SlideShare a Scribd company logo
1 of 7
Facilitator: Julianna Lee Time Keeper: Jennifer Cubiona
Rapporteur: Stanley Gato Recorder: Kristina Hermosilla
- Clarence Jose Tobias - Glenn Aldrich Buenavente
Curator: France Jules Lopez
By Zeynep Tufekei
12 – STEM St. Nicholas Of Tolentino
Mr. Nesteve Acebuche
Group 4: 10/21/20
1. What is the main aim of the author? For the companies of technology
to tighten their security because of data breaching. That might cause
harm to their customers.
2. Who are the target of the article? The companies of vehicle
manufacturers, and other companies in where their service also
needed to connecting on internet; because of the incident where 2
hackers, hacked a car via wireless connection in which the hackers
can also hacked other vehicle that was using the same server as the
vehicle.
3. Do you think there is sufficient and valid evidence that supports the
main claim of the author? Justify your answer. Yes, when you click
the highlighted words in the article you will find another article in
where it tells the story on what happened to the vehicle that was
hacked by the two hackers. Not only that but you can see the
highlighted words all throughouth the article that will lead you to
the source of the information.
CLAIM OF FACT
1. Recently two security researcher setting on the couch and armed only
with laptops, remotely took over a Chrysler jeep Cherokee speeding
along the highway, shooting down its engine as an 18-wheeler truck
rushed toward to it.
2. As the internet went from a few thousand users to more than three
billion, attempt to strengthen security were stymied because of cost
shortsightedness and competing interests.
3. That smart safe hackers can empty it with a single USB stick while
erasing all logs of its activity the evidence of deposit and withdrawals,
and of their crimes.
4. That high-tech rifle Researcher managed to remotely manipulate it
target selection without the shooters knowing.
5. Although Chrysler quickly recalled 1.4 million jeeps to patch this
particular vulnerability, it took the company more than a year after
the issue was first noted, and the recall occurred only after that
spectacular publicity stunt on the highway and after it was requested
by the National highway traffic safety administration.
CLAIM OF FACT
1. In announcing the software fix the company said that no defect had
been found.
2. From BMW to tesla to General motors, many automotive brands have
been hacked , with surely more to come.
3. At Def Con the annual information security conference, research set
up an Internet of things village to show how they could hack everday
object like baby monitors thermostats and security cameras.
4. The modern automobile is run by dozens of computers that most
manufacturers connect using a system that is old and know to be
insecure.
5. Alarmed researchers have published academic papers, hacked cars
as demonstration and begged the industry.
CLAIM OF VALUE
1. All of these innovations sound great, until you learn the
risks that this type of connectivity carries.
2. The early Internet was intended to connect people who
already trusted one another, like academic researchers
or military networks.
3. This is irresponsible and potentially catastrophic.
4. Home builders and car manufacturers have shifted to a
new business: the risky world of information technology.
5. The Internet of Things is also a privacy nightmare.
6. Connecting everyday objects introduces new risks if
done at mass scale.
CLAIM OF VALUE
1. Cars — two-ton metal objects designed to hurtle down
highways — are already bracingly dangerous.
2. Maybe cars are unsafe at any I.P.
3. Their expertise would allow them to hack any Jeep as
long as they knew the car’s I.P. address.
4. A hacked car is a high-profile example of what can go
wrong with the coming Internet of Things.
5. That smart safe? Hackers can empty it with a single
USB stick while erasing all logs of its activity.
6. Yet automakers often use that flimsy system to
connect all of the car’s parts. That means once a
hacker is in, she’s in everywhere.
CLAIM OF POLICY
1. Internet of Things should not be built on this
faulty foundation.
2. Critical functions on Internet-connected objects
should be isolated and external audits
mandated to catch problems early.
3. We need a new understanding of car safety, and
of the safety of any object running software or
connecting to the Internet.
4. We need federal safety regulations to push
automakers to move, as a whole industry.

More Related Content

What's hot

Grade 11 Earth & Life Science Lesson 1
Grade 11 Earth & Life Science Lesson 1Grade 11 Earth & Life Science Lesson 1
Grade 11 Earth & Life Science Lesson 1Marileah Mendina
 
4.3 francisco baltazar
4.3 francisco baltazar4.3 francisco baltazar
4.3 francisco baltazarMarien Be
 
Philippine literature during the spanish period
Philippine literature during the spanish periodPhilippine literature during the spanish period
Philippine literature during the spanish periodBelle Pajutagana
 
Types of News Lead
Types of News LeadTypes of News Lead
Types of News LeadDrew F
 
Module 2. lesson 4: THE NON-STATE INSTITUTIONS
Module 2.  lesson 4: THE NON-STATE INSTITUTIONSModule 2.  lesson 4: THE NON-STATE INSTITUTIONS
Module 2. lesson 4: THE NON-STATE INSTITUTIONSAngelita Montilla
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Arniel Ping
 
El Filibusterismo Kabanata 12: Si Placido Penitente
El Filibusterismo Kabanata 12: Si Placido PenitenteEl Filibusterismo Kabanata 12: Si Placido Penitente
El Filibusterismo Kabanata 12: Si Placido PenitenteKen Bryan Tolones
 
What is 21st Century Literature?
What is 21st Century Literature?What is 21st Century Literature?
What is 21st Century Literature?Jahwella Ocay
 
Claims of Fact, Value and Policy
Claims of Fact, Value and PolicyClaims of Fact, Value and Policy
Claims of Fact, Value and PolicyVanessa Ramones
 
The Human Person as an Embodied Spirit
The Human Person as an Embodied SpiritThe Human Person as an Embodied Spirit
The Human Person as an Embodied SpiritAllanBasuga
 
Mga hakbang sa pagbuo ng sulating pananaliksik
Mga hakbang sa pagbuo ng sulating pananaliksikMga hakbang sa pagbuo ng sulating pananaliksik
Mga hakbang sa pagbuo ng sulating pananaliksikJocelle
 
ARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptx
ARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptxARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptx
ARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptxJhaicaAdlawon
 

What's hot (20)

Grade 11 Earth & Life Science Lesson 1
Grade 11 Earth & Life Science Lesson 1Grade 11 Earth & Life Science Lesson 1
Grade 11 Earth & Life Science Lesson 1
 
P ananaliksik
P ananaliksikP ananaliksik
P ananaliksik
 
4.3 francisco baltazar
4.3 francisco baltazar4.3 francisco baltazar
4.3 francisco baltazar
 
Talumpati
TalumpatiTalumpati
Talumpati
 
Philippine literature during the spanish period
Philippine literature during the spanish periodPhilippine literature during the spanish period
Philippine literature during the spanish period
 
Properties of a well written text
Properties of a well written textProperties of a well written text
Properties of a well written text
 
Types of News Lead
Types of News LeadTypes of News Lead
Types of News Lead
 
Module 2. lesson 4: THE NON-STATE INSTITUTIONS
Module 2.  lesson 4: THE NON-STATE INSTITUTIONSModule 2.  lesson 4: THE NON-STATE INSTITUTIONS
Module 2. lesson 4: THE NON-STATE INSTITUTIONS
 
Layunin sa pagsulat -Filipino
Layunin sa pagsulat -FilipinoLayunin sa pagsulat -Filipino
Layunin sa pagsulat -Filipino
 
Hydrometeorological Hazards
Hydrometeorological HazardsHydrometeorological Hazards
Hydrometeorological Hazards
 
Posisyong papel
Posisyong papelPosisyong papel
Posisyong papel
 
Naratibong ulat
Naratibong ulatNaratibong ulat
Naratibong ulat
 
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
Media and Information Literacy (MIL) - 1. Introduction to Media and Informati...
 
El Filibusterismo Kabanata 12: Si Placido Penitente
El Filibusterismo Kabanata 12: Si Placido PenitenteEl Filibusterismo Kabanata 12: Si Placido Penitente
El Filibusterismo Kabanata 12: Si Placido Penitente
 
What is 21st Century Literature?
What is 21st Century Literature?What is 21st Century Literature?
What is 21st Century Literature?
 
Claims of Fact, Value and Policy
Claims of Fact, Value and PolicyClaims of Fact, Value and Policy
Claims of Fact, Value and Policy
 
The Human Person as an Embodied Spirit
The Human Person as an Embodied SpiritThe Human Person as an Embodied Spirit
The Human Person as an Embodied Spirit
 
Pagsulat ng Bionote
Pagsulat ng BionotePagsulat ng Bionote
Pagsulat ng Bionote
 
Mga hakbang sa pagbuo ng sulating pananaliksik
Mga hakbang sa pagbuo ng sulating pananaliksikMga hakbang sa pagbuo ng sulating pananaliksik
Mga hakbang sa pagbuo ng sulating pananaliksik
 
ARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptx
ARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptxARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptx
ARALIN 8 MGA KATANGIAN AT URI NG PANANALIKSIK.pptx
 

Similar to Group 4 why smart object maybe a dumb idea

The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.BarCamp Lithuania
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...Black Duck by Synopsys
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Software Backdoors, Chiaravalle
Software Backdoors, ChiaravalleSoftware Backdoors, Chiaravalle
Software Backdoors, ChiaravalleAdam Chiaravalle
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)Marjola Begaj
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismTyler Cragg
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxannandleola
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Liz Slocum
 
With Wireless Cars, Our Physical Safety Is Now on the Line The m.docx
With Wireless Cars, Our Physical Safety Is Now on the Line The m.docxWith Wireless Cars, Our Physical Safety Is Now on the Line The m.docx
With Wireless Cars, Our Physical Safety Is Now on the Line The m.docxambersalomon88660
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 

Similar to Group 4 why smart object maybe a dumb idea (20)

The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.The Underground battles over the future of the Internet, and what You can do.
The Underground battles over the future of the Internet, and what You can do.
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...Open Source Insight: IoT, Medical Devices, Connected Cars  All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Software Backdoors, Chiaravalle
Software Backdoors, ChiaravalleSoftware Backdoors, Chiaravalle
Software Backdoors, Chiaravalle
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)GDPR - a real opportunity for a new digital revolution (2018)
GDPR - a real opportunity for a new digital revolution (2018)
 
Take Down
Take DownTake Down
Take Down
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Stopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of CyberterrorismStopping Virtual Carjackings - Threat of Cyberterrorism
Stopping Virtual Carjackings - Threat of Cyberterrorism
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation Connected Car Security and the Future of Transportation
Connected Car Security and the Future of Transportation
 
With Wireless Cars, Our Physical Safety Is Now on the Line The m.docx
With Wireless Cars, Our Physical Safety Is Now on the Line The m.docxWith Wireless Cars, Our Physical Safety Is Now on the Line The m.docx
With Wireless Cars, Our Physical Safety Is Now on the Line The m.docx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
E-commerce
E-commerceE-commerce
E-commerce
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Group 4 why smart object maybe a dumb idea

  • 1. Facilitator: Julianna Lee Time Keeper: Jennifer Cubiona Rapporteur: Stanley Gato Recorder: Kristina Hermosilla - Clarence Jose Tobias - Glenn Aldrich Buenavente Curator: France Jules Lopez By Zeynep Tufekei 12 – STEM St. Nicholas Of Tolentino Mr. Nesteve Acebuche Group 4: 10/21/20
  • 2. 1. What is the main aim of the author? For the companies of technology to tighten their security because of data breaching. That might cause harm to their customers. 2. Who are the target of the article? The companies of vehicle manufacturers, and other companies in where their service also needed to connecting on internet; because of the incident where 2 hackers, hacked a car via wireless connection in which the hackers can also hacked other vehicle that was using the same server as the vehicle. 3. Do you think there is sufficient and valid evidence that supports the main claim of the author? Justify your answer. Yes, when you click the highlighted words in the article you will find another article in where it tells the story on what happened to the vehicle that was hacked by the two hackers. Not only that but you can see the highlighted words all throughouth the article that will lead you to the source of the information.
  • 3. CLAIM OF FACT 1. Recently two security researcher setting on the couch and armed only with laptops, remotely took over a Chrysler jeep Cherokee speeding along the highway, shooting down its engine as an 18-wheeler truck rushed toward to it. 2. As the internet went from a few thousand users to more than three billion, attempt to strengthen security were stymied because of cost shortsightedness and competing interests. 3. That smart safe hackers can empty it with a single USB stick while erasing all logs of its activity the evidence of deposit and withdrawals, and of their crimes. 4. That high-tech rifle Researcher managed to remotely manipulate it target selection without the shooters knowing. 5. Although Chrysler quickly recalled 1.4 million jeeps to patch this particular vulnerability, it took the company more than a year after the issue was first noted, and the recall occurred only after that spectacular publicity stunt on the highway and after it was requested by the National highway traffic safety administration.
  • 4. CLAIM OF FACT 1. In announcing the software fix the company said that no defect had been found. 2. From BMW to tesla to General motors, many automotive brands have been hacked , with surely more to come. 3. At Def Con the annual information security conference, research set up an Internet of things village to show how they could hack everday object like baby monitors thermostats and security cameras. 4. The modern automobile is run by dozens of computers that most manufacturers connect using a system that is old and know to be insecure. 5. Alarmed researchers have published academic papers, hacked cars as demonstration and begged the industry.
  • 5. CLAIM OF VALUE 1. All of these innovations sound great, until you learn the risks that this type of connectivity carries. 2. The early Internet was intended to connect people who already trusted one another, like academic researchers or military networks. 3. This is irresponsible and potentially catastrophic. 4. Home builders and car manufacturers have shifted to a new business: the risky world of information technology. 5. The Internet of Things is also a privacy nightmare. 6. Connecting everyday objects introduces new risks if done at mass scale.
  • 6. CLAIM OF VALUE 1. Cars — two-ton metal objects designed to hurtle down highways — are already bracingly dangerous. 2. Maybe cars are unsafe at any I.P. 3. Their expertise would allow them to hack any Jeep as long as they knew the car’s I.P. address. 4. A hacked car is a high-profile example of what can go wrong with the coming Internet of Things. 5. That smart safe? Hackers can empty it with a single USB stick while erasing all logs of its activity. 6. Yet automakers often use that flimsy system to connect all of the car’s parts. That means once a hacker is in, she’s in everywhere.
  • 7. CLAIM OF POLICY 1. Internet of Things should not be built on this faulty foundation. 2. Critical functions on Internet-connected objects should be isolated and external audits mandated to catch problems early. 3. We need a new understanding of car safety, and of the safety of any object running software or connecting to the Internet. 4. We need federal safety regulations to push automakers to move, as a whole industry.