a Secure Automotive Product

Threat Landscape against Vehicle Components

The more connected features that modern vehicles offer, the richer the attack surface gets, and the more diverse the threat space becomes. Examining the threat landscape is an essential step in understanding the cyber risks that modern vehicles are exposed to and the required cybersecurity controls to reduce or eliminate that risk. The intent of this chapter is not to serve as an exhaustive reference on all possible cybersecurity threats and attacks that impact a modern vehicle, but rather to serve as a representative catalog of threats to be considered by practitioners in the field. Whether you are a vehicle manufacturer, an electronic control unit (ECU) supplier, or a component supplier, you are encouraged to build upon the threats presented here to create a tailored threat catalog that fits your vehicle systems and update it frequently to aid engineers who are performing security analysis. A secondary goal of this chapter is to establish...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Automotive Cybersecurity Engineering Handbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon