This video course "Secure Hardware Implementation (G9_5)" is about the basics of secure hardware in the vehicle. This is of crucial importance, because the hardware and its correct and secure implementation form no less than the physical basis for being able to guarantee cybersecurity in the vehicle at all.
Hardware components are thus a critical factor for almost all security-related aspects in the vehicle.
These include the provision of computing power, the storage of sensitive data and the function as an interface for communication with other components. Hardware (and its proper and secure implementation) has a multifaceted impact on cybersecurity throughout the vehicle.
This video course will provide you with an overview: What solutions are available for this? What do you need to pay attention to? You will also learn about the main threats to hardware: from reverse engineering to side-channel analysis to unauthorized direct memory access.
Learn more about the "Root of Trust" and why it is the foundation for the secure interaction of components.
And what is required to ensure a secure hardware implementation? Learn more about best practices in an overview here. Finally, in this video course, we explain the two important industry standards, Hardware Security Module (HSM) and Trusted Platform Module (TPM).
In addition to this video course, you can find more in our Chapter 07 Cybersecurity Implementation.
All Videos
G9_5 Secure hardware implementation