Skip to main content

Most car thieves who were reported to be stealing one model of the car, which was fitted with the best car security systems, targeted the BMW Company. The advanced technology was being used against the company itself. Radio frequency jammers were being used to block signal that was being used by the electronic key meaning the car was left unlocked by the users.

Most car thieves who were reported to be stealing one model of the car, which was fitted with the best car security systems, targeted the BMW Company. The advanced technology was being used against the company itself. Radio frequency jammers were being used to block signal that was being used by the electronic key meaning the car was left unlocked by the users.

What did the attack do to the organization? (for instance, did the attackers steal credit card numbers, deface websites, etc.?)

The attackers did use the technology to steal hundreds of cars that belonged to this single organization. The cars were of one model meaning that the computer technology that had been used by this company was vulnerable to activities of hackers. The electronic port that would be used to detect the car is what the thieves would plug the device which is used to track the car

Were there other “victims” of the attack besides this organization? (for instance, if credit card numbers are stolen, other victims include the owner of the credit card and the issuing bank)

The thieves did not just stop at jamming the car and taking it away, they would go ahead and gather the car’s unique key, which does correspond, to the identity of the car. There was great danger of not only losing the car but also important user ID on the and this prompted London police to warn owners of the risk that they posed

Who was the attacker? If it isn’t known for certain, write a sentence or two about what is known or speculated. How would you respond if you were a victim in one of the attacks?

The thieves must have been very intelligent individuals with the ability to understand how they could navigate high tech devices fitted in the BMW cars and even copy the ID of the car key to their own car keys. These cannot be categorized as cyber thieves but they make use of the same idea of cyber theft to steal cars. In such case I would only ensure my car security through physical securing by paying an attendant to physically look out for the car when packed in order to ensure that the thieves do not gain access into the car.



Describe the steps you would take

There is only one step that I would take which is to ensure that there is physical mode security to guide the car whenever it is out and packed in a place where the thieves can access it. This is a form a car that has its own internal technology, the only way to secure it is to ensure that no one gain access to it and temper with internal systems.

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM