Understanding the challenge of cybersecurity management

0
257

With connectivity and IoT being an integral part of the modern automotive ecosystem, big data management and analytics using artificial intelligence or other tools are of utmost importance.

This data type can be either personal or public and may have financial, operational, social implications etc. As we are reminded quite often nowadays regarding the possibilities of theft or misuse of this data by unauthorised users, information security becomes a priority. Information security in automotive context encompasses periphery protection, securing data against unauthorised access (through encryption) and data recovery in the event of loss. All this can be generally accomplished with an appropriate cyber security management framework in-place. These frameworks can be implemented in three ways: through ad hoc approach, through risk approach or through compliance approach. Out of these three approaches, ad hoc approach is an unsystematic methodology. Whereas risk and compliance based approach are more organised in nature. Off these, the latter is recommended as it is most systematic and holistic. In this article, the focus is on a compliance-based approach where…

Read More…

Актуальные книги на английском