0
نام کتاب
Hacking Connected Cars

Tactics, Techniques, and Procedures

Alissa Knight

Paperback261 Pages
PublisherWiley
Edition1
LanguageEnglish
Year2020
ISBN9781119491804
1K
A2745
انتخاب نوع چاپ:
جلد سخت
564,000ت
0
جلد نرم
484,000ت
0
طلق پاپکو و فنر
494,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:سیاه و سفید
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Hacking

#Car

#cyber

#cyber_threats

#TTP

#Bluetooth

#GSM

#wireless

#networking

#hackers

توضیحات

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment


Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.


Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle’s systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.


  • Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide
  • Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability
  • Conduct penetration testing using the same tactics, techniques, and procedures used by hackers


From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars—all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.


Table of Contents

Part I Tactics, Techniques, and Procedures

Chapter 1 Pre-Engagement

Chapter 2 Intelligence Gathering

Chapter 3 Threat Modeling

Chapter 4 Vulnerability Analysis

Chapter 5 Exploitation

Chapter 6 Post Exploitation

Part II Risk Management

Chapter 7 Risk Management

Chapter 8 Risk-Assessment Frameworks

Chapter 9 PKI in Automotive

Chapter 10 Reporting


About the Author

Alissa Knight has worked in cybersecurity for more than 20 years. For the past ten years, she has focused her vulnerability research into hacking connected cars, embedded systems, and IoT devices for clients in the United States, Middle East, Europe, and Asia. She continues to work with some of the world’s largest automobile manufacturers and OEMs on building more secure connected cars.


Alissa is the Group CEO of Brier & Thorn and is also the managing partner at Knight Ink, where she blends hacking with content creation of written and visual content for challenger brands and market leaders in cybersecurity. As a serial entrepreneur, Alissa was the CEO of Applied Watch and Netstream, companies she sold in M&A transactions to publicly traded companies in international markets.


Her passion professionally is meeting and learning from extraordinary leaders around the world and sharing her views on the disruptive forces reshaping global markets. Alissa’s long-term goal is to help as many organizations as possible develop and execute on their strategic plans and focus on their areas of increased risk, bridging silos to effectively manage risk across organizational boundaries, and enable them to pursue intelligent risk taking as a means to long-term value creation. You can learn more about Alissa on her homepage at http://www.alissaknight.com, connect with her on LinkedIn, or follow her on Twitter @alissaknight.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
611
Inside Cyber Warfare
364,000 تومان
هک و امنیت
565
Pentesting APIs
576,000 تومان
هک و امنیت
973
Cyber Threat Intelligence
437,000 تومان
Kubernetes
1,088
Certified Kubernetes Security Specialist (CKS) Study Guide
427,000 تومان
هک و امنیت
1,101
Beginning Ethical Hacking with Python
407,000 تومان
هک و امنیت
1,058
Practical Cloud Security
448,000 تومان
هک و امنیت
949
Ransomware Revealed
445,000 تومان
هک و امنیت
1,044
CEH : Certified Ethical Hacker Practice Exams
593,000 تومان
هک و امنیت
1,758
Attacking Network Protocols
578,000 تومان
هک و امنیت
946
Kali Linux Cookbook
1,022,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©