Preview

ISSC361 FinalProject

Better Essays
Open Document
Open Document
1124 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISSC361 FinalProject
Automobile Computers and their Vulnerabilities

Automobile Computers and their Vulnerabilities
Manufacturers are incorporating more and more computers into automobiles. This causes a new type of threat to today’s society. Challenges come to protecting these systems and the people that are driving the vehicles.
Challenges with Computers Computers are a part of everyone’s daily lives and are even a part of everyday use items. Automobiles today are primarily made up of computer systems. Each mechanical device that is in a vehicle today is controlled by a computer system, whether it is entirely controlled or just monitored by a computer system, but it relies on a computer to correctly function. This now causes an issue with the security of today’s vehicles. With each device in a vehicle using a computer there are many ways for a hacker to gain access to the vital components of the vehicle. It is estimated that a modern luxury car comprises of more than seventy Electronic Control Units (ECUs) in each vehicle today. Of these seventy different ECUs they are all connected via a network within the vehicle. This network is known as the CAN or Controller Area Network. “This interconnection permits complex safety and convenience features such as pre-tensioning of seat-belts when a crash is predicted and automatically varying radio volume as a function of speed.” (Checkoway, et al, 2011) How does this create a security vulnerability is probably a question that comes to mind. These complex networks of interconnected computers are easily accessed through the diagnostics port of a vehicle. With the right software and allowed time to a vehicle any one can hack a vehicle. By installing a malicious code into the vehicle’s computer through the diagnostics port hackers can take control of the vehicle’s brake system, engine control, and the locking system of the automobile. Another access method to the computer systems of the vehicle is through the

You May Also Find These Documents Helpful

  • Better Essays

    Is3350 Final Exam

    • 1039 Words
    • 5 Pages

    Rationale: The client should focus on a distant object in order to promote pupil dilation. The ophthalmoscope should be set on the 0 lens to…

    • 1039 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20)…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Bmgt365 FinalProject

    • 2673 Words
    • 8 Pages

    Llopis, G. (2013). 8 Traps Successful Leaders Must Avoid. Forbes. Retrieved December 10th, 2014 from…

    • 2673 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Huffman Trucking

    • 4242 Words
    • 17 Pages

    An increasing growth of the Huffman network infrastructure and architecture requires review of existing network security hardware and software/application resources. This review will help to determine requirements for new systems and possible upgrades to protect Huffman Information Systems from exploitation and ensure security features are in place to combat increasing threats to customer information bases, industry information, technology and assets, and existing and increasing identity theft threats. Negative consequences of neglecting these information security issues can be measured in predictable loss of revenue due to identity theft, network sabotage, legal and liability fees, and commercial espionage.…

    • 4242 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Aircraft Solution

    • 1151 Words
    • 5 Pages

    The following report is a security assessment on Aircraft Solutions
and the primary objective in this assessment is to identify the existence of vulnerabilities present 
within the global context of Aircraft Solutions’ operations. An evaluation of the associated 
threats will be deduced, accompanied by the exposed weaknesses. This will be followed by an
analysis of the degree of risk present. Finally, there will be a focus on the consideration of the
 consequences resulting from revealing of potential threats.

 Assessment 
Hardware and policy will be the main focus of this investigation. It will be narrowed down more 
to hardware issues.…

    • 1151 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or business computer, it is very important to get some type of security protection. There are a lot of options out there in terms of what brand and what level of security an individual is looking for. The best option to protect a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to worry about is identity theft. Identity theft problems can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or annoyances to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data contained protected within the computer is important.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)…

    • 505 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Many popular name brand car companies expect driverless cars to be on the market by 2020, and for all cars to be driverless by 2025. The idea of a car that can drive, navigate, and park itself was an idea only to be heard of in the movies, but now it is in it’s final stages of testing. The self driving car is currently in production of prototypes to be demonstrated to the public by popular name brand companies like: Tesla, Mercedes Benz, BMW, and more. With the introduction of a driverless car, the lives of many drivers will become much easier and create a positive effect.. The self driving car consists of an advanced programmed computer, as well as many sensors that help guide and calculate smart decisions for the car to make. A car that drives…

    • 1454 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Week 1 Case Study

    • 1259 Words
    • 4 Pages

    With the increased and wide spread use of computers in the military, a need for procedures we due. These procedure recommendations revolved around technique and security which had not previously existed on such a broad scale. Even with the large scale of operations, there still needed to be some privacy around the system and data that was shared or accessed. Through this study, batch, multiprogramming, and time-shared processing were all recommended for different levels of access and control. Three types of threats to system security were identified. These are accidental access of data, deliberate access of data, and a physical attack on the system. There were recommended safeguards to protect from all three vulnerabilities. This protection had to be identified and secured by the system designer so not gaps were missed. These gaps could be in the software, hardware, communication of information and general lack of organization or the organization itself. There were recommended…

    • 1259 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Self-Driving Cars

    • 3778 Words
    • 16 Pages

    CNN report, “Could Hackers Seize Control Of Our Nation’s Cars?” Driverless Car HQ, 2012, Web.…

    • 3778 Words
    • 16 Pages
    Better Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the transportation industry such as airport, train, or ships there are many vulnerabilities that can be faced if security measures are not foreseen. These industries can be victims of sabotage, espionage, or lack of security process which would result in the industry loss of product. Sabotage such as terrorism will exist in transportation industries if the operations of the merchandise are not carried out to protocol. Espionage from competitor transportation industries can leak the company’s operations and be a risk for theft. Employee theft can be just as detrimental to the industry as outside theft. Some of the vulnerabilities and countermeasure will be mentioned in this review of different transportation industries.…

    • 922 Words
    • 4 Pages
    Good Essays