search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Standards & Regulations


provide a structured framework for managing cyber risks. This would cover key security fundamentals such as risk identifi cation, assessment and incident detection. The CMCS forms the fi rst line of defence against hackers, blocking unauthorised access to elements such as a vehicle’s infotainment system and charging ports and mitigating potentially devastating DoS attacks.


However, there is still a way to go before this important regulation becomes widespread. The expectation remains that UN Regulation 155 will become a global stipulation for vehicle development in other markets, but key players like the United States and China are not yet signatories. In terms of EVSE, other directives such as


in the European Union encompass the equipment used to charge vehicles. As a result, manufacturers and operators of EVSE are mandated to follow stricter measures and policies for incident handling, network security, and vulnerability management. Failure to comply with these requirements can result in heavy fi nes of up to €10million depending on the severity of the issue, ensuring the implementation of robust security measures is placed at the top of the agenda for businesses within the sector.


NIS 2 (8)


The importance of security standards


Of course, the adoption of the latest computing security standards goes a long way when it comes to securing automotive vehicles. Organizations such as the Trusted Computing Group (TCG) are constantly devising new standards, specifi cations and solutions to ensure a strong line of defence for users and manufacturers alike, providing the key security building blocks that ensure alignment with regulations like UN Regulation 155. This includes a secure role and rights management system which instils the concept of trusted computing within a sector that deeply requires it. Revolving around the use of a hardware Root-of-Trust known as the Trusted Platform Module (TPM) as a trust anchor, the system is designed to create and maintain a secure environment for the storage and processing of potentially sensitive data within the vehicle. The keys used to enable key vehicular features are stored within the TPM, with usage bonded to an access policy system called ‘enhanced authorization’. This process means hardware-level security can be guaranteed while maintaining a high level of flexibility for the manufacturer.


Essential elements of feature activation, such as data confi dentiality and Intellectual Property (IP) protection, are examined to provide functional security requirements that ensure adequate vehicle security. The system is able to map vehicle requirements to the inherent commands and features found within the TPM 2.0. In turn, this provides detailed access policy concepts directly to the vehicle. These are requirements which specify how access to the vehicle is managed, and who has the permission to do so.


Trusted computing for vehicles For greater EV protection, standards organizations are working together to develop an end-to-end security reference architecture for the EVSE ecosystem.


References: 1


2 3 4


Historically, there has been a lack of an industry framework for these applications, and while options like the Industrial Internet Security Framework (IISF) hold promise, there is still a way to go in this field. However, the fact remains that pairing the latest international regulations on vehicle security with the work being done by standards organizations is the best option for manufacturers and users looking to tighten their defences against attackers. The digitalization of this sector isn’t going to stop anytime soon, and will only bring further attacks. It’s important, then, that businesses remain proactive and keep up-to-date with the latest standards and specifications available.


https://trustedcomputinggroup.org/


https://www.bloomberg.com/news/features/2023-02-13/are-car-touch-screens-getting-out-of-control https://content.naic.org/insurance-topics/autonomous-vehicles https://www.wired.com/story/kia-web-vulnerability-vehicle-hack-track/


up-19-of-all-new-cars-sold-in-2024/ 5


6


cyber-security 7


8


https://www.rac.co.uk/drive/news/electric-vehicles-news/more-than-1.3m-evs-on-uk-roads-and-make- https://electrek.co/2023/01/09/heres-how-many-ev-chargers-the-us-has-and-how-many-it-needs


https://unece.org/transport/documents/2021/03/standards/un-regulation-no-155-cyber-security-and- https://www.iso.org/standard/70918.html


https://www.nis-2-directive.com/


+44 (0) 1403 790 661


WE CONNECT TECHNOLOGY www.fclane.com


sales@fclane.com


VERSATILE AND RUGGED


COMPETITIVE PRICING


UK DESIGN AND MANUFACTURE


9 SHELL SIZES AND 25 SHELL STYLES


GOLD PLATED, SOLDER OR PCB CONTACTS


DEFENCE, INDUSTRIAL, MEDICAL AND TEST


EXTENSIVE RANGE OF PART NUMBERS AND FINISHES


MIL-DTL-26482 SERIES 1 DERIVED LMH RANGE CIRCULAR CONNECTORS


www.cieonline.co.uk


ON-LINE SHOP AND TECHNICAL SUPPORT


Components in Electronics June 2025 37


24HR DELIVERY


NO MOQ


NO MOV


AVAILABLE FROM STOCK


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56