Two examples of embedded system hacking that have gotten lots of press coverage are hacking aircraft entertainment systems, , potentially to gain access to flight systems, and hacking automobile control systems, ‘Hackers remotely kill a Jeep on the highway,’ Andy Greenberg, Wired,
For this module your assignment is to review the articles linked above and write a short 3 to 4 page paper answering the following questions. In answering these questions refer to the OWASP Internet of Things Top ten things to avoid when building, deploying, or managing IoT systems, (select the ‘Seek and Understand’ tab) and IoT Vulnerabilitites Project, .
- Summarize the two attacks, what capabilities did the attackers gain on the attacked systems?
- What attack vectors did the hackers use in the two attacks?
- What security controls would you recommend to system designers to mitigate these vulnerabilities?
- Format: Microsoft Word
- Font: Arial, 12-Point, Double-Space (or equivalent)
- Citation Style: APA (The point is to use a style that makes your document readable and give credit to the sources you used.)
- Coversheet
- List of References Page.
- Proofread – Edit for spelling, grammar, punctuation, etc.
- Use only course text, professional journal articles, or other reputable resources.
Paper Requirements:
Leave a Reply
You must be logged in to post a comment.