Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Building Secure Automotive IoT Applications

You're reading from   Building Secure Automotive IoT Applications Developing robust IoT solutions for next-gen automotive software

Arrow left icon
Product type Paperback
Published in Aug 2024
Publisher Packt
ISBN-13 9781835465509
Length 358 pages
Edition 1st Edition
Arrow right icon
Authors (4):
Arrow left icon
Dr. Dennis Kengo Oka Dr. Dennis Kengo Oka
Author Profile Icon Dr. Dennis Kengo Oka
Dr. Dennis Kengo Oka
Jeff Yost Jeff Yost
Author Profile Icon Jeff Yost
Jeff Yost
Sharanukumar Nadahalli Sharanukumar Nadahalli
Author Profile Icon Sharanukumar Nadahalli
Sharanukumar Nadahalli
Ram Prasad Bojanki Ram Prasad Bojanki
Author Profile Icon Ram Prasad Bojanki
Ram Prasad Bojanki
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1: Introduction to Automotive IoT FREE CHAPTER
2. Chapter 1: Automotive Technology Trends 3. Chapter 2: Introducing Automotive IoT Use Cases 4. Part 2: Vehicle Architectures
5. Chapter 3: Vehicle Architecture and Frameworks 6. Chapter 4: Vehicle Diagnostics 7. Chapter 5: Next Wave of Vehicle Diagnostics 8. Part 3: Secure Development for Automotive IoT
9. Chapter 6: Exploring Secure Development Processes for Automotive IoT 10. Chapter 7: Establishing a Secure Software Development Platform 11. Chapter 8: Securing the Software Supply Chain 12. Part 4: Automotive IoT Application Life Cycle
13. Chapter 9: System Design of an Automotive IoT Application 14. Chapter 10: Developing an Automotive IoT Application 15. Chapter 11: Deploying and Maintaining an Automotive IoT Application 16. Part 5: Automotive Software Insights
17. Chapter 12: Processes and Practices 18. Chapter 13: Embedded Automotive IoT Development 19. Chapter 14: Final Thoughts 20. Index 21. Other Books You May Enjoy

Activities in the SSDLC

To establish a secure software development platform, we have to understand what activities need to be performed in the SSDLC. With this understanding, we can then define which activities can be integrated and performed using the platform, especially when it comes to managing the activities and allowing for automation.

This section focuses on describing specific activities in the SSDLC. Various standards can be considered to help build a framework around SSDLC [1-3].

Note

The following is not an exhaustive list but provides an overview of common cybersecurity activities that can be used to establish a baseline of security. Please also note that some of the following activities require specified workflows with defined interactions between project teams and security teams to be established.

These cybersecurity activities have been mapped to a simplified V-model in Figure 7.1.

Figure 7.1 – Cybersecurity activities mapped to a simplified V-model

Figure 7.1 – Cybersecurity activities mapped...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime