Fundamentals of Cybersecurity

Fundamentals of Cybersecurity

1. Overview of Cybersecurity 1.1 Definition Information Security: The technical and managerial security measures established and adopted for data processing systems, protecting computer hardware, software, and data from accidental and malicious destruction, alteration, and disclosure. Cybersecurity: Prevent unauthorized users from accessing information Prevent unauthorized attempts to destroy or modify information 1.2 Characteristics of Information Security … Read more

Functional Safety Left, Information Security Right: How Automotive SoCs Win the Smart Car Safety Upgrade Battle

Functional Safety Left, Information Security Right: How Automotive SoCs Win the Smart Car Safety Upgrade Battle

Thanks to “Gaogong Intelligent Automotive” for their attention to Synopsys. Currently, the global automotive industry is undergoing a major transformation. With the continuous increase in innovative applications in areas such as ADAS/autonomous driving and V2X, intelligent connected vehicles are becoming heavy-duty computers equipped with a central processing engine. Behind this, the connectivity and complexity of … Read more

Strategies for Industrial Control System Cybersecurity

Strategies for Industrial Control System Cybersecurity

In today’s rapidly developing digital age, the security of Industrial Control Systems (ICS) has become an important issue that enterprises cannot ignore. With technological advancements and increasingly cunning cyberattack methods, ensuring the secure operation of ICS is more urgent than ever. Therefore, implementing effective countermeasures is not only a necessary measure to protect corporate assets … Read more

Industrial Control System Information Security Standardization

Industrial Control System Information Security Standardization

Introduction On May 20, 2021, the “2021 Industrial Safety Conference (ISSC2021)” was held in Beijing, hosted by the Industrial Control System Information Security Industry Alliance, supported by the China Automation Society, the Smart Manufacturing Promotion Cooperation Innovation Alliance, the Edge Computing Industry Alliance, and the China Instrument and Meter Industry Association. Over 160 guests from … Read more

Industrial Control System Information Security Insights from NSFOCUS

Industrial Control System Information Security Insights from NSFOCUS

Time Wednesday, July 20, 2016 Location Hangzhou Zhong’an Holiday Hotel The water glimmers when the sun shines, and the mountains appear mysterious in the rain. In mid-summer, the drizzling rain in Hangzhou transformed into clear skies with the arrival of the G20 summit and the Industrial Control System Information Security Summit. On July 20, NSFOCUS … Read more

Explaining Embedded Security in Simple Terms (2)

Explaining Embedded Security in Simple Terms (2)

(Image from Wikipedia entry Caerlaverock Castle: https://en.wikipedia.org/wiki/Caerlaverock_Castle ) In the previous article, we introduced the difference between the two concepts of “security” in Chinese, namely Security and Safety, in embedded systems—Safety is generally understood as “functional safety,” while Security refers to “information security”—to distinguish it from the more familiar “cyber information security.” In the following … Read more

Fault Injection in Diagnostic Protocols

Fault Injection in Diagnostic Protocols

Click the blue text above to follow us / Technical Exchange Group/ Add WeChat 15021948198 to apply for membership to download PPT & join the automotive network information security, testing evaluation, automotive electronics, autonomous driving technology exchange group, recruitment job-seeking group, investment and financing cooperation group… Related Articles [Grab Your Spot] Countdown! The 8th Information … Read more

Beware of Malicious Software Infiltration! Adding a ‘Safety Lock’ to Children’s Smartwatches

Beware of Malicious Software Infiltration! Adding a 'Safety Lock' to Children's Smartwatches

In recent years, children’s smartwatches have become popular among parents and children. However, due to the unique characteristics of child users, the underlying concerns have also attracted widespread attention. Recently, the “Guidelines for the Protection of Personal Information and Rights of Children’s Smartwatches” formulated by the China Cybersecurity Industry Alliance have officially come into effect. … Read more

Beware of Malicious Software Infiltration! Adding a ‘Safety Lock’ to Children’s Smartwatches

Beware of Malicious Software Infiltration! Adding a 'Safety Lock' to Children's Smartwatches

In recent years, children’s smartwatches have become popular among parents and children. However, due to the unique nature of child users, the underlying concerns have also attracted widespread attention. Recently, the alliance technical specification formulated by the China Cybersecurity Industry Alliance, the “Guidelines for the Protection of Personal Information and Rights of Children’s Smartwatches,” has … Read more

Current Status of Automotive ECU Technology

Current Status of Automotive ECU Technology

If we compare the engine to the “heart” of a car, then the car’s “brain” should be the ECU. What is an ECU? How does it work? This article provides a detailed analysis.What is an ECU? ECU has two full names: Engine Control Unit and Electronic Control Unit. It is easy to see that the … Read more