Description
Hacking Connected Cars is an essential field manual for anyone serious about cybersecurity in the automotive industry. This brand new release, published by John Wiley & Sons in 2020, spans 272 pages of vital insights into identifying and mitigating cyber threats, vulnerabilities, and risks inherent to connected cars and autonomous vehicles. With the rapid increase in connectivity due to the Internet of Things (IoT), understanding how to secure these vehicles is more crucial than ever. This comprehensive guide takes you through the tactics, techniques, and procedures (TTPs) utilized to penetrate telematics control units and infotainment systems.
The expert author, a seasoned professional in penetration testing and risk management, provides a detailed, step-by-step methodology for conducting thorough penetration testing. This book not only discusses potential vulnerabilities related to wireless networking, Bluetooth, and GSM, but also emphasizes the importance of maintaining confidentiality, integrity, and availability in modern connected vehicles.
As the demand for always-on connectivity in passenger vehicles continues to escalate, manufacturers and OEMs face increased risk of cyber attacks. Hacking Connected Cars offers cutting-edge preventative tactics and strategies tailored for security practitioners, researchers, and vendors dedicated to keeping connected cars safe without compromising the connectivity that today’s consumers expect.
In summary, Hacking Connected Cars is your go-to resource for mastering cybersecurity in connected vehicles. Boost your skills in threat modeling and risk assessments today.
Note: Shipping for this item is free. Please allow up to 6 weeks for delivery. Once your order is placed, it cannot be cancelled.
Note: Shipping for this item is free. Please allow up to 6 weeks for delivery. Once your order is placed, it cannot be cancelled.
Condition: BRAND NEW
ISBN: 9781119491804
Year: 2020
Publisher: John Wiley & Sons Inc (US)
Pages: 272
Description:
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment
Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.
Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle™s systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.
Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide
Analyze risk levels surrounding vulnerabilities and threats that impact confid
The expert author, a seasoned professional in penetration testing and risk management, provides a detailed, step-by-step methodology for conducting thorough penetration testing. This book not only discusses potential vulnerabilities related to wireless networking, Bluetooth, and GSM, but also emphasizes the importance of maintaining confidentiality, integrity, and availability in modern connected vehicles.
As the demand for always-on connectivity in passenger vehicles continues to escalate, manufacturers and OEMs face increased risk of cyber attacks. Hacking Connected Cars offers cutting-edge preventative tactics and strategies tailored for security practitioners, researchers, and vendors dedicated to keeping connected cars safe without compromising the connectivity that today’s consumers expect.
In summary, Hacking Connected Cars is your go-to resource for mastering cybersecurity in connected vehicles. Boost your skills in threat modeling and risk assessments today.
Note: Shipping for this item is free. Please allow up to 6 weeks for delivery. Once your order is placed, it cannot be cancelled.
Note: Shipping for this item is free. Please allow up to 6 weeks for delivery. Once your order is placed, it cannot be cancelled.
Condition: BRAND NEW
ISBN: 9781119491804
Year: 2020
Publisher: John Wiley & Sons Inc (US)
Pages: 272
Description:
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment
Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.
Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle™s systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.
Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide
Analyze risk levels surrounding vulnerabilities and threats that impact confid