bt automotive infographic_v7 (2)

1
Potential risks Research & development Industrial espionage and theft of intellectual property can result in the erosion of competitive advantage. Design specifications corrupted by malware after engineer visits legitimate but compromised website. Disgruntled employee takes advantage of poor systems authentication to alter critical test data. Cyber-criminal takes advantage of unpatched software to install spyware on designers workstation. Supply of components The smooth flow of goods through the supply chain depends on the ability of everyone involved to exchange data securely and efficiently. Vehicle manufacturers systems compromised by a ‘weakest-link’ attack through a supplier with inadequate perimeter defences. Failure to act on alerts from its Security Operations Centre results in theft of blueprints and plans from vehicle manufacturers design vault. Corrupt demand forecast file causes suppliers to decommit availability of key components. Potential risks Supplier portal shut down in DDOS attack, delaying launch of new vehicle. Hacktivists angry about fuel-efficiency levels claim responsibility. Any obstacle to the flow of information is quickly felt downstream in the form of added cost, delays, broken promises and disappointed customers. SCADA systems – some nearly two decades old and never patched – are increasingly connected to the manufacturers IP networks, exposing factory systems to a wide range of cyber threats. Spear phishing attack discloses access credentials to Manufacturing Execution System and allows perpetrator to make unauthorized adjustments that compromise build plans at the factories. Potential risks Infected app, downloaded to maintenance team tablet, causes plant floor machinery to overheat and fail. Assembly Cyber attacks on factory systems are relatively rare, but the vulnerabilities are numerous and the risks disproportionately high. Potential risks Dealer networks Dealerships are prime targets for cyber-attack. From the theft of commercially valuable information to poorly constructed websites that sour the customer experience. Lax perimeter protection and user authentication systems enable hacker to publish customer histories and financial details on internet. Inadequate web security exposes website visitors to spam and unwanted popups and drives potential buyers to the competition. Potential risks Connected vehicles Wi-Fi, Bluetooth and IR are all potential entry-points for cyber criminals. Driver loss of control of steering, braking and other critical systems to hackers is a real and growing threat. Technician plugs an infected laptop into car’s diagnostic port while the vehicle is being serviced. Malware-infected MP3 file introduced to infotainment system via drivers smartphone enables hackers to seize control of car. Thieves use wireless device to bypass keyless entry system to steal cars and drive away. Consumers expect a safe, reliable and secure vehicle. they won’t pay a premium, as these aren’t seen as luxury features. And should automotive companies rely on a patchwork of point solutions to defend themselves, or should they ask the experts to provide comprehensive, integrated managed security services? Security is an area of differentiation and delivers a competitive advantage. Rethink the risk, and find out how security can enable you to build opportunities throughout your supply chain. RETHINKING THE RISK The automotive industry’s dilemma. The automotive industry is more interconnected, more efficient and more vulnerable to attack than ever before. Cyber security is threatening your future, and consequently you're faced with the dilemma of absorbing costs or risking attacks.

Upload: martin-hunt

Post on 12-Jan-2017

26 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: BT Automotive Infographic_v7 (2)

Potential risks

Research & developmentIndustrial espionage and theft of intellectual property can result in the erosion of competitive advantage.

Design specifications corrupted by malware after engineer visits legitimate but compromised website.

Disgruntled employee takes advantage of poor systems authentication to alter critical test data.

Cyber-criminal takes advantage of unpatched software to install spyware on designers workstation.

Supply of componentsThe smooth flow of goods through the supply chain depends on the ability of everyone involved to exchange data securely and efficiently.

Vehicle manufacturers systems compromised by a ‘weakest-link’ attack through a supplier with inadequate perimeter defences.

Failure to act on alerts from its Security Operations Centre results in theft of blueprints and plans from vehicle manufacturers design vault.

Corrupt demand forecast file causes suppliers to decommit availability of key components.

Potential risksSupplier portal shut down in DDOS attack, delaying launch of new vehicle. Hacktivists angry about fuel-efficiency levels claim responsibility.

Any obstacle to the flow of information is quickly felt downstream in the form of added cost, delays, broken promises and disappointed customers.

SCADA systems – some nearly two decades old and never patched – are increasingly connected to the manufacturers IP networks, exposing factory systems to a wide range of cyber threats.

Spear phishing attack discloses access credentials to Manufacturing Execution System and allows perpetrator to make unauthorized adjustments that compromise build plans at the factories.

Potential risks

Infected app, downloaded to maintenance team tablet, causes plant floor machinery to overheat and fail.

AssemblyCyber attacks on factory systems are relatively rare, but the vulnerabilities are numerous and the risks disproportionately high.

Potential risks

Dealer networksDealerships are prime targets for cyber-attack. From the theft of commercially valuable information to poorly constructed websites that sour the customer experience.

Lax perimeter protection and user authentication systems enable hacker to publish customer histories and financial details on internet.

Inadequate web security exposes website visitors to spam and unwanted popups and drives potential buyers to the competition.

Potential risks

Connected vehiclesWi-Fi, Bluetooth and IR are all potential entry-points for cyber criminals. Driver loss of control of steering, braking and other critical systems to hackers is a real and growing threat.

Technician plugs an infected laptop into car’s diagnostic port while the vehicle is being serviced.

Malware-infected MP3 file introduced to infotainment system via drivers smartphone enables hackers to seize control of car.

Thieves use wireless device to bypass keyless entry system to steal cars and drive away.

Consumers expect a safe, reliable and

secure vehicle.

they won’t pay a premium, as

these aren’t seen as luxury features.

And should automotive companies rely on a patchwork of point solutions to defend

themselves, or should they ask the experts to provide comprehensive, integrated

managed security services?

Security is an area of differentiation and delivers a competitive advantage.

Rethink the risk, and find out how security can enable you to build opportunities throughout

your supply chain.

RETHINKING THE RISKThe automotive industry’s dilemma.

The automotive industry is more interconnected, more efficient and more

vulnerable to attack than ever before.

Cyber security is threatening your future, and consequently you're faced with the dilemma of

absorbing costs or risking attacks.