The Attack Surface of a Connected Vehicle

The diagram below outlines some of the attack vectors constituting a connected vehicle’s attack surface. It is through these “vectors” that a malicious actor could attempt to send malware to a connected vehicle. Such malware, if able to bypass the vehicle’s security system(s), may potentially be able to affect the vehicle’s non-safety and safety critical functions.