Secure Architecture

Defense in depth for connected vehicles

The design of the vehicle architecture in accordance with Defense in Depth & Security by Design principles forms a fortress and thus optimal protection against hacker attacks.

Vehicle connectivity enables service-oriented business models, is an essential component of highly autonomous driving (V2X) and offers users comprehensive functionalities as we are used to in the smartphone world. As part of the Internet of Things (IoT), the clever architectural design can exploit the profit of these possibilities while making life difficult for potential attackers with a Fort Knox-like defense system. In this course you will learn how to integrate cybersecurity into the development of your connected vehicle architecture.

  • Defense in depth for connected vehicles
  • Secure off-board communication
  • Secure on-board communication
    • Firewalls
    • Whitelisting
    • Intrusion detection sytems
  • Secure Firmware
    • Zones & Conduits
    • Software over the air update (SOTA)
  • Secure Hardware
    • HSM
    • Secure Boot
    • Memory protection
  • Cryptographic key management
  • Knowledge of state of the art solutions
  • Holistic picture of a cybersecurity architecture
  • Resilient and cost-optimized design of software and hardware
  • Common understanding and communication between OEM, Tier-1 and Tier-2
  • Context for daily development, technical and organizational cybersecurity controls
  • 1-3 Days
Attendance fee
  • On request