Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Computer security
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Automobiles=== {{See also|Autonomous car#Potential disadvantages|Automated driving system#Risks and liabilities|Automotive hacking}} Vehicles are increasingly computerized, with engine timing, [[cruise control]], [[anti-lock brakes]], seat belt tensioners, door locks, [[airbag]]s and [[advanced driver-assistance systems]] on many models. Additionally, [[connected car]]s may use WiFi and Bluetooth to communicate with onboard consumer devices and the cell phone network.<ref name="vox" /> [[Self-driving car]]s are expected to be even more complex. All of these systems carry some security risks, and such issues have gained wide attention.<ref>{{cite report | url=http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf | title=Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk | date=6 February 2015 | access-date=4 November 2016 | url-status=live | archive-url=https://web.archive.org/web/20161109040112/http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf | archive-date=9 November 2016 | df=dmy-all }}</ref><ref>{{cite web|author=<!--Not stated.-->|title=Cybersecurity expert: It will take a 'major event' for companies to take this issue seriously|url=https://www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/|website=AOL.com|date=5 January 2017 |access-date=22 January 2017|language=en|url-status=live|archive-url=https://web.archive.org/web/20170120180918/https://www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/|archive-date=20 January 2017}}</ref><ref>{{cite news|title=The problem with self-driving cars: who controls the code?|url=https://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code|newspaper=The Guardian|access-date=22 January 2017|date=23 December 2015|url-status=live|archive-url=https://web.archive.org/web/20170316152605/https://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code|archive-date=16 March 2017}}</ref> Simple examples of risk include a malicious [[compact disc]] being used as an attack vector,<ref>{{cite conference|url=http://www.autosec.org/pubs/cars-usenixsec2011.pdf|title=Comprehensive Experimental Analyses of Automotive Attack Surfaces|year=2011|conference=SEC'11 Proceedings of the 20th USENIX conference on Security|page=6|publisher=USENIX Association|location=Berkeley, California, US|first1=Stephen|last1=Checkoway|first2=Damon|last2=McCoy|first3=Brian|last3=Kantor|author-link3=Brian Kantor|first4=Danny|last4=Anderson|first5=Hovav|last5=Shacham|first6=Stefan|last6=Savage|author-link6=Stefan Savage|first7=Karl|last7=Koscher|first8=Alexei|last8=Czeskis|first9=Franziska|last9=Roesner|first10=Tadayoshi|last10=Kohno|url-status=live|archive-url=https://web.archive.org/web/20150221064614/http://www.autosec.org/pubs/cars-usenixsec2011.pdf|archive-date=21 February 2015}}</ref> and the car's onboard microphones being used for eavesdropping. However, if access is gained to a car's internal [[controller area network]], the danger is much greater<ref name="vox">{{cite web|url=https://www.vox.com/2015/1/18/7629603/car-hacking-dangers|title=The next frontier of hacking: your car|first=Timothy B.|last=Lee|date=18 January 2015|work=Vox|url-status=live|archive-url=https://web.archive.org/web/20170317212726/http://www.vox.com/2015/1/18/7629603/car-hacking-dangers|archive-date=17 March 2017}}</ref> β and in a widely publicized 2015 test, hackers remotely carjacked a vehicle from 10 miles away and drove it into a ditch.<ref>{{cite magazine|last1=Greenberg|first1=Andy|title=Hackers Remotely Kill a Jeep on the Highway{{snd}}With Me in It|magazine=Wired|url=https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/|access-date=22 January 2017|url-status=live|archive-url=https://web.archive.org/web/20170119103855/https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/|archive-date=19 January 2017|date=21 July 2015}}</ref><ref>{{cite news|title=Hackers take control of car, drive it into a ditch|url=https://www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html|newspaper=The Independent|access-date=22 January 2017|date=22 July 2015|url-status=live|archive-url=https://web.archive.org/web/20170202061247/http://www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html|archive-date=2 February 2017}}</ref> Manufacturers are reacting in numerous ways, with [[Tesla Motors|Tesla]] in 2016 pushing out some security fixes ''over the air'' into its cars' computer systems.<ref>{{cite news|title=Tesla fixes software bug that allowed Chinese hackers to control car remotely|url=https://www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/|newspaper=The Telegraph|access-date=22 January 2017|url-status=live|archive-url=https://web.archive.org/web/20170202014932/http://www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/|archive-date=2 February 2017|date=21 September 2016|author=<!--Not stated.-->}}</ref> In the area of autonomous vehicles, in September 2016 the [[United States Department of Transportation]] announced some initial safety standards, and called for states to come up with uniform policies.<ref>{{cite news|last1=Kang|first1=Cecilia|title=Self-Driving Cars Gain Powerful Ally: The Government|url=https://www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html|newspaper=The New York Times|access-date=22 January 2017|date=19 September 2016|url-status=live|archive-url=https://web.archive.org/web/20170214045032/https://www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0|archive-date=14 February 2017}}</ref><ref>{{cite web|title=Federal Automated Vehicles Policy|url=https://www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf|access-date=22 January 2017|url-status=live|archive-url=https://web.archive.org/web/20170121161404/https://www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf|archive-date=21 January 2017}}</ref><ref>{{Cite web |title=Vehicle Cybersecurity |url=https://www.nhtsa.gov/technology-innovation/vehicle-cybersecurity |access-date=2022-11-25 |website=nhtsa.gov |language=en}}</ref> Additionally, e-Drivers' licenses are being developed using the same technology. For example, Mexico's licensing authority (ICV) has used a smart card platform to issue the first e-Drivers' licenses to the city of [[Monterrey]], in the state of [[Nuevo LeΓ³n]].<ref>{{cite web | title=Thales supplies smart driver license to 4 states in Mexico | website=Thales Group | url=https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/customer-cases/mexico }}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Computer security
(section)
Add topic