YoVDO

Automotive Security - Trends, Problems, Solutions, and Future Work

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Automotive Security Courses Cybersecurity Courses Spoofing Courses Car Hacking Courses

Course Description

Overview

Explore the critical field of automotive security in this comprehensive 59-minute lecture by Gedare Bloom from the University of Colorado Colorado Springs. Delve into current trends, challenges, and potential solutions in vehicle cybersecurity. Examine high-profile car hacking incidents, such as the Jeep Cherokee hack, and analyze various attack surfaces including network connectivity, software complexity, and remote access. Understand the intricacies of automotive network architectures, including Controller Area Networks and point-to-point networking. Learn about common exploits like spoofing and discover effective countermeasures. Compare signature-based and anomaly-based approaches to threat detection, and explore real-time model classification techniques. Evaluate the effectiveness of different security strategies and gain insights into future developments in automotive cybersecurity.

Syllabus

Introduction
Car Hacking
Jeep Cherokee Hack
Attack Surfaces
Network Connectivity
Software Complexity
Remote Connectivity
PointtoPoint Networking
Controller Area Network
Network Architectures
Exploits
Spoofing
What can we do
Signature vs Anomaly
Based Approaches
RealTime Model
Classification Approach
Evaluation
Future Work


Taught by

CAE in Cybersecurity Community

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera