Security landscape: Vehicle protection from factory to backend
When it comes to IT security for connected and automated vehicles, weaknesses cannot be tolerated. But such weaknesses do not lurk just in the vehicle itself. Attackers could gain access to vehicle data or cryptographic keys during the manufacturing process. Or cyberattacks could spread beyond the vehicle into the associated backend systems and mobility services.