Skip main navigation

The Coventry Way

Coventry University believes that a good student experience is central to learning at a world-class standard. To reflect our success, we were recently awarded the title of University of the …

Challenges in securing connected vehicles

We have already mentioned the challenge of connected vehicles, and how they can be attacked remotely or physically. There is an immense need to isolate remote connectivity with the internal …

Continue learning with Coventry University

Thank you for joining us on this short course on Automotive Cyber Security: An Introduction. We hope that you enjoyed your learning experience. This is the introductory two-week course for …

Test your prior knowledge

The questions below indicate the knowledge and understanding we expect you to have to get the most out of this course. If you are unable to answer some of the …

Introduction to the course

Welcome to this short course on Automotive Cyber Security: An Introduction. In this course, you will learn the history of the automotive industry and will explore potential weaknesses in modern …

Welcome back

Welcome to Week 2 of Automotive Cyber Security: An Introduction. This week Through this week’s activities you will explore: The history of automotive and levels of automation Automotive standards (CIA, …

What you will need

Please read the following information carefully. If you continue with the program, in upcoming weeks you will need a computer capable of virtualising. Windows and Linux users: In order to …

Case study: Jeep Cherokee attack

The famous Jeep Cherokee attack in 2015 was the turning point for the automotive industry. It was carried out by two security researchers – Charlie Miller and Chris Valasek. They …

CIA and AUTOSAR

There are many reasons why you should protect the information you have stored on your computer, as described below. CIA The communication between vehicle-to-vehicle/vehicle-to-infrastructure needs confidentiality, integrity and availability (CIA). …

Types of automotive cyber attacks

Broadly speaking, there are two types of automotive attacks: physical and remote. Physical attacks To carry out a physical attack, one needs to get physical access to the vehicle. For …

Levels of vehicle automation

There have been many efforts to define various automation levels of vehicles over the years. The public German road agency, Bundesanstalt für Straßenwesen (BASt), published its defined vehicle automation levels …

Check your understanding so far

In your learning log, answer the following questions. This will help you to consolidate your learning, which will provide a good foundation if you choose to continue your learning in …

Sony Pictures Entertainment hack

Your task Read about the Sony Pictures Entertainment hack and then answer the following questions in your learning log. You do not need to share your answers to questions 1–4 …

Technology timeline

Following on from the previous step, the image below demonstrates that multiple generations of technology will co-exist on our roads for many years.