Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cybersecurity in cars: history of digitalization of cars, current status of the problem, sustainable development goals and standards

View through CrossRef
Problem. At present, information security issues are a priority. The need for specialists with appropriate qualifications is growing, and educational institutions face the task of training students who plan to specialize in cybersecurity technologies, including cybersecurity of road transport and continue to work in the transport industry. Goal. The purpose of this article is to consider the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry, which may be of interest to prospective students in choosing training to solve the problems of cybersecurity in road transport. Method. This paper examines the history, current state of the problem and possible developments that may be interesting to future students in choosing the direction of training to address cybersecurity in the automobile industry. Cybersecurity in automotive construction is much more complex than on smartphones and personal computers, for two main reasons: 1. dozens of EBCs in each vehicle, connected by a set of electronic bases and responsible for different functions and characteristics; 2. many potential access points, both located inside the car and remote, in particular, OBDII, USB and SD ports, without key access, Bluetooth and Wi-Fi, built-in modem, sensors, infotainment or smartphone application, and many connections using telemetry and other cloud systems that have access to car systems. The reason for optimism is that in the field of automotive cybersecurity, more and more is being done to equip the car with its own hardware and software, as well as to develop cloud platforms that provide cybersecurity. Several standards and regulations are being developed to regulate cybersecurity, which further facilitates the deployment of cyber security solutions in all connected vehicles. Results. As a result of the study, the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry were investigated and a set of methods and practices were developed to protect against attackers to ensure the smooth operation of computers, mobile devices, electronic systems, networks and data means and transport infrastructure. Practical significance. References are made to the main international documents that provide the safety of vehicles. The problems that should lead to the development of cybersecurity technologies in the future are pointed out. 
Title: Cybersecurity in cars: history of digitalization of cars, current status of the problem, sustainable development goals and standards
Description:
Problem.
At present, information security issues are a priority.
The need for specialists with appropriate qualifications is growing, and educational institutions face the task of training students who plan to specialize in cybersecurity technologies, including cybersecurity of road transport and continue to work in the transport industry.
Goal.
The purpose of this article is to consider the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry, which may be of interest to prospective students in choosing training to solve the problems of cybersecurity in road transport.
Method.
This paper examines the history, current state of the problem and possible developments that may be interesting to future students in choosing the direction of training to address cybersecurity in the automobile industry.
Cybersecurity in automotive construction is much more complex than on smartphones and personal computers, for two main reasons: 1.
dozens of EBCs in each vehicle, connected by a set of electronic bases and responsible for different functions and characteristics; 2.
many potential access points, both located inside the car and remote, in particular, OBDII, USB and SD ports, without key access, Bluetooth and Wi-Fi, built-in modem, sensors, infotainment or smartphone application, and many connections using telemetry and other cloud systems that have access to car systems.
The reason for optimism is that in the field of automotive cybersecurity, more and more is being done to equip the car with its own hardware and software, as well as to develop cloud platforms that provide cybersecurity.
Several standards and regulations are being developed to regulate cybersecurity, which further facilitates the deployment of cyber security solutions in all connected vehicles.
Results.
As a result of the study, the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry were investigated and a set of methods and practices were developed to protect against attackers to ensure the smooth operation of computers, mobile devices, electronic systems, networks and data means and transport infrastructure.
Practical significance.
References are made to the main international documents that provide the safety of vehicles.
The problems that should lead to the development of cybersecurity technologies in the future are pointed out.
 .

Related Results

Cybersecurity and Organisational Performance – the Interplay
Cybersecurity and Organisational Performance – the Interplay
The interplay between cybersecurity and organisational performance is multifaceted in nature, as it is related to how cybersecurity impacts and is impacted by various organisationa...
Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future
Aligning sustainable development goals with cybersecurity strategies: Ensuring a secure and sustainable future
This study explores the critical intersection between cybersecurity and sustainable development, aiming to understand how cybersecurity measures can support the achievement of the ...
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity
Purpose The accelerated digital transformation and the growing emphasis on privacy, safety and security present ongoing challenges for cybersecurity experts. Alongside these challe...
THE CYBERSECURITY BLUEPRINT FOR FINANCE
THE CYBERSECURITY BLUEPRINT FOR FINANCE
In today’s increasingly digitized world, financial institutions face an unprecedented level of cyber threats that can compromise critical infrastructure and disrupt the global econ...
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
Cybersecurity Guidebook for Cyber-Physical Vehicle Systems
<div class="section abstract"> <div class="htmlview paragraph">This recommended practice provides guidance on vehicle Cybersecurity and was created based off of, and ...
INTEGRATED DIGITALIZATION OF ENTERPRISES
INTEGRATED DIGITALIZATION OF ENTERPRISES
Integrated digitalization of enterprises, considering cybersecurity and environmental responsibility, aligns with global trends in sustainable development, technological progress, ...
CYBERSECURITY IN BANKING: A GLOBAL PERSPECTIVE WITH A FOCUS ON NIGERIAN PRACTICES
CYBERSECURITY IN BANKING: A GLOBAL PERSPECTIVE WITH A FOCUS ON NIGERIAN PRACTICES
The paper review cybersecurity practices in banking, with a specific focus on Nigerian banks. Cybersecurity has become a paramount concern in the banking industry worldwide, given ...

Back to Top