Cargando…

Cybersecurity for Commercial Vehicles

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: D'Anna, Gloria
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Warrendale : SAE International, 2018.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Table of Contents
  • Foreword to the Reader
  • CHAPTER 1 What Do You Mean by Commercial Vehicles and How Did We Happen on This Path of Cybersecurity?
  • 1.1 I'm an Engineer and a Strategist
  • 1.2 Panel Discussion: Cybersecurity Risks and Policies for Transportation
  • 1.3 How Do We Define Commercial Vehicles for This Book?
  • 1.4 What I Love about the Cybersecurity World
  • 1.5 So, Who Should Read This Book?
  • 1.6 And Why You? Why Gloria?
  • 1.7 The Contributing Writers
  • 1.7.1 Chapter 2: Should We Be Paranoid?-by Doug Britton
  • 1.7.2 Chapter 3: What Cybersecurity Standard Work Is Applicable to Commercial Vehicles?-by Lisa Boran and Xin Ye
  • 1.7.3 Chapter 4: Commercial Vehicles vs. Automotive Cybersecurity: Commonalities and Differences-by André Weimerskirch, Steffen Becker, and Bill Haas
  • 1.7.4 Chapter 5: Engineering for Vehicle Cybersecurity-by Daniel DiMase, Zachary A. Collier, John A. Chandy, Bronn Pav, Kenneth Heffner, and Steve Walters
  • 1.7.5 Chapter 6: "When Trucks Stop, America Stops"
  • 1.7.6 Chapter 7: On the Digital Forensics of Heavy Truck Electronic Control Modules-by James Johnson, Jeremy Daily, and Andrew Kongs
  • 1.7.6.1 Comments on How We Are All Connected
  • 1.7.6.2 IoT: The Internet of Things
  • 1.7.7 Chapter 8: Telematics Cybersecurity and Governance-by Glenn Atkinson
  • 1.7.8 Chapter 9: The Promise of Michigan: Secure Mobility-by Karl Heimer
  • 1.7.9 Chapter 10: How the Truck Turned Your Television Off and Stole Your Money: Cybersecurity Threats from Grid-Connected Commercial Vehicles-by Lee Slezak and Christopher Michelbacher
  • 1.7.10 Chapter 11: CALSTART's Cyber Mission: HTUF REDUX-by Michael Ippoliti
  • 1.7.11 Chapter 12: Characterizing Cyber Systems-by Jennifer Guild
  • 1.7.12 Chapter 13: "...No, We Should Be Prepared"-by Joe Saunders and Lisa Silverman
  • 1.7.13 Chapter 14: Heavy Vehicle Cyber Security Bulletin
  • 1.7.14 Chapter 15: Law, Policy, Cybersecurity, and Data Privacy Issues-by Simon Hartley
  • 1.7.15 Chapter 16: Do You Care What Time It Really Is? A Cybersecurity Look Into Our Dependency on GPS-by Gerardo Trevino, Marisa Ramon, Daniel Zajac, and Cameron Mott
  • 1.7.16 Chapter 17: Looking Towards the Future-by Gloria D'Anna
  • References
  • About the Author
  • CHAPTER 2 Should We Be Paranoid?
  • 2.1 Why Is Cyber So Hard to De-risk?
  • 2.2 A Primer on Hacker Economics and Tactics
  • 2.2.1 Income Statement
  • 2.2.2 Balance Sheet
  • 2.2.3 Economic Analysis
  • 2.2.4 What about Nation-States?
  • 2.2.5 Steps in a Successful Cyber Attack
  • 2.2.6 Industrialization of the Attack
  • 2.3 Hacker Enterprises and Assets Associated with Commercial Trucking
  • 2.3.1 Exploitation Research
  • 2.3.2 Asset Development
  • 2.3.3 Distribution Development