Page 26 - Cyber Defense eMagazine - September 2017
P. 26

Closing

               The vehicle has a great amount of respect for the vehicle. The owner and user do not want the
               vehicle to be vandalized and stolen. WHen the owner purchased the vehicle they bargained for,
               the person was not expecting the connectivity and application to be insecure and open to a form
               of vandalism. The level of insecurity allows for the vehicle to be attacked from many points. This
               could have been remediated with better planning or coding.


               Resources
               Greenberg,  A.  (2017,  February  16).  Android  phone  hacks  could  unlock  millions  of  cars.
               Retrieved from https://www.wired.com/2017/02/hacked-android-phones-unlock-millions-cars/

               Kuzin,  M., & Chebyshev, V. (2017, February 16). Mobile apps and stealing a connected car.
               Retrieved  from  https://securelist.com/analysis/publications/77576/mobile-apps-and-stealing-a-
               connected-car

               Zorz, Z. (2017, February 17). Insecure car-controllering android apps are a boon for car thieves.
               Retrieved  from  https://www.helpnetsecurity.com/2017/02/17/insecure-car-controlling-android-
               aps/



               About the Author

                                             Charles Parker, II began coding in the 1980’s. Presently CP is an
                                             Cybersecurity  Lab  Engineer  at  a  Tier  One  supplier  to  the
                                             automobile industry.

                                             CP is presently completing the PhD (Information Assurance and
                                             Security) with completing the dissertation. CP’s interests include
                                             cryptography, SCADA, and securing communication channels.

                                             He  has  presented  at  regional  InfoSec  conferences.  Charles
                                             Parker,  II  can  be  reached  online  at  [email protected]
                                             and InfoSecPirate (Twitter).

















                    26   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   21   22   23   24   25   26   27   28   29   30   31