YoVDO

Automotive Security - Trends, Problems, Solutions, and Future Work

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Automotive Security Courses Cybersecurity Courses Spoofing Courses Car Hacking Courses

Course Description

Overview

Explore the critical field of automotive security in this comprehensive 59-minute lecture by Gedare Bloom from the University of Colorado Colorado Springs. Delve into current trends, challenges, and potential solutions in vehicle cybersecurity. Examine high-profile car hacking incidents, such as the Jeep Cherokee hack, and analyze various attack surfaces including network connectivity, software complexity, and remote access. Understand the intricacies of automotive network architectures, including Controller Area Networks and point-to-point networking. Learn about common exploits like spoofing and discover effective countermeasures. Compare signature-based and anomaly-based approaches to threat detection, and explore real-time model classification techniques. Evaluate the effectiveness of different security strategies and gain insights into future developments in automotive cybersecurity.

Syllabus

Introduction
Car Hacking
Jeep Cherokee Hack
Attack Surfaces
Network Connectivity
Software Complexity
Remote Connectivity
PointtoPoint Networking
Controller Area Network
Network Architectures
Exploits
Spoofing
What can we do
Signature vs Anomaly
Based Approaches
RealTime Model
Classification Approach
Evaluation
Future Work


Taught by

CAE in Cybersecurity Community

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network