Securing the Future of Mobility Addressing Cyber Risk in Self-Driving Cars and Beyond Brochure / Report Title Goes Here | Section Title Goes Here

Securing the Future of Mobility Addressing Cyber Risk in Self-Driving Cars and Beyond Brochure / Report Title Goes Here | Section Title Goes Here

Securing the future of mobility Addressing cyber risk in self-driving cars and beyond Brochure / report title goes here | Section title goes here Where could the risks lie? 04 A path forward 10 Conclusion 15 Endnotes 16 About the Authors 17 Acknowledgements 18 Contacts 19 02 Securing the future of mobility | Addressing cyber risk in self-driving cars and beyond Introduction An unwelcome passenger Climbing into a car has long been among when and for what purpose, accumulating Cyber risk poses perhaps the greatest the riskier things that people do – famously, data and raising the stakes even further. threat to the future of mobility, and data the least safe part of an airplane trip is governance, privacy and data protection the drive to the airport.1 So it is likely no The path forward should incorporate will likely be of paramount importance surprise that self-driving cars’ safety is a comprehensive approach to as individuals and organisations move to one of their most often cited benefits. cybersecurity that makes connected make it a reality. Just as collision warning Indeed, many expect the emerging mobility vehicles and the associated ecosystems systems and anti-lock brakes have not ecosystem2, with increasing shared access secure, vigilant and resilient. This eliminated all road mishaps, a world of to transportation as well as autonomous likely involves a radical change to how shared and autonomous vehicles can never technology, to all but eradicate routine organisations address cybersecurity: be risk-free. A key challenge for players accidents. in the mobility ecosystem lies in making the degree of risk acceptable to both The very innovations that Secure consumers and regulators. As automakers, Establish risk-focused technology organisations, governments aim to enhance the way controls around the most and others place bets on how and when we move from place to sensitive assets, balancing the future of mobility may unfold, those the need to reduce risk, while moves could be for naught without a broad place entail first-order also enabling productivity, understanding of the myriad of cyber business growth and cost threats likely to emerge – and a concrete cybersecurity challenges. optimisation. plan on how to address them. But as the future of mobility offers potential growth and new sources of value creation, Vigilant it presents new types of risk. The very Develop monitoring solutions innovations that aim to enhance the way focused on critical business we move from place to place entail first- processes. By integrating threat data, IT data and order cybersecurity challenges. business data, organisations And the dangers that promptly come can equip themselves with to mind – such as hacked autonomous context-rich alerts to help vehicles crashing3­­ – only begin to scratch prioritise incident handling the surface; indeed, they may not even and streamline incident represent the most likely or high-stake investigation. threats. Shared vehicles could hold data from hundreds of unique users, making them a ripe target for digital thieves. Resilient Connected and increasingly autonomous Rapidly adapt and respond to vehicles may provide new opportunities internal or external changes a opportunities, demands, for malicious ransomware. As mobility disruptions or threats– managers take the hassle out of travel by and continue operations managing end-to-end trip planning, they with limited impact to the could gain an increasingly holistic view of organisation. people’s lives, including where they go, 03 Securing the future of mobility | Addressing cyber risk in self-driving cars and beyond Where could the risks lie? After a century of addressing mainly Figure 1. The future states of mobility problems with engineering, automakers are facing a new set of challenges. Other industries are also dealing with Personally Shared cybersecurity issues, and players in the 3 owned driver- autonomous 4 mobility ecosystem can look to others for autonomous similar solutions, although the specific Autonomous implementation of those solutions would need to be carefully shaped to fit the automotive industry’s unique needs. Assist What steps organisations take also likely depend on which ecosystem roles they Vertical control Personally owned Shared intend to play. In The future of mobility, we Increasing scope of risk 1 driver-driven driver-driven 2 envisioned four co-existing future states of mobility: some quite similar to today’s Driver landscape and others that posit more ambitious vehicle sharing and autonomous Personal Vertical use Shared driving possibilities (see figure 1).4 Increasing scale of risk Source: Deloitte analysis. Each of the four future states of mobility become increasingly connected and data- secure current technology and features brings a unique set of data-related centric (creation, consumption, analysis, while continuing to evolve to protect risks and, consequently, a unique set of etc.) and to employ advanced driver-assist the incremental changes that we expect challenges and required solutions. technologies (stopping short of full providers to develop in future state 1. autonomy). As vehicle designs advance, Future state 1: This is the most their security capabilities should evolve conservative vision of the future, in which too. Enhanced security features will likely vehicles would remain individually owned be based on in-vehicle technology and and operated, much as most are today. features already present in today’s cars. Yet even then, vehicles are expected to This enhanced security would need to 04 Securing the future of mobility | Addressing cyber risk in self-driving cars and beyond Insider Threats The future of mobility, even in the most response. Next, they could remotely Technology’s Generally Accepted Principles incremental vision, will likely introduce a quadruple the amperage of electric vehicle and Practices for Securing Information new kind of infrastructure, one based on charging stations which could result in fires. Technology Systems.8 Similar to how bits and bandwidth more than bridges secure content providers protect publicly Of course, organisations work to maintain and boulevards.5 As vehicles communicate accessible devices with encryption and safeguards against single bad actors with other vehicles and their surroundings, authentication, critical infrastructure causing such widespread harm, but plenty V2X networks will likely emerge to help protection typically requires the addition can sneak through. In a recent survey with everything from rerouting emergency of secure software development as well conducted by the Manufacturers Alliance vehicles to easing traffic congestion to as physical and public safety measures. for Productivity and Innovation and facilitating parking and electric vehicle This is because regulatory bodies and Deloitte, manufacturing executives traced charging. organisations, such as the US Department 42 percent of cyber incidents to “insider of Transportation and the National As with smartphone development today, threats.”6 Highway Traffic Safety Administration, have it is likely that hardware and software The extended automotive industry could recognised that the assets they oversee vendors will collaborate in the design take cues from how organisations such are exposed to an increasing number of and production of future vehicles and as the North American Electric Reliability threats as they become more complex other mobility infrastructure. Consider Corp. (NERC) have created standards and open to remote operation. The same a hypothetical software developer and practices that guide the secure level of attention would need to be paid to partnering with a V2X device manufacturer development of critical electric power connected vehicles and associated devices that ships and configures devices that systems. Led by a standards committee that make up the new mobility ecosystem’s enable connected infrastructure. When and aided by drafting teams comprising critical infrastructure. the developer’s lead engineer leaves industry volunteers and their staff, NERC the organisation, he takes with him The NHTSA looks to be laying down develops guidelines based on a set of critical trade secrets and knowledge of a some of the first concrete steps down principles that emphasises reliability backdoor into the root of the V2X system. this path. In October 2016, the agency and market impact–principles that could Perhaps because of discontent with his offered a series of recommendations readily be adapted to mobility-focused former employer, he leaks information to the automotive industry aimed at systems.7 As vehicles and transportation about the security bypass, making improving cybersecurity safety, focusing infrastructure begin to integrate with vulnerable hundreds of thousands of on “layered solutions to ensure vehicle their surroundings and other systems, installed and active devices. The attacks systems are designed to take appropriate governments and developers should could begin as irksome pranks but soon and safe actions, even when an attack is consider protecting that infrastructure like escalate. Targeting one city, hackers could successful.”9 any other essential public service. manipulate information to tell traffic apps and rideshare vehicles that there Such a standard-setting effort could is construction on every street, causing build off the United States of America’s accidents and delays in emergency service National Institute of Standards and 05 Securing the future of mobility |

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us