Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Ford Adds Security Features To In-Car Wi-Fi Technology

Ford Motor Co. is rolling out the second generation of its Sync mobile connectivity platform this fall with new features and enhanced security. Sync 2.0, as part of a larger offering of connectivity features called MyFordTouch, lets drivers access Wi-Fi hot spots to download RSS feeds and podcasts from the Internet to play on the car's stereo system. The transmission has to be in "Park" before the Internet connection works to prevent people surfing the Web while driving. Besides the connectivity of external devices, the MyFordTouch system offers such features as GPS navigation and interior climate control on an 8-inch touch screen.

Sync 2.0 can also turn the car into its own Wi-Fi hot spot, with a USB dock into which a passenger can plug a wireless broadband device from a mobile carrier such as Verizon Wireless or AT&T Mobility. The upgraded Sync offering, co-developed by Ford and Microsoft, will be available later this year in the 2011 Ford Edge and Lincoln MKX SUVs. It will also be included on the new 2012 Focus line of compacts, says Jim Buczkowski, director of global electrical and electronics systems engineering. Within five years, it should be available on 80 percent of Ford models.

The first Sync systems, introduced in 2008 models, let drivers plug in cell phones or media players and make calls or choose music selections from their library by voice command. Sync is also Bluetooth-enabled so the devices can connect wirelessly. The next-generation Sync adds security features to protect the integrity of the on-board computer system, Buczkowski says. A firewall sits between the Sync system and external devices that plug into it. "There is a processor on the vehicle side and a processor that runs the consumer side, and there is basically a hardware firewall between those two where we pass information back and forth," he says.

Sync 2.0 adds Wi-Fi connectivity but limits what can be downloaded to the car. Following Apple's strategy of preventing unauthorized applications to be loaded onto the iPhone, Ford does not allow unauthorized applications to be downloaded via the Wi-Fi connection or through the Sync firewall. The new Sync security features follow Wireless Access Protocol (WAP) version 2.0 that protects other wireless devices. Ford designed the security features for Sync using some of the same IT experts it uses in-house to protect the company's enterprise IT systems, says Buczkowski. "In terms of downloading software, we use signing technology to ensure that the only thing that can run on the consumer side is a piece of signed software that recognizes that vehicle and is authorized through our systems," Buczkowski says.

Whatever motivation someone might have for hacking a MyFordTouch Sync system, Ford doesn't want to provide any opportunities. "I certainly wouldn't challenge anyone to try to hack a vehicle," Buczkowski says. "The reality is that I think the effort to go into it would be quite a bit of work."  Michael A. Davis, CEO Savid Technologies, Inc. and Informationweek Analytics Analyst says, "Signing applications makes sense, but it really just offloads the risk of a breach to the certificate provider and software reviews. At Blackhat, we saw how certificate authorities haven't done the right things all the time. Let's hope that Ford is using a certificate authority that has done security the right way, and that Ford has implemented the certificate verification properly in their code. Otherwise this choice may come back to haunt them."

Related Reading

More Insights

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers