Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Automobiles=== {{See also|Autonomous car#Potential disadvantages|Automated driving system#Risks and liabilities|Automotive hacking}} Vehicles are increasingly computerized, with engine timing, [[cruise control]], [[anti-lock brakes]], seat belt tensioners, door locks, [[airbag]]s and [[advanced driver-assistance systems]] on many models. Additionally, [[connected car]]s may use WiFi and Bluetooth to communicate with onboard consumer devices and the cell phone network.<ref name="vox" /> [[Self-driving car]]s are expected to be even more complex. All of these systems carry some security risks, and such issues have gained wide attention.<ref>{{cite report | url=http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf | title=Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk | date=6 February 2015 | access-date=4 November 2016 | url-status=live | archive-url=https://web.archive.org/web/20161109040112/http://www.markey.senate.gov/imo/media/doc/2015-02-06_MarkeyReport-Tracking_Hacking_CarSecurity%202.pdf | archive-date=9 November 2016 | df=dmy-all }}</ref><ref>{{cite web|author=<!--Not stated.-->|title=Cybersecurity expert: It will take a 'major event' for companies to take this issue seriously|url=https://www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/|website=AOL.com|date=5 January 2017 |access-date=22 January 2017|language=en|url-status=live|archive-url=https://web.archive.org/web/20170120180918/https://www.aol.com/article/news/2016/12/26/expert-warns-major-event-will-need-to-happen-for-cybersecurity/21632630/|archive-date=20 January 2017}}</ref><ref>{{cite news|title=The problem with self-driving cars: who controls the code?|url=https://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code|newspaper=The Guardian|access-date=22 January 2017|date=23 December 2015|url-status=live|archive-url=https://web.archive.org/web/20170316152605/https://www.theguardian.com/technology/2015/dec/23/the-problem-with-self-driving-cars-who-controls-the-code|archive-date=16 March 2017}}</ref> Simple examples of risk include a malicious [[compact disc]] being used as an attack vector,<ref>{{cite conference|url=http://www.autosec.org/pubs/cars-usenixsec2011.pdf|title=Comprehensive Experimental Analyses of Automotive Attack Surfaces|year=2011|conference=SEC'11 Proceedings of the 20th USENIX conference on Security|page=6|publisher=USENIX Association|location=Berkeley, California, US|first1=Stephen|last1=Checkoway|first2=Damon|last2=McCoy|first3=Brian|last3=Kantor|author-link3=Brian Kantor|first4=Danny|last4=Anderson|first5=Hovav|last5=Shacham|first6=Stefan|last6=Savage|author-link6=Stefan Savage|first7=Karl|last7=Koscher|first8=Alexei|last8=Czeskis|first9=Franziska|last9=Roesner|first10=Tadayoshi|last10=Kohno|url-status=live|archive-url=https://web.archive.org/web/20150221064614/http://www.autosec.org/pubs/cars-usenixsec2011.pdf|archive-date=21 February 2015}}</ref> and the car's onboard microphones being used for eavesdropping. However, if access is gained to a car's internal [[controller area network]], the danger is much greater<ref name="vox">{{cite web|url=https://www.vox.com/2015/1/18/7629603/car-hacking-dangers|title=The next frontier of hacking: your car|first=Timothy B.|last=Lee|date=18 January 2015|work=Vox|url-status=live|archive-url=https://web.archive.org/web/20170317212726/http://www.vox.com/2015/1/18/7629603/car-hacking-dangers|archive-date=17 March 2017}}</ref> β and in a widely publicized 2015 test, hackers remotely carjacked a vehicle from 10 miles away and drove it into a ditch.<ref>{{cite magazine|last1=Greenberg|first1=Andy|title=Hackers Remotely Kill a Jeep on the Highway{{snd}}With Me in It|magazine=Wired|url=https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/|access-date=22 January 2017|url-status=live|archive-url=https://web.archive.org/web/20170119103855/https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/|archive-date=19 January 2017|date=21 July 2015}}</ref><ref>{{cite news|title=Hackers take control of car, drive it into a ditch|url=https://www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html|newspaper=The Independent|access-date=22 January 2017|date=22 July 2015|url-status=live|archive-url=https://web.archive.org/web/20170202061247/http://www.independent.co.uk/news/science/hackers-remotely-carjack-jeep-from-10-miles-away-and-drive-it-into-ditch-10406554.html|archive-date=2 February 2017}}</ref> Manufacturers are reacting in numerous ways, with [[Tesla Motors|Tesla]] in 2016 pushing out some security fixes ''over the air'' into its cars' computer systems.<ref>{{cite news|title=Tesla fixes software bug that allowed Chinese hackers to control car remotely|url=https://www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/|newspaper=The Telegraph|access-date=22 January 2017|url-status=live|archive-url=https://web.archive.org/web/20170202014932/http://www.telegraph.co.uk/technology/2016/09/21/tesla-fixes-software-bug-that-allowed-chinese-hackers-to-control/|archive-date=2 February 2017|date=21 September 2016|author=<!--Not stated.-->}}</ref> In the area of autonomous vehicles, in September 2016 the [[United States Department of Transportation]] announced some initial safety standards, and called for states to come up with uniform policies.<ref>{{cite news|last1=Kang|first1=Cecilia|title=Self-Driving Cars Gain Powerful Ally: The Government|url=https://www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html|newspaper=The New York Times|access-date=22 January 2017|date=19 September 2016|url-status=live|archive-url=https://web.archive.org/web/20170214045032/https://www.nytimes.com/2016/09/20/technology/self-driving-cars-guidelines.html?_r=0|archive-date=14 February 2017}}</ref><ref>{{cite web|title=Federal Automated Vehicles Policy|url=https://www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf|access-date=22 January 2017|url-status=live|archive-url=https://web.archive.org/web/20170121161404/https://www.transportation.gov/sites/dot.gov/files/docs/AV%20policy%20guidance%20PDF.pdf|archive-date=21 January 2017}}</ref><ref>{{Cite web |title=Vehicle Cybersecurity |url=https://www.nhtsa.gov/technology-innovation/vehicle-cybersecurity |access-date=2022-11-25 |website=nhtsa.gov |language=en}}</ref> Additionally, e-Drivers' licenses are being developed using the same technology. For example, Mexico's licensing authority (ICV) has used a smart card platform to issue the first e-Drivers' licenses to the city of [[Monterrey]], in the state of [[Nuevo LeΓ³n]].<ref>{{cite web | title=Thales supplies smart driver license to 4 states in Mexico | website=Thales Group | url=https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/customer-cases/mexico }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)