THANK YOU FOR SUBSCRIBING
THANK YOU FOR SUBSCRIBING
Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Auto Tech Outlook
By
Auto Tech Outlook | Saturday, October 29, 2022
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
The use of digital signatures in software is questionable. To preserve trust in the program, it should be signed at the farthest point upstream in the supply chain when originally built.
FREMONT, CA: In the United States, the automotive industry has one of the most extensive and most complicated supply networks. This includes the frequent use of third-party software, components, apps, and communications protocols, which creates a slew of serious cybersecurity and quality-control challenges.
Multiple players are involved, each creating their own patch specifications and adhering to different standards, thus making cybersecurity precautions challenging. More than 20 different providers can provide a set of control units. The level of risk is increased when numerous other providers offer components.
Furthermore, a poorly implemented integration may compromise the strength of an individual component, resulting in a susceptible network of interrelated pieces. It is tough for a carmaker to maintain the software that runs in its vehicles when many software authors come together in a complex supply chain. Consider how other technical fields that touch on human safety impose training, licensing, design, and quality requirements; sadly, this is not the case for many types of automotive software.
The use of digital signatures in software is questionable. To preserve trust in the program, it should be signed at the farthest point upstream in the supply chain when originally built. Furthermore, standards should be in place to allow for thorough software validation at each level of the supply chain to assure its integrity.
Suppliers are not always informed about potential hazards posed by others in the supply chain. Tier 1 suppliers may execute a portion of a solution and convey one or more cybersecurity vulnerabilities to Tier 2 and Tier 3 suppliers down the supply chain. These companies install hardware and software and test for safety, security, functionality, and regression. These lower-tier providers may introduce flaws and insecure features, increasing the risk of cybersecurity attacks. A bad actor is likely to start small at lower levels, then patiently hide in one or more systems for years before deciding to attack.
Participants in the supply chain are inextricably linked. Digital buyer-seller relationships, robotic process automation, and the Internet of Things (IoT) are all part of people’s daily lives. While these arrangements give great efficiency and convenience, they also come with inherent security vulnerabilities. Cybercriminals are well aware of these possible entry holes and are already using them to access internal networks that were previously well-protected individually.
Check Out This : Life Sciences Review
Even though the cyber risk is developing exponentially, partnering firms are frequently unable to monitor or regulate security measures elsewhere in the supply chain. As a result, high-level security management becomes impossible.
See Also: Top Pharma and Life Sciences Tech Solution Companies