Abstract
Automobiles have a cybersecurity risk. The vulnerabilities
stem from the abundance of software,
computers, and networks that have been designed
into automobiles beginning several decades ago. Published
experimental results and real-world incidents
substantiate the existence of vulnerabilities in today’s
commercial automotive fleet. Like the vulnerabilities
of the Internet, these automobile-based ones are likely
to persist. Security standards, federal motor vehicle
regulations, and a new patching regimen by car owners
will be needed to help mitigate the risk. Until then,
it is not hard to imagine a day when a portion of the
American automobile fleet is taken over by nefarious
actors.
stem from the abundance of software,
computers, and networks that have been designed
into automobiles beginning several decades ago. Published
experimental results and real-world incidents
substantiate the existence of vulnerabilities in today’s
commercial automotive fleet. Like the vulnerabilities
of the Internet, these automobile-based ones are likely
to persist. Security standards, federal motor vehicle
regulations, and a new patching regimen by car owners
will be needed to help mitigate the risk. Until then,
it is not hard to imagine a day when a portion of the
American automobile fleet is taken over by nefarious
actors.
Original language | English (US) |
---|---|
Title of host publication | Cyberspace: Malevolent Actors, Criminal Opportunities, and Strategic Competition |
Editors | Phil Williams, Dighton Fiddner |
Place of Publication | Carlisle, PA |
Publisher | U.S. Army War College |
Chapter | 11 |
Pages | 369-388 |
Number of pages | 20 |
ISBN (Print) | 978-1537477589 |
State | Published - Aug 1 2016 |