logo

Security Vulnerability Exploitation and Tesla

   

Added on  2023-03-30

6 Pages1304 Words474 Views
Running head: SECURITY VULNERABILITY EXPLOITATION AND TESLA
SECURITY VULNERABILITY EXPLOITATION AND TESLA
Name of the Student:
Name of the University:
Author note:

1
SECURITY VULNERABILITY EXPLOITATION AND TESLA
Introduction
More than 60% of business leaders in companies comprising of around 500
employees disregard the propensity of encountering cyber-attack. In the view of Duchamp,
Bayram and Korhani (2016), cyber security is not a precedent priority for business leaders’
focus and initiatives irrespective of the fact that around 67% of businesses have faced cyber
threats in the past one year. As per reports, recent report of 500 US business leaders engaged
in small and medium enterprise revealed that only 12% interpret the reality implying that an
attack is highly probable, irrespective of the size and dimension of the company (Andriole,
2018). The following paper will evaluate Tesla’s experienced types of security breaches in
2016, its financial, non-financial outcomes and the way these cyber-attacks have hampered
the reputation of the organization. In addition to this, the paper will offer insights of the way
in which Tesla restore confidence from its client and successfully address issues of cyber-
attack.
Discussion
Tesla’s Recent and Former Issues with Security Breaches
Tesla Motors established by Elon Musk is identified as the most exhilarating self-
regulating development in several decades with a marquee narration of U.S technological
dynamism and innovation. As per reports, Tesla’s luxury electric cars have created
responsiveness in the automobile industry, thus making Tesla as one of the best car which has
been ever tested (Holland et al., 2017). However, irrespective of the acclamations, Tesla has
been encountering enormous challenges and issues in entering into automotive sector which
has been dominated since several years by internal combustion engines. According to Jellid
and Mazri (2018), not only it is essential for Tesla to build cars which customers desire to

2
SECURITY VULNERABILITY EXPLOITATION AND TESLA
drive in cost-efficient manner, but Tesla further should build the battery-swapping with
charging infrastructure which produces charging in efficient way and consistent as pumping
gas. Irrespective of these factors, Tesla in recent and previous times has encountered cyber-
attacks in connected cars.
Tesla hacked by Chinese hackers from Keen Security Labs
Group of Chinese security researchers belonging to Keen Security Labs hacked a
Tesla Model X for the second time in 2019. As per reports, the Chinese hackers misled the
Tesla’s Autopilot into abruptly switching lanes. Moreover, while evaluating another
experiment it has been found that Tesla’s automatic windshield wipers which have been
motorized by cameras and the Autopilot’s computer vision software by putting the television
screen with images of water in front of the motor, thus causing the wipers to convolute in
action. According to Nie, Liu and Du (2017), this cyber-attack has been highly critical for the
company which enabled it to regulate the vehicle via Wi-Fi and cellular connection. The
vulnerability confronted the CAN bus that regulates several vehicle system in the car. As per
reports, it requires the car to be linked to a wicked Wi-Fi hotspot to take control and function
via the in-car web browser.
Cyber Attack on Tesla Inc. Cloud Systems
The cloud system of Tesla Inc. that has been presented on Amazon Web Services
(AWS) has been severely exploited by hackers in order to source crypto currency in recent
times. As per reports, the activity of cyber-attack has been performed through exposed
Kubernetes console of automobile manufacturer Tesla. As per Dragoni, Giaretta and Mazzara
(2016), Kubernetes System is identified as open source software developed by Google and
implemented by various corporate firms across the world. But in drawing relevance to Tesla
cyber-attack, an indiscreet support exposed access credentials to hackers permitting to mine

End of preview

Want to access all the pages? Upload your documents or become a member.