Skip to main content

Most car thieves who were reported to be stealing one model of the car, which was fitted with the best car security systems, targeted the BMW Company. The advanced technology was being used against the company itself. Radio frequency jammers were being used to block signal that was being used by the electronic key meaning the car was left unlocked by the users.

Most car thieves who were reported to be stealing one model of the car, which was fitted with the best car security systems, targeted the BMW Company. The advanced technology was being used against the company itself. Radio frequency jammers were being used to block signal that was being used by the electronic key meaning the car was left unlocked by the users.

What did the attack do to the organization? (for instance, did the attackers steal credit card numbers, deface websites, etc.?)

The attackers did use the technology to steal hundreds of cars that belonged to this single organization. The cars were of one model meaning that the computer technology that had been used by this company was vulnerable to activities of hackers. The electronic port that would be used to detect the car is what the thieves would plug the device which is used to track the car

Were there other “victims” of the attack besides this organization? (for instance, if credit card numbers are stolen, other victims include the owner of the credit card and the issuing bank)

The thieves did not just stop at jamming the car and taking it away, they would go ahead and gather the car’s unique key, which does correspond, to the identity of the car. There was great danger of not only losing the car but also important user ID on the and this prompted London police to warn owners of the risk that they posed

Who was the attacker? If it isn’t known for certain, write a sentence or two about what is known or speculated. How would you respond if you were a victim in one of the attacks?

The thieves must have been very intelligent individuals with the ability to understand how they could navigate high tech devices fitted in the BMW cars and even copy the ID of the car key to their own car keys. These cannot be categorized as cyber thieves but they make use of the same idea of cyber theft to steal cars. In such case I would only ensure my car security through physical securing by paying an attendant to physically look out for the car when packed in order to ensure that the thieves do not gain access into the car.



Describe the steps you would take

There is only one step that I would take which is to ensure that there is physical mode security to guide the car whenever it is out and packed in a place where the thieves can access it. This is a form a car that has its own internal technology, the only way to secure it is to ensure that no one gain access to it and temper with internal systems.

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

Controversy Associated With Dissociative Disorders

 Assignment: Controversy Associated With Dissociative Disorders The  DSM-5-TR  is a diagnostic tool. It has evolved over the decades, as have the classifications and criteria within its pages. It is used not just for diagnosis, however, but also for billing, access to services, and legal cases. Not all practitioners are in agreement with the content and structure of the  DSM-5-TR , and dissociative disorders are one such area. These disorders can be difficult to distinguish and diagnose. There is also controversy in the field over the legitimacy of certain dissociative disorders, such as dissociative identity disorder, which was formerly called multiple personality disorder. In this Assignment, you will examine the controversy surrounding dissociative disorders. You will also explore clinical, ethical, and legal considerations pertinent to working with patients with these disorders. Photo Credit: Getty Images/Wavebreak Media To Prepare · Review this week’s Learning

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom