03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

wide electricity network due to repeated, simultaneous switching on/off of the charging current. It can<br />

also damage the vehicle battery being charged.<br />

All of these risk factors make a good case <strong>for</strong> the EV industry to implement cybersecurity practices that<br />

will protect EV customer data, as well as prevent network hacking and the potential costly loss of<br />

operation. In this era of concerns about compliance and data privacy the EV industry, notably charging<br />

station networks and suppliers, also cannot af<strong>for</strong>d data breaches that will damage customer confidence<br />

and corporate image.<br />

ISO/IEC 27001 Certification<br />

First and <strong>for</strong>emost, ISO cybersecurity certification should be required <strong>for</strong> any business charging station<br />

supplier – whether they be portable chargers or networking applications that drive the charging operation,<br />

or any component that is tied to a network and thus vulnerable to a cyber threat. Compliance with<br />

ISO/IEC 27001 is considered the most important cybersecurity certification worldwide. It demonstrates<br />

that measures <strong>for</strong> ensuring in<strong>for</strong>mation security and data protection have been implemented and are<br />

regularly monitored and reviewed. This proof is essential to developing a secure charging infrastructure<br />

and to protecting data generated by EV users, industry business partners, other supplier partners and<br />

investors.<br />

A Software-First Strategy<br />

Bringing the charging industry into advanced 21 st century cyber defense practices will be challenging.<br />

Many suppliers are “old world” thinkers, the “plugs and cables” hardware companies. The other side of<br />

this are startups who look at software security as an add-on, who've never focused that closely on<br />

software. They tend to underestimate the diverse range of sources of cyber threats that deficient software<br />

security can pose.<br />

Both types need to change their mindset to “software-first.” After all, charging stations have long since<br />

been highly complex, software-controlled systems that are equivalent to IoT nodes. They must cope with<br />

huge volumes of data streams, whether in communication with the vehicle to be charged, in<br />

communication with the electricity network, or in communication with user authentication and usage<br />

billing services.<br />

These are data streams that offer numerous points of attack <strong>for</strong> malicious parties, not to mention the<br />

physical access to the actual devices. U.K. researchers found that, in one case, a simple screwdriver<br />

was all that was needed to access the inner workings of the devices. The issue of vulnerability applies to<br />

popular charging stations and portable chargers with IoT connectivity. What is also notable is that security<br />

research in this area is lagging in spite of the growing adoption of EVs and increase in private and public<br />

charging stations.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 70<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!