Hacking

Wireless Security Within New Model Vehicles

Abstract: 

Vehicles currently on the market are more like computers on wheels than most consumers would even begin to imagine. In fact, consumers rarely consider whether their new vehicles could be hacked in a fashion similar to their home PCs. Recently, attacks on vehicles have been brought into the spotlight, a reality that is making vehicle cyber security a priority with both vehicle manufacturers and politicians, and through both manufacturers’ designs and U.S. Senate bills. This paper explores the means by which a vehicle could potentially be hacked, what ramifications come from a hacking attack, and how a vehicle could be protected against attacks.

Categorising Cybercrime and Cybercriminals: The Problem and Potential Approaches

ABSTRACT

Cybercrime is now recognised as a major international problem, with continual increases in incidents of hacking, viruses, and other forms of abuse having been reported in recent years. However, although many people may recognise cybercrime-related terminology, agreeing and defining what they actually mean can prove to be somewhat difficult. As a result, alternative classifications have emerged from a range of authoritative sources, which are similar in some respects, but markedly different in others. This paper considers the difficulty associated with categorising cybercrime, and identifies that a harmonised nomenclature would be beneficial to individuals and organisations concerned with combating the problem, as well as to those concerned with reporting the issue to the general public.

A High-level Conceptual Framework of Cyber-terrorism

ABSTRACT

Uneasiness arises from the possibility of random cyber attacks.  In the global information and network warfare battle, cyber-terrorism has become a critical concern in that terrorists may seek to strike the innocent and wreak havoc due to dependency on networked communications. However, much misconception exists over what exactly cyber-terrorism entails and the role of cyber crime and hacking.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com