Connected Car Security – Threat Analysis and Recommendations
Here we present a document which analyzes attack vectors and potential threats for connected car.
Here we present a document which analyzes attack vectors and potential threats for connected car.
For each attack vector (telematics connection, SMS API, mobile app, etc.), potential threat agents (attackers) are listed, possible attack scenarios are described and also some recommendations are provided.
Of course aim of this work is not to provide standard or best practices but rather to deliver educational material for architects, PMs and other project members to start thinking like attacker.
Wojciech Dworakowski
Managing Partner