Cybersecurity Policy Note for Tesla Motors: October 2015 - Landscape of Cybersecurity Threat and Policy Responses - for CEO Elon Musk (original) (raw)
Related papers
Innovation Audit of Tesla Volume 7 Issue2 Feburary 2022
Ala Nasser Alomrani, 2022
This audit study aims to discuss the innovative capabilities of Tesla and address the challenges and opportunities of its key innovative processes. Also included are the learning implications on future management practices and suggestions for organizational improvements.
Cyber Security Measures In Companies
INTERNATIONAL JOURNAL OF ECONOMICS AND STATISTICS , 2018
Proposal of cyber security measures in companie. Cyber security is currently the most wanted and most challenging research discipline that is in constant development. Data reference institutions and recognized to security researchers in 2017 shows that cyber criminals using 'low-tech' 'software were successful in 9 of 10 attacks on various web sites. Most web sites had serious flaws for a period of 150 days or more. Various invasions and fraud have cost the company $ 6.6 billion annually. Based on the research of Oracle java in America is the biggest security risk for desktop computers. According to reports java is installed on 65% of computers, 48% of users did not have the latest patches for Java last year been identified 119 new vulnerabilities in the software. According to research, mobile phone users are increasingly exposed to cyber attacks. Based on analysis of more than 400 000 applications available in the most popular apps and Google applications 14 000, or 3% have security vulnerabilities, including sensitive information such as location, text messages and contacts. In this work will be given to the proposal of measures that could improve the protection of computer systems from unauthorized intrusion.
Energies
With the global energy crisis, increasing demand, and a national-level emphasis on electric vehicles (EVs), numerous innovations are being witnessed throughout the EV industry. EVs are equipped with sensors that maintain a sustainable environment for the betterment of society and enhance human sustainability. However, at the same time, as is the case for any new digital technology, they are susceptible to threats to security and privacy. Recent incidents demonstrate that these sensors have been misused for car and energy theft, financial fraud, data compromise, and have caused severe health and safety problems, amongst other things. To the best of our knowledge, this paper provides a first systematic analysis of EV sustainability, digital technologies that enhance sustainability, their potential cybersecurity threats, and corresponding defense. Firstly, three robust taxonomies have been presented to identify the dangers that can affect long-term sustainability domains, including (1)...
Cybersecurity and Driverless Cars: In Search for a Normative Way of Safety
In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2019
Burgeoning technological advancements have led to a quest for efficiency and haste in almost every area. This includes advanced technologies in transportation. Among such technologies are driverless cars that pose as perfect models for promising technology engines. These cars have received much attention and appreciation from high-tech companies. Studies have shown that they are statistically much safer than traditional vehicles; however, many issues remain which must be corrected to make the driverless car even more safe and reliable. For example, cyber-attacks on driverless cars are a major safety concern. Like any new technology, innovations of autonomous and unmanned vehicles have led to the emergence of threats of cyber-attacks. Hackers see multiple attack surfaces and believe they can penetrate any targeted vehicle system, steal an owner's personal identity information and compromise the vehicles security. Therefore, driverless car industries must put into place an efficient cybersecurity framework which will effectively counter cyber-attacks on driverless cars. In this study, we propose implementing a cybersecurity policy framework that examines potential cybersecurity vulnerabilities against driverless car systems. Threats and attacks exploiting these vulnerabilities are then identified and analyzed. This study investigates current status quo policy, policy objectives, the role of technology, and mitigation strategies for cybersecurity to be used in the development of driverless car systems. Cybersecurity systems are proposed and discussed in the final section.