While our focus in the course is on threats to information systems, this questio
ID: 3855323 • Letter: W
Question
While our focus in the course is on threats to information systems, this question focuses on the concept of threats, vulnerabilities, and controls as applied to other kinds of systems. Select two examples of threats to automobiles for which auto manufactures have instituted controls. Describe the vulnerabilities for which the controls were created and assess the effectiveness of these controls giving the justification for your assessment. Your answer does not need to address information security but you need to demonstrate your understanding of the terms: threat, vulnerability, and control. (Note: specific answers to this question are not in the assigned reading material.)
Explanation / Answer
The main vulnerability today in the automobile industry is that the hacking of the car.This process become convinient due to presence of phones or GPS system in our vehicle.
The above means that we can remotely access our car. We can gain control over the brake, throttle and steering.
We can drive these out from the control of the driver and access them remotely and we can unlock the car too.This hacking is mainly done due to the software hacking in the automobiles.
However hacking of all types of car is not possible since the security design of each one may vary accordingly.
Here the control over the car is accessed remotely which is the major threat of hacking the automobile.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.