We present an approach to realize end-to-end security which is based on three pillars:
1) Cyber threads are supposed to be prevented as far as possible using proactive security measures (“Prevent”).
2) There is a need to know if the vehicle has been hacked and if yes, how, in real time.
3) Counter measures are initiated as soon as security issues have been detected (“Respond”). We will present strategies to mitigate the damage and immunize the fleet in hours through