2

Cybersecurity Basics for Automotive Use Cases

In Chapter 1, we peered into the vehicle E/E architecture layer by layer to understand its layout, interfaces, networks, and various electronic components. While doing so, we got a glimpse of the objects of value that needed protection and some of the adverse consequences of successful attacks. In this chapter, we will review some fundamental security concepts, methods, and principles that are especially applicable to automotive use cases. Building this foundation is a prerequisite for the later chapters, where we will explore vehicle threats, the methodology for treating them, and the technical cybersecurity controls to mitigate them.

If you are skilled in the art of general cybersecurity, this ...

Get Automotive Cybersecurity Engineering Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.