Connected Car Security – Threat Analysis and Recommendations

Here we present a document which analyzes attack vectors and potential threats for connected car.

Here we present a document which analyzes attack vectors and potential threats for connected car.
For each attack vector (telematics connection, SMS API, mobile app, etc.), potential threat agents (attackers) are listed, possible attack scenarios are described and also some recommendations are provided.
Of course aim of this work is not to provide standard or best practices but rather to deliver educational material for architects, PMs and other project members to start thinking like attacker.

Get this material on your inbox

Get
Wojciech Dworakowski
Wojciech Dworakowski Managing Partner