Automotive Security Review Board Is Launched – First Steps to Protect the Car from Breaking Down

What seems perfectly thought out and reliable, often presents us with the most unexpected surprises. Such a sad discovery befell the creators of the car Jeep Cherokee model 2014 in July 2015, when the Internet stirred up the news about two professional hackers Chris Valasek and Charlie Miller who managed to gain remote access to the onboard computer of the seemingly “perfect” car and take the operation of its core systems under their control. During the experiment, “a victim of the hacker attack” was Andrew Greenberg, who was warned about what was happening, but, nevertheless, had an obvious discomfort and panic.

car security opening the carThe most vulnerable turned to be the Uconnect system. This system controls a network of the interactive features of the on-board computer which are not provided with the system for data protection. Therefore, in the case of the hacker attack, the attacker potentially has an advantage over the driver in driving a vehicle that could and most likely would have resulted in tragic consequences for the driver. To avoid such consequences, Chrysler brand was forced to recall 1.4 million cars, which caused enormous financial damage to the enterprise.

This event disturbed the public because most drivers give their preference to modern cars with an interactive control system, which, as it turns out, can cause a great danger for them. Cars are equipped with hundreds of control units, which are vulnerable to errors or may be infected by malicious software hacking programs, which is why in the case of failure of the main control unit human lives are at stake.

Intel Company – “Benefactor” in the Struggle for the Safety of Motor Vehicles

Intel Company promptly responded to the shocking news by creating a supervisory Automotive Security Review Board. According to the latest reports, among the members of the Automotive Security Review Board will be the best experts in the field of data protection and cyber physics systems. Intel will provide them with innovative platforms for research in the field of cyber-security and advanced systems development for the better protection of vehicles from the new hacker attacks. The most successful developers will receive a valuable reward for their contributions: a car or its value in monetary terms.

Automotive Security Review Board is LaunchedToday particularly acute is a problem of passenger transport, the safety of which largely depends on the usage of reliable two-factor authentication systems for drivers with a help of factor of ownership (key) and the factor of knowledge. As a secret “factor”, could be used a one-time password generated by a hardware token or a special mobile application created for a specific car manufacturer. For better protection when entering the application it would be better to enter the username and password. In this case, it is impossible to gain access to the systems of the car only with the help of a key, as the main condition for authorization of the driver is a one-time password that is requested by an onboard computer.

Two-step authentication launching would be the optimal solution of the security problem of cars because according to the experts’ estimations until 2020 the number of cars with advanced network capabilities will grow to 150 million, the compromise of which we cannot allow.

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Author: Anna

If you have any questions about two-factor authentication and Protectimus products, ask Anna, and you will get an expert answer. She knows everything about one-time passwords, OTP tokens, 2FA applications, OATH algorithms, how two-factor authentication works, and what it protects against. Anna will explain the difference between TOTP, HOTP, and OCRA, help you choose a token for Azure MFA, and tell you how to set up two-factor authentication for Windows or Active Directory. Over the years with Protectimus, Anna has become an expert in cybersecurity and knows all about the Protectimus 2FA solution, so she will advise on any issue. Please, ask your questions in the comments.

Share This Post On

Submit a Comment

Your email address will not be published. Required fields are marked *

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from Protectimus blog.

You have successfully subscribed!

Share This