This video learning course “In-vehicle cybersecurity controls: Trusted environment, system resilience, monitoring and logging (G11_6)is about three more control groups from the area of In-Vehicle Cybersecurity Controls: The Trusted environment, Controls for system resilience and Monitoring and logging.


The first part of the video will focus on trusted environment starting with its objective and then giving you examples. One of these is the process of secure boot and the other is the concept of trust anchors. We will define and explain both in detail.


The following part is about the principle of Trusted environments and how it relates to Cryptography. Then it is about System resilience. The objective of System resilience is explained, before two examples are given: Fail-safe and fail-operational systems and Redundant components. Finally, Monitoring and logging is presented. Here, objectives are pointed out before Intrusion detection systems as an example are revealed.

Course plan

All Videos
G11_6 In-vehicle cybersecurity controls: Trusted environment, system resilience, monitoring and logging