Cybersecurity Challenges and Risks in Connected Car Technology Report

Verified

Added on  2022/08/12

|4
|641
|22
Report
AI Summary
This report delves into the critical cybersecurity concerns surrounding connected and autonomous vehicles (CAVs). It highlights the increasing vulnerability of these systems to cyberattacks, referencing real-world incidents such as the 2015 Jeep Cherokee hack. The report emphasizes the reliance of CAVs on interconnected IoT devices and the challenges in securing diverse service providers within the ecosystem. The report draws on data from the 2019 Global Automotive Customer survey by Deloitte, indicating consumer trust issues and the need for enhanced security measures. It underscores the importance of collaborative efforts among stakeholders, including governmental bodies like the Ontario government's AVIN program, to strengthen the cybersecurity framework. The report concludes by stressing the need for proactive measures to mitigate evolving cyber threats and ensure the safety and effectiveness of CAV technology.
Document Page
Running Head: IT 0
Connected cars and semi autonomous vehicles
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT 1
Cyber security issues
Cyber security is a top concern for today’s technology executives, business owners,
organisation users and various other stakeholders. In association with this, the past time has
brought numerous incidents and concerns and it is projected that things will be becoming
more worse in 2020 with an expected increase in cyber security insurance spending to $14
billion in US dollars by 2022 (Bocetta). From businesses and individual life, the cyberwars
have reached the streets allowing hackers to set their sights to connected cars and
autonomous vehicles (CAV). According to Rathee et al. 3165, the autonomous and connected
vehicle can be stated as a combination of numerous IoT devices with the technical skills to
interact with its nearby digital and physical environment.
It is evident that IT systems in the connected cars required to be monitored
consistently – at all times and all over the cars service lifetimes. Taking out one major
incident as an example, a major malicious cyberattack happens in 2015 when two white-hat
hackers took control over a Jeep Cherokee via remote and cut its transmission on the highway
as a mark of a research initiative. This actions of hackers lead Chrysler to recall 1.4 million
vehicles back to their warehouses (Toews). Vulnerabilities in the channels of communication
also resulting in threat actor bargaining the security and safety of the vehicles.
With an increase in technological revolution, the ecosystem in connected and semi-
autonomous vehicles relies upon diverse services and solution providers and controlling third
party risks across the value chain has been difficult for businesses considering different
maturity levels of the service providers, data control, absence of visibility and challenges
imposing a usual standard of security control requirements. In 2019 Global Automotive
Customer survey managed by Deloitte – it includes research based on 25,000 consumers in
20 different nations yearly to explore trends in the automotive sector. As per the result – 27
per cent of consumers in Canada trusts OEMs in managing the information that is formed in a
connected vehicle, however, more than 2/3rd of consumers are interested in benefits of
connected and autonomous vehicles. From future perspectives, this data will re-enforce CAV
service providers to exchange a more volume of data and emphasis on further security areas
to draw the attention of more number of customers.
Ultimately, connected and semi-autonomous vehicle technology has the ability to
improve the safety and effectiveness of mobility, yet it is facing challenges with evolving
Document Page
IT 2
threats in cyber security touching both physical and digital areas. To strengthen the cyber
security ecosystem, different stakeholders required to work collaboratively in relation with
complex, organisational and regulatory considerations while evolving in silos. Taking an
example, the Ontario government has been practising various major steps towards cyber
security through AVIN (The Autonomous Vehicle Innovation Network) program in
infrastructure system and transportation technology.
Document Page
IT 3
References
2019 Global Automotive Consumer Study. Deloitte. Web 14th February 2020. 2019. <
https://www2.deloitte.com/global/en/pages/consumer-business/articles/global-
automotive-trends-millennials-consumer-study.html.>.
Bocetta, Sam. “10 Most Urgent Cybersecurity Issues in 2019.” Technology Industry. Web
14th February 2020. 2019. < https://www.csoonline.com/article/3501897/10-most-
urgent-cybersecurity-issues-in-2019.html.>.
Rathee, Geetanjali, et al. "A blockchain framework for securing connected and autonomous
vehicles." Sensors 19.14 (2019): 3165.
Toews, Rob. “The biggest threat facing connected autonomous vehicles is cybersecurity.”
Techcrunch. Web 14th February 2020. 2016. <
https://techcrunch.com/2016/08/25/the-biggest-threat-facing-connected-autonomous-
vehicles-is-cybersecurity/.>.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]