Question

In: Operations Management

Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?

Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?

Solutions

Expert Solution

An autonomous vehicle is a vehicle with ability to steer through the roads and infer traffic signals on its own without the requirement of a driver or any human intervention. However, data or information security threats and privacy issues are a major concern for adoption of these vehicles on a massive scale.

Some of the security threats and privacy issues are outlined below:

  • Manipulation of data packets sent over Electronic Control Units (ECUs) and Controller Area Network (CAN) Bus of these vehicles leading to total external control of the internal display system, the braking system and the locks.
  • Use of CAN Hacking Tool (CHT) by outsiders to have complete access to the communication system (internal) of the vehicles.
  • Use of different attack vectors such as a malicious music file, a modem for long distance diagnostics, digital audio broadcasting station and others so as to have remote vehicular control, position tracking etc.
  • Manipulation of vehicle sensors affecting object perception.
  • Attack on Vehicular Ad Hoc Networks (VANETs) resulting in congestions, accidents and the like.

A business can counter the preceding risks in following ways:

  • Embrace Automotive Cybersecurity Best Practices as laid down by the US automotive industry.
  • Adopt safety guidelines issued by National Highway Traffic Safety Administration (NHTSA) from time to time.
  • Have proper leadership in the area of cybersecurity.
  • Create awareness among the customers and employees regarding cyber attacks through frequent training sessions and webinars .
  • Document all types of cyber attacks taking place in the customer’s vehicles.
  • Put in proper recovery procedures so that the vehicle comes back to its normal status at the earliest.   

Related Solutions

Discuss economic threats to security and how the threats are being addressed.
Discuss economic threats to security and how the threats are being addressed.
Discuss environmental threats to security and how are the threats being addressed.
Discuss environmental threats to security and how are the threats being addressed.
Describe the STRIDE model and give an example of how to mitigate each of the threats.  
Describe the STRIDE model and give an example of how to mitigate each of the threats.  
Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to...
Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to analyze the relationship among risk/opportunity/control. Also consider how these scenarios could be detected by an audit internal or external. Which types of input controls would mitigate the following threats? Posting the amount of a sale to a customer account that does not exist. A Customer entering too many characters into the five-digit zip code while making an online purchase, causing the server to crash....
Should organizations be concerned with internal security threats? Why? (e-business)
Should organizations be concerned with internal security threats? Why? (e-business)
Identify some of the immediate threats and opportunities that today's businesses are facing or could face....
Identify some of the immediate threats and opportunities that today's businesses are facing or could face. Support responses with financial references. How do you forecast the financial reporting requirements for companies shifting in 10 to 20 plus years. Do you think they will be more relaxed or stringent? Are countries across the globe going to standardize their filings into a single system?
Write an ONE-page memo to your boss regarding your views on Autonomous vehicles and how they...
Write an ONE-page memo to your boss regarding your views on Autonomous vehicles and how they can be useful to an employee or your (imaginary) company!
What information would you need to estimate the demand function for autonomous vehicles (self-driving / self-driving)?...
What information would you need to estimate the demand function for autonomous vehicles (self-driving / self-driving)? (You do not need to estimate the demand function, but it is expected that (1) list variables that would determine the demand for this type of vehicle, (2) explain whether demand would increase or decrease in the face of a change in each of these variables and (3) identify how you would measure those variables.
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
How could AIS reduce threats? What information does marketing need to perform its tasks better?
How could AIS reduce threats? What information does marketing need to perform its tasks better?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT