Javascript must be enabled to continue!
Cybersecurity in cars: history of digitalization of cars, current status of the problem, sustainable development goals and standards
View through CrossRef
Problem. At present, information security issues are a priority. The need for specialists with appropriate qualifications is growing, and educational institutions face the task of training students who plan to specialize in cybersecurity technologies, including cybersecurity of road transport and continue to work in the transport industry. Goal. The purpose of this article is to consider the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry, which may be of interest to prospective students in choosing training to solve the problems of cybersecurity in road transport. Method. This paper examines the history, current state of the problem and possible developments that may be interesting to future students in choosing the direction of training to address cybersecurity in the automobile industry. Cybersecurity in automotive construction is much more complex than on smartphones and personal computers, for two main reasons: 1. dozens of EBCs in each vehicle, connected by a set of electronic bases and responsible for different functions and characteristics; 2. many potential access points, both located inside the car and remote, in particular, OBDII, USB and SD ports, without key access, Bluetooth and Wi-Fi, built-in modem, sensors, infotainment or smartphone application, and many connections using telemetry and other cloud systems that have access to car systems. The reason for optimism is that in the field of automotive cybersecurity, more and more is being done to equip the car with its own hardware and software, as well as to develop cloud platforms that provide cybersecurity. Several standards and regulations are being developed to regulate cybersecurity, which further facilitates the deployment of cyber security solutions in all connected vehicles. Results. As a result of the study, the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry were investigated and a set of methods and practices were developed to protect against attackers to ensure the smooth operation of computers, mobile devices, electronic systems, networks and data means and transport infrastructure. Practical significance. References are made to the main international documents that provide the safety of vehicles. The problems that should lead to the development of cybersecurity technologies in the future are pointed out.
Kharkiv National Automobile and Highway University
Title: Cybersecurity in cars: history of digitalization of cars, current status of the problem, sustainable development goals and standards
Description:
Problem.
At present, information security issues are a priority.
The need for specialists with appropriate qualifications is growing, and educational institutions face the task of training students who plan to specialize in cybersecurity technologies, including cybersecurity of road transport and continue to work in the transport industry.
Goal.
The purpose of this article is to consider the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry, which may be of interest to prospective students in choosing training to solve the problems of cybersecurity in road transport.
Method.
This paper examines the history, current state of the problem and possible developments that may be interesting to future students in choosing the direction of training to address cybersecurity in the automobile industry.
Cybersecurity in automotive construction is much more complex than on smartphones and personal computers, for two main reasons: 1.
dozens of EBCs in each vehicle, connected by a set of electronic bases and responsible for different functions and characteristics; 2.
many potential access points, both located inside the car and remote, in particular, OBDII, USB and SD ports, without key access, Bluetooth and Wi-Fi, built-in modem, sensors, infotainment or smartphone application, and many connections using telemetry and other cloud systems that have access to car systems.
The reason for optimism is that in the field of automotive cybersecurity, more and more is being done to equip the car with its own hardware and software, as well as to develop cloud platforms that provide cybersecurity.
Several standards and regulations are being developed to regulate cybersecurity, which further facilitates the deployment of cyber security solutions in all connected vehicles.
Results.
As a result of the study, the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry were investigated and a set of methods and practices were developed to protect against attackers to ensure the smooth operation of computers, mobile devices, electronic systems, networks and data means and transport infrastructure.
Practical significance.
References are made to the main international documents that provide the safety of vehicles.
The problems that should lead to the development of cybersecurity technologies in the future are pointed out.
.
Related Results
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose
The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract">
<div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract">
<div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
BACKGROUND
In an era of rapid digital transformation, the healthcare sector stands as a beacon of innovation, leveraging the latest technologies to improve ...
Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems
Digital access and inclusion for SMEs in the financial services industry through Cybersecurity GRC: A pathway to safer digital ecosystems
The integration of digital technologies into the financial services industry has revolutionized how small and medium-sized enterprises (SMEs) access and utilize financial services....
CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA
CYBERSECURITY IN THE FINANCIAL SECTOR: A COMPARATIVE ANALYSIS OF THE USA AND NIGERIA
This paper provides a comprehensive review and comparative analysis of cybersecurity challenges and strategies within the financial sectors of the United States of America (USA) an...
Enacting Expertise: Ritual and Risk in Cybersecurity
Enacting Expertise: Ritual and Risk in Cybersecurity
This article applies the concept of ritual to cybersecurity expertise, beginning with the cybersecurity “skills gap”: the perceived lack of suitably qualified professionals necessa...
Smart home cybersecurity awareness and behavioral incentives
Smart home cybersecurity awareness and behavioral incentives
Purpose
Smart-home security involves multilayered security challenges related to smart-home devices, networks, mobile applications, cloud servers and users. However, very few studi...

