Cybersecurity for Commercial Vehicles
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Warrendale :
SAE International,
2018.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Table of Contents
- Foreword to the Reader
- CHAPTER 1 What Do You Mean by Commercial Vehicles and How Did We Happen on This Path of Cybersecurity?
- 1.1 I'm an Engineer and a Strategist
- 1.2 Panel Discussion: Cybersecurity Risks and Policies for Transportation
- 1.3 How Do We Define Commercial Vehicles for This Book?
- 1.4 What I Love about the Cybersecurity World
- 1.5 So, Who Should Read This Book?
- 1.6 And Why You? Why Gloria?
- 1.7 The Contributing Writers
- 1.7.1 Chapter 2: Should We Be Paranoid?-by Doug Britton
- 1.7.2 Chapter 3: What Cybersecurity Standard Work Is Applicable to Commercial Vehicles?-by Lisa Boran and Xin Ye
- 1.7.3 Chapter 4: Commercial Vehicles vs. Automotive Cybersecurity: Commonalities and Differences-by André Weimerskirch, Steffen Becker, and Bill Haas
- 1.7.4 Chapter 5: Engineering for Vehicle Cybersecurity-by Daniel DiMase, Zachary A. Collier, John A. Chandy, Bronn Pav, Kenneth Heffner, and Steve Walters
- 1.7.5 Chapter 6: "When Trucks Stop, America Stops"
- 1.7.6 Chapter 7: On the Digital Forensics of Heavy Truck Electronic Control Modules-by James Johnson, Jeremy Daily, and Andrew Kongs
- 1.7.6.1 Comments on How We Are All Connected
- 1.7.6.2 IoT: The Internet of Things
- 1.7.7 Chapter 8: Telematics Cybersecurity and Governance-by Glenn Atkinson
- 1.7.8 Chapter 9: The Promise of Michigan: Secure Mobility-by Karl Heimer
- 1.7.9 Chapter 10: How the Truck Turned Your Television Off and Stole Your Money: Cybersecurity Threats from Grid-Connected Commercial Vehicles-by Lee Slezak and Christopher Michelbacher
- 1.7.10 Chapter 11: CALSTART's Cyber Mission: HTUF REDUX-by Michael Ippoliti
- 1.7.11 Chapter 12: Characterizing Cyber Systems-by Jennifer Guild
- 1.7.12 Chapter 13: "...No, We Should Be Prepared"-by Joe Saunders and Lisa Silverman
- 1.7.13 Chapter 14: Heavy Vehicle Cyber Security Bulletin
- 1.7.14 Chapter 15: Law, Policy, Cybersecurity, and Data Privacy Issues-by Simon Hartley
- 1.7.15 Chapter 16: Do You Care What Time It Really Is? A Cybersecurity Look Into Our Dependency on GPS-by Gerardo Trevino, Marisa Ramon, Daniel Zajac, and Cameron Mott
- 1.7.16 Chapter 17: Looking Towards the Future-by Gloria D'Anna
- References
- About the Author
- CHAPTER 2 Should We Be Paranoid?
- 2.1 Why Is Cyber So Hard to De-risk?
- 2.2 A Primer on Hacker Economics and Tactics
- 2.2.1 Income Statement
- 2.2.2 Balance Sheet
- 2.2.3 Economic Analysis
- 2.2.4 What about Nation-States?
- 2.2.5 Steps in a Successful Cyber Attack
- 2.2.6 Industrialization of the Attack
- 2.3 Hacker Enterprises and Assets Associated with Commercial Trucking
- 2.3.1 Exploitation Research
- 2.3.2 Asset Development
- 2.3.3 Distribution Development