Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Trend Micro Helps Connected Car Stakeholders Manage Cyber Risk

Research Details and Prioritizes Key Attack Vectors Including Future Scenarios

Trend Micro Incorporated , a global cybersecurity leader, is committed to managing cyber risk no matter where it occurs. new research report is designed to help manufacturers, suppliers, government bodies and service providers successfully manage cyber risk while implementing a key United Nations regulation on connected vehicle cybersecurity.

Recommended AI News: Achieve Partners Backs Cybersecurity Platform To Tackle Global Talent Shortage

“Cyber risk is everywhere – even in your car. Vehicles are gaining intelligence, computing power, and connectivity, creating new attack scenarios for cybercriminals,” said William Malik, vice president of infrastructure strategies for Trend Micro. “Understanding these cybersecurity recommendations and regulations will help manufacturers future-proof mobility. Our latest research report helps interpret and implement the WP.29 regulation by prioritizing the threats to the connected car industry.”

Related Posts
1 of 40,525

To help stakeholders prioritize all the threats and attack vectors outlined by WP.29, Trend Micro experts calculated the severity levels of these attack vectors using the industry standard DREAD threat model.

These attack vectors should be given the highest priority, according to the research:

  • Back-end servers used to attack a vehicle or extract data
  • Denial of service attacks via communication channels to disrupt vehicle functions
  • Hosted third-party software (e.g. entertainment apps) used to attack vehicle systems

Researchers also recalculated the DREAD threat model to show how threat severity will evolve over the next 5-10 years and highlighted new and emerging vectors not included in the WP.29 regulation.

The United Nations Economic Commission for Europe World Forum for Harmonization of Vehicle Regulations (WP.29) regulates vehicle safety around the world. The regulation contains seven high-level and 30 sub-level descriptions of vulnerabilities and threats, including 69 attack vectors. The regulations along with Trend Micro’s findings will support the connected car industry’s understanding of cyber risks to best prioritize their defense.

Recommended AI News: Riffyn Appoints Former Greenlots Executive, Vipul Doshi, as VP of Software Engineering

Comments are closed.