IST HW 4

pdf

School

Pennsylvania State University *

*We aren’t endorsed by this school

Course

110

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

2

Uploaded by LieutenantComputerWildcat33

Report
Homework 4 Privacy and Security Reference Lectures: 10 & 11 Objective: The goal of this project is to familiarize you with how to formulate security and privacy problems with regard to the interactions between human and technology. Problem 1. Read: How the Internet of Things Got Hacked - https://www.wired.com/2015/12/2015-the-year- the-internet-of-things-got-hacked/ Based on the Wired article (or other examples that you know), summarize 4 different examples of how the Internet of Things could be hacked and describe how it could result in harmful impacts to the user? (Describe the examples and impacts in your own words – Do not copy/paste from the article, as that is considered plagiarism) . If you use other example, please list the source explicitly.
Problem 2. Connected and autonomous vehicle (CAV) technology has the ability to enhance the safety and effectiveness of mobility. Yet, CAVs also bring emerging challenges to security and privacy – with a combination of physical and digital threats. With more sensitive information about vehicles and their occupants collected and shared in an interconnected ecosystem of manufacturing and service providers, managing risks of those applications will be challenging due to the different maturity levels of the service providers, lack of visibility and control of data, and difficulties enforcing a common standard of security control requirements. Consumers have growing expectations for the connected and available services of CAVs. Still, they also revealed a consistent lack of trust in how their data will be handled once collected through vehicles. Like flight data recorders collect information about what happens in a cockpit, CAVs are capable of absorbing details about what their owners and passengers do inside the driving cockpit. In one consumer survey conducted in 2019, more than half of the participants reported concerns where data related to biometrics is collected and shared [1]. To prevent privacy invasive events of CAVs before they happen, it is important to take proactive rather than reactive measures. Suppose that you are an engineer who is working on the privacy design for the driving cockpit of CAVs, in which different types of data will be collected and shared with the vehicle manufacture, dealer, insurance company, and/or other third parties. For example, the collected and shared data will include 1) data related to the use of connected services, e.g., smart phone apps; 2) biometric data collected by sensors in the cockpit, e.g., your heart rate; 3) data related to vehicle location, e.g., historical or real time; 4) data related to driving behavior, e.g., braking, acceleration, speed; 5) sensor data related to vehicle status, e.g., brake fluid level. What are some ideas for making the data collection and use inside and outside the driving cockpit of CAVs easier for users to understand and control? Please describe at least two different ideas and explain how each idea will help users understand and control their privacy when driving CAVs . Reference: [1] Deloitte. 2019. Global automotive consumer study. Retrieved November 19, 2020 from https://www2.deloitte.com/content/dam/Deloitte/us/Documents/manufacturing/us-global- automotive-consumer-study-2019.pdf
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help