標題: Related Links
無頭像
lalala0519
註冊會員
Rank: 1

積分 0
帖子 17
註冊
用戶註冊天數 3671
用戶失蹤天數 3661
發表於 07:04 
59.58.158.190
分享  私人訊息  頂部
According to Table 2, in the car throughout the entire life cycle is divided into "management", "planning", "development", "use", "waste" and other stages, each stage matters to note the following.
Use phase build security issues to deal with rapid response measures to contact the system when an event occurs, the implementation of training.
Now the car navigation system may save the owner's address, company cars could save a customer's information, if a car navigation system is connected to social networking services (SNS), there may save the user's account, password, and other data. In the field of computer information systems, discarded hard drives many examples of leaked information. Today, the car also has appeared before the owners of car navigation systems to display information like personal privacy issues.
Implementing safety education for personnel involved in the development and use of, the implementation of the concept of security training and security technologies.
Table 1 should protect information assets
Unlike personal computers and mobile phones car, due to its large size and has some features that users difficult time monitoring of vehicles, the attacker can easily direct contact with the car.
Compiler: International Technical Cooperation Center of Industry and Information Technology Ministry of Economic Wang Xiwen
Development stage design with safety features and installation methods designed to collect logs.
At this stage, the concept cars, are equipped with specific functions. At this point, you need to consider the importance of the functions of security, in line with the importance of the budget allocation strategies. Moreover, the choice of vehicles equipped with the feature and then transferred to the stage of development, be sure to include information security, including submission requirements.
Ready to provide users with the information needed to correct content summary helps users use the system information.
(B) the product from the periphery invasion
Collection and dissemination of collected tissue may develop its own system vulnerabilities related information, event information,scarpe hogan outlet online, standardization trends and other safety information to relevant personnel release.
IPA Car car LAN maximize abstraction, with a bus connection assumed full functionality. All functions into "driving, stop, turn" and "basic control functions", to enhance the comfort and convenience of "extensions", the user into the car peripheral products, such as "normal function."
(C) calls for extensive user assistance
Ensure the security budget for the development phase of information security measures costs, safety upgrades and other phases of the development budget.
Japan Information Processing advancing mechanism, the above Table 1 lists the functions of the management information and the operation of the car. In studying the safety of an in-vehicle system, we must first clarify the functions of the system and which of linkage, using what information, and then to focus research relevant security issues.
Safety evaluation and debugging test session to review and use the source code, etc. fuzzing test.
Although the information security measures to be implemented with user scenarios,tiffany, but also pay attention to the protection of personal information privacy. In addition, if you find loopholes in the vehicle is sold, you must also consider construction-related information can notify users and owners, repair shops and manufacturers with sales and other cooperative response system.
Due to the different manufacturers and different price (level) of the car, there is a big difference in terms of structure and function, it is difficult to define a common industry-wide car model. Japan Information Processing pusher Car Information Security in the system, from the viewpoint of reliability automotive vehicle according to the function module for classification, the information security of a car model developed "IPA Car" (Figure 4), the attack may way, information security measures, such as different functional modules automobile automotive systems made finishing systems.
In the manufacturing stage,bracciale tiffany, automotive manufacturers and parts manufacturers began to design hardware and software and install it on the car, which is to take the most important part of information security measures.
One is physical, including "body system", "safe