Connected cars can now smartly handle Cloud Security threats

1036

Cyber security threats in the world of connected cars are getting paramount these days and to narrow them down, emerging technologies are being served by companies from time to time.

One such innovative cyber security threat detection software is “The Intrusion detection system (IDS)” made in collaboration between software firms Harman and Airbiquity. This software helps in keeping connected vehicles secure from cyber criminals such as hackers.

“As the priority will be to keep the vehicle secure from cyber attacks, vehicle security threat detection will become a mandatory component of any connected vehicle system in future”, said Kamyar Moinzadeh, President, and CEO of Airbiquity.

Saar Dickman, Vice President,Automotive Cyber security threats at Harman believes that connected car makers are increasingly depending on software to power their respective vehicles. So, offering them in a more secure way happens to be the prime criterion for automobile manufacturers. Dickman added that IDS offers the advantage of detecting security threats in advance for vehicle networks.

Technically speaking, IDS uses Airbiquity’s cloud-based Choreo service for smart data management. Hartman’s software, called as Ecushield, forms the base of the IDS which not only helps in identifying the security threat but also assists in creating a data log onto a cloud.

Once the data gets aggregated onto the cloud, it is analyzed by the security threat servers and an alert along with a resolution is passed onto the connected car user. This includes secure transmission and installation of security updates to lessen any future threats and restore the affected system and components.

Hence, it gives adequate time to the user to take necessary action before time.

IDS will be demonstrated at the 14th Annual conference and Exhibition of TU-Automotive Europe 2016 in Munich this week between November 2-3,2016.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display