Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Group 4 why smart object maybe a dumb idea
1. Facilitator: Julianna Lee Time Keeper: Jennifer Cubiona
Rapporteur: Stanley Gato Recorder: Kristina Hermosilla
- Clarence Jose Tobias - Glenn Aldrich Buenavente
Curator: France Jules Lopez
By Zeynep Tufekei
12 – STEM St. Nicholas Of Tolentino
Mr. Nesteve Acebuche
Group 4: 10/21/20
2. 1. What is the main aim of the author? For the companies of technology
to tighten their security because of data breaching. That might cause
harm to their customers.
2. Who are the target of the article? The companies of vehicle
manufacturers, and other companies in where their service also
needed to connecting on internet; because of the incident where 2
hackers, hacked a car via wireless connection in which the hackers
can also hacked other vehicle that was using the same server as the
vehicle.
3. Do you think there is sufficient and valid evidence that supports the
main claim of the author? Justify your answer. Yes, when you click
the highlighted words in the article you will find another article in
where it tells the story on what happened to the vehicle that was
hacked by the two hackers. Not only that but you can see the
highlighted words all throughouth the article that will lead you to
the source of the information.
3. CLAIM OF FACT
1. Recently two security researcher setting on the couch and armed only
with laptops, remotely took over a Chrysler jeep Cherokee speeding
along the highway, shooting down its engine as an 18-wheeler truck
rushed toward to it.
2. As the internet went from a few thousand users to more than three
billion, attempt to strengthen security were stymied because of cost
shortsightedness and competing interests.
3. That smart safe hackers can empty it with a single USB stick while
erasing all logs of its activity the evidence of deposit and withdrawals,
and of their crimes.
4. That high-tech rifle Researcher managed to remotely manipulate it
target selection without the shooters knowing.
5. Although Chrysler quickly recalled 1.4 million jeeps to patch this
particular vulnerability, it took the company more than a year after
the issue was first noted, and the recall occurred only after that
spectacular publicity stunt on the highway and after it was requested
by the National highway traffic safety administration.
4. CLAIM OF FACT
1. In announcing the software fix the company said that no defect had
been found.
2. From BMW to tesla to General motors, many automotive brands have
been hacked , with surely more to come.
3. At Def Con the annual information security conference, research set
up an Internet of things village to show how they could hack everday
object like baby monitors thermostats and security cameras.
4. The modern automobile is run by dozens of computers that most
manufacturers connect using a system that is old and know to be
insecure.
5. Alarmed researchers have published academic papers, hacked cars
as demonstration and begged the industry.
5. CLAIM OF VALUE
1. All of these innovations sound great, until you learn the
risks that this type of connectivity carries.
2. The early Internet was intended to connect people who
already trusted one another, like academic researchers
or military networks.
3. This is irresponsible and potentially catastrophic.
4. Home builders and car manufacturers have shifted to a
new business: the risky world of information technology.
5. The Internet of Things is also a privacy nightmare.
6. Connecting everyday objects introduces new risks if
done at mass scale.
6. CLAIM OF VALUE
1. Cars — two-ton metal objects designed to hurtle down
highways — are already bracingly dangerous.
2. Maybe cars are unsafe at any I.P.
3. Their expertise would allow them to hack any Jeep as
long as they knew the car’s I.P. address.
4. A hacked car is a high-profile example of what can go
wrong with the coming Internet of Things.
5. That smart safe? Hackers can empty it with a single
USB stick while erasing all logs of its activity.
6. Yet automakers often use that flimsy system to
connect all of the car’s parts. That means once a
hacker is in, she’s in everywhere.
7. CLAIM OF POLICY
1. Internet of Things should not be built on this
faulty foundation.
2. Critical functions on Internet-connected objects
should be isolated and external audits
mandated to catch problems early.
3. We need a new understanding of car safety, and
of the safety of any object running software or
connecting to the Internet.
4. We need federal safety regulations to push
automakers to move, as a whole industry.