This essay focuses on applying brakes to stop a car from moving. sophisticated approach. Organizations will need to develop and implement security policies; train employees about
Organizations, on the other hand, must take a much more sophisticated approach. Organizations will need to develop and implement security policies; train employees about security risks; create an inventory of its IT assets, such as data and hardware; and evaluate potential risks to those assets. With this information, organizations can determine how much risk they are willing to accept and where security safeguards will need to be implemented (Kroenke & Boyle, 2018). Integrated IS The scenario at the beginning of Chapter 10 of the textbook in uCertify discusses some security concerns that can arise when integrating information systems. Let’s take the company, Volkswagen, as an example. In their advertisements, Volkswagen uses an application (app) called Car-Net that will provide Internet access to music, GPS, diagnostics, and other apps from the vehicle’s dash (Volkswagen, n.d.).
So, what are the security risks if Internet access is provided in automobiles? Can cars with this technology create risk? Can hackers access Internet-capable cars and compromise them remotely? The answer is yes. Studies have shown that hackers have the ability to remotely access and sabotage the way a vehicle operates such as applying brakes to stop a car from moving, meddling with the stereo system, and controlling other vehicle functions without having to be anywhere near the car (Peterson, 2015; Rohrer & Hom, 2017; Vanian, 2016). This is possible because computers, or the controller area network (CAN), are used to control many of the car’s operations (e.g., monitoring engine emissions, checking the airbag, sensing when fuel needs to be transferred from the tank to the engine). Self-driving cars are another example of how computers can control the operations of an automobile