IST HW 4
pdf
keyboard_arrow_up
School
Pennsylvania State University *
*We aren’t endorsed by this school
Course
110
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
2
Uploaded by LieutenantComputerWildcat33
Homework 4
Privacy and Security
Reference Lectures: 10 & 11
Objective:
The goal of this project is to familiarize you with how to formulate security and
privacy problems with regard to the interactions between human and technology.
Problem 1.
Read:
How the Internet of Things Got Hacked - https://www.wired.com/2015/12/2015-the-year-
the-internet-of-things-got-hacked/
Based on the Wired article (or other examples that you know), summarize
4 different examples
of how the
Internet of Things
could be hacked and describe
how it could result in harmful
impacts
to the user?
(Describe the examples and impacts
in your own words
– Do not
copy/paste from the article, as that is considered plagiarism)
.
If you use other example, please
list the source explicitly.
Problem 2.
Connected and autonomous vehicle (CAV) technology has the ability to enhance the safety and
effectiveness of mobility. Yet, CAVs also bring emerging challenges to security and privacy –
with a combination of physical and digital threats. With more sensitive information about
vehicles and their occupants collected and shared in an interconnected ecosystem of
manufacturing and service providers, managing risks of those applications will be challenging
due to the different maturity levels of the service providers, lack of visibility and control of data,
and difficulties enforcing a common standard of security control requirements.
Consumers have growing expectations for the connected and available services of CAVs. Still,
they also revealed a consistent lack of trust in how their data will be handled once collected
through vehicles. Like flight data recorders collect information about what happens in a cockpit,
CAVs are capable of absorbing details about what their owners and passengers do inside the
driving cockpit. In one consumer survey conducted in 2019, more than half of the participants
reported concerns where data related to biometrics is collected and shared [1].
To prevent privacy invasive events of CAVs before they happen, it is important to take
proactive
rather than reactive measures. Suppose that you are an engineer who is working on the privacy
design for the driving cockpit of CAVs, in which different types of data will be collected and
shared with the vehicle manufacture, dealer, insurance company, and/or other third parties. For
example, the collected and shared data will include
1) data related to the use of connected services, e.g., smart phone apps;
2) biometric data collected by sensors in the cockpit, e.g., your heart rate;
3) data related to vehicle location, e.g., historical or real time;
4) data related to driving behavior, e.g., braking, acceleration, speed;
5) sensor data related to vehicle status, e.g., brake fluid level.
What are some ideas for making the data collection and use inside and outside the driving
cockpit of CAVs easier for users to understand and control? Please describe
at least two
different ideas
and explain
how each idea will help users understand and control their
privacy when driving CAVs
.
Reference:
[1] Deloitte. 2019. Global automotive consumer study.
Retrieved November 19, 2020 from
https://www2.deloitte.com/content/dam/Deloitte/us/Documents/manufacturing/us-global-
automotive-consumer-study-2019.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help