18 Questions
What is used as an additional layer of security verification in some systems?
Smart card
In addition to knowing a user's ID and password, what else does someone need to steal to gain unauthorized access?
Smart card
What type of security token displays an access code that changes approximately every 30 seconds?
RSA SecurID
Which factor can also be considered as a security factor for authentication?
Location
What feature do some security tokens have that eliminates the need to carry an extra gadget around?
Software-based token
In a standard login system, what is typically combined with a card reader for an additional layer of security?
PIN
What are examples of new enhancements in cars mentioned in the text?
Collision avoidance systems and adaptive cruise control
How do hackers potentially access cars remotely according to the text?
Through the GPS, entertainment, or communications systems
What is a potential consequence of a successful car hacking attack as stated in the text?
Shutting the car off on the interstate or rendering the brakes inoperable
What has been done by auto manufacturers to reduce the chances of successful cyber attacks on cars?
Taken steps to reduce the chances of a successful attack
Which technological advancement makes smart cars possible according to the text?
IoT
How are modern cars described in terms of their underlying systems?
Basically computer networks with communication, navigation, and entertainment systems
What are two reasons that make governance a hot topic?
User privacy and data security
What is a major concern related to the purpose of many IoT-related devices?
Collecting information about people and their behaviors
How did a security flaw in certain smartwatches for children expose users in 2017?
Allowed hackers to identify the wearer’s location, listen in on conversations, and communicate with the wearer
What is a common benefit of parents using apps like Life360 and mSpy?
Tracking their child’s location
What potential risk was associated with the security flaw in children's smartwatches?
Hackers could listen in on conversations and communicate with the wearers
Why is it unsettling for most parents to think of a stranger having access to their child's location?
Due to privacy and safety concerns
Explore the new enhancements in cars such as collision avoidance systems, adaptive cruise control, and more, while learning about the potential risks like expensive repairs and vulnerability to hackers. Understand how modern cars are like computer networks and the implications of cyber threats.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free