Conestoga College - Car Hacking Security Outline and Article Summary
VerifiedAdded on 2020/03/16
|5
|771
|102
Homework Assignment
AI Summary
This assignment presents an analysis of an article titled "Your Car Could Learn to Recognize Hackers" by Will Knight, focusing on the growing threat of car hacking. The assignment begins with an outline summarizing the article's key points, including the vulnerability of modern cars to hacking, the efforts being made by automotive companies to improve security, and various security measures such as strong passwords, firewalls, and antivirus software. The article review highlights the author's main idea, which is to raise awareness among car manufacturers and readers about the risks associated with car hacking, including potential misuse for criminal activities. The assignment concludes with the author's reference list using APA format.

Running head: CAR HACKING SECURITY
English College Writing
Name of the Student:
Name of 6the University:
Author’s Note:
English College Writing
Name of the Student:
Name of 6the University:
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2CAR HACKING SECURITY
Original Title of the Article: _Your Car Could Lear to Recognize
Hackers__________________________________________
Part of paragraph
Create an outline version of the article, in your own words, to
ensure you don’t miss important points
Topic
(Identify author, article
name, and topic.)
Introducing new mechanisms for cars to recognize Hackers
By Will Knight, June21, 2016
Supporting idea (1)
Making efforts to find ways and means of protecting cars from
hackers.
Explanation, fact,
example
The modern day scenario says that the cars are very much
vulnerable to hackers (Bacchus, Coronado & Gutierrez
2014). It can so happen that the cars become very much
vulnerable to hacking. But at the same time, it has also been
said at many conferences that the modern day sophisticated
ways in which the vehicles are designed make it easier to
create the build in securities in the cars.
Explanation, fact,
example
This is what most of the modern day automotive companies
are trying today. As soon as there is the arrival of a new
vehicle in the market, efforts are to be made to protect it
from the malicious attacks.
Supporting idea (2) There are different ways that the car makers can create security
Original Title of the Article: _Your Car Could Lear to Recognize
Hackers__________________________________________
Part of paragraph
Create an outline version of the article, in your own words, to
ensure you don’t miss important points
Topic
(Identify author, article
name, and topic.)
Introducing new mechanisms for cars to recognize Hackers
By Will Knight, June21, 2016
Supporting idea (1)
Making efforts to find ways and means of protecting cars from
hackers.
Explanation, fact,
example
The modern day scenario says that the cars are very much
vulnerable to hackers (Bacchus, Coronado & Gutierrez
2014). It can so happen that the cars become very much
vulnerable to hacking. But at the same time, it has also been
said at many conferences that the modern day sophisticated
ways in which the vehicles are designed make it easier to
create the build in securities in the cars.
Explanation, fact,
example
This is what most of the modern day automotive companies
are trying today. As soon as there is the arrival of a new
vehicle in the market, efforts are to be made to protect it
from the malicious attacks.
Supporting idea (2) There are different ways that the car makers can create security

3CAR HACKING SECURITY
(There are only two slots
for supporting ideas;
however there may be
more points to be
addressed. Add or delete
entries as required.)
within the vehicles. It is also said by one of the car security experts
Corey Thuen, that one of the easiest way in which these
vulnerabilities in the cars can be minimized by the engineers is by
avoiding the usage of deafly passwords, avoiding the installation of
simple backdoors (Lim et al .,2016, November).
Explanation, fact,
example
There are also many security companies and carmakers who
are trying their level best to implement security from scratch.
New designs can be made like the automatic computer
system that can build up the protections like firewalls in
order to detect and block the suspicious traffic. Antivirus
software can also be used to detect the presence of a
malicious code.
Conclusion
Car hacking is one of increasing problem of the modern day
scenario. However, there are several means by which the car making
companies can use different security codes within the car, like
firewall, strong passwords etc, that would instantly trace the
presence of any malicious software and prevent the hackers.
Restate the author’s main
idea, summarize his/her
key points
The main idea of the author is to make the readers and the different
carmaker companies aware about the risks of car hacking. This car
hacking can be used for several unethical purposes like theft,
(There are only two slots
for supporting ideas;
however there may be
more points to be
addressed. Add or delete
entries as required.)
within the vehicles. It is also said by one of the car security experts
Corey Thuen, that one of the easiest way in which these
vulnerabilities in the cars can be minimized by the engineers is by
avoiding the usage of deafly passwords, avoiding the installation of
simple backdoors (Lim et al .,2016, November).
Explanation, fact,
example
There are also many security companies and carmakers who
are trying their level best to implement security from scratch.
New designs can be made like the automatic computer
system that can build up the protections like firewalls in
order to detect and block the suspicious traffic. Antivirus
software can also be used to detect the presence of a
malicious code.
Conclusion
Car hacking is one of increasing problem of the modern day
scenario. However, there are several means by which the car making
companies can use different security codes within the car, like
firewall, strong passwords etc, that would instantly trace the
presence of any malicious software and prevent the hackers.
Restate the author’s main
idea, summarize his/her
key points
The main idea of the author is to make the readers and the different
carmaker companies aware about the risks of car hacking. This car
hacking can be used for several unethical purposes like theft,
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4CAR HACKING SECURITY
robbery or murders in some far remote areas, so that the traces can
be traced by the police. The hackers can easily use a car, commit the
crime and shift the entire guilt onto the shoulders of the actual car
owner.
However, there are several means by which the car making
companies can use different security codes within the car, like
firewall, strong passwords etc, that would instantly trace the
presence of any malicious software and prevent the hackers.
1. APA@Conestoga Reference.
Bacchus, M., Coronado, A., & Gutierrez, M. A. (2014). The Insights into Car
Hacking.
Lim, D., Park, K., Choi, D., & Seo, J. (2016, November). Analysis on Attack
Scenarios and Countermeasures for Self-driving Car and Its Infrastructures.
In International Conference on Broadband and Wireless Computing,
Communication and Applications (pp. 429-442). Springer International
Publishing.
What is the title of the article?
Who is the author of this piece?
What is the source type (e.g. magazine, newspaper, journal, and website)?
robbery or murders in some far remote areas, so that the traces can
be traced by the police. The hackers can easily use a car, commit the
crime and shift the entire guilt onto the shoulders of the actual car
owner.
However, there are several means by which the car making
companies can use different security codes within the car, like
firewall, strong passwords etc, that would instantly trace the
presence of any malicious software and prevent the hackers.
1. APA@Conestoga Reference.
Bacchus, M., Coronado, A., & Gutierrez, M. A. (2014). The Insights into Car
Hacking.
Lim, D., Park, K., Choi, D., & Seo, J. (2016, November). Analysis on Attack
Scenarios and Countermeasures for Self-driving Car and Its Infrastructures.
In International Conference on Broadband and Wireless Computing,
Communication and Applications (pp. 429-442). Springer International
Publishing.
What is the title of the article?
Who is the author of this piece?
What is the source type (e.g. magazine, newspaper, journal, and website)?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5CAR HACKING SECURITY
What is the year of publication?
The title of the article is Your Car Could Learn to Recognize Hackers
This piece has been written by Will Knight
The source type is that of a review article
It was published in the year 2016
What is the year of publication?
The title of the article is Your Car Could Learn to Recognize Hackers
This piece has been written by Will Knight
The source type is that of a review article
It was published in the year 2016
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





