Look at U.S. auto companies responding to hacking crisis

Look at U.S. auto companies responding to hacking crisis

In July of this year, two U.S. technical personnel of the Traffic Management Agency invaded the Jeep free-light vehicle system to remotely control the vehicles that were driving in order to test vehicle safety. At the same time, they also studied the safety of other brands and vehicles. At the "Black Hat Security Technology Conference" in early August, the two technicians announced the vulnerabilities of 24 vehicles in the face of hackers, of which 20 vehicles can be invaded, which makes the safety of the car network worldwide. attention.

By the end of this year, automakers will have their own protection agency, the Automobile Safety Information Sharing and Analysis Center, which was established to counter potential car hackers.

Through the joint promotion of the American Automobile Manufacturers Association and the Global Automobile Manufacturers Association, automakers are working hard to establish a safety information sharing and analysis center. This center can collect intelligence that threatens cars and in-vehicle network systems. It also encourages member companies to share their own measures of security defense and counterattack threats. If hackers maliciously change the car's network connection, as happened in July on Jeep vehicles, the entire automotive industry will have a comprehensive solution to better maintain the network security of each car.

Some other industries already have such a mechanism for sharing safety information, and Rob Strassburger, vice president of the American Automobile Manufacturers Alliance, said that the safety information sharing center for the automotive industry will be established by the end of the year. Every major automobile manufacturer will participate in this security information sharing center, and some network suppliers and communication companies may also join this organization. The Security Center will establish a dedicated portal to ensure that the information of each branch of the network can be denied access in order to avoid being hacked when the hackers attempt to destroy the website through huge instantaneous traffic. It is expected that after the agency has reached a certain stage of development, professionals will be specifically responsible for analyzing, diagnosing, and responding to those threats, and will release relevant information to all members of the organization.

Many operational details of this organization are still in development, but some of the operating modes of other industry security sharing agencies will provide some references for the information security center of the automotive industry.

Felt Cutting

Felt Cutting Machine,Felt Fabric Cut Machine,Cut Velvet Fabric Machine,Felt Cloth Cut Machine

Jinan Zhuoxing Intelligent Technology Co., Ltd. , https://www.zhuoxingcutter.com

This entry was posted in on