This document discusses automotive security and connected vehicles. It covers the attack surface of connected vehicles, common bus protocols like CAN and OBD-II, vehicle networks, and tools for analyzing vehicle communication. The document uses the example of the 2015 Jeep hack to illustrate the challenges of exploiting vulnerabilities. It recommends best practices from Auto-ISAC and the need for lightweight endpoint security solutions to protect automobiles similarly to other internet-connected devices.