What business or organization was the target of the attack

Assignment Help Other Subject
Reference no: EM131222337

Paraphrase in 4 hours

What business or organization was the target of the attack?

Most car thieves who were reported to be stealing one model of the car, which was fitted with the best car security systems, targeted the BMW Company. The advanced technology was being used against the company itself. Radio frequency jammers were being used to block signal that was being used by the electronic key meaning the car was left unlocked by the users.

What did the attack do to the organization? (for instance, did the attackers steal credit card numbers, deface websites, etc.?)

The attackers did use the technology to steal hundreds of cars that belonged to this single organization. The cars were of one model meaning that the computer technology that had been used by this company was vulnerable to activities of hackers. The electronic port that would be used to detect the car is what the thieves would plug the device which is used to track the car

Were there other "victims" of the attack besides this organization? (for instance, if credit card numbers are stolen, other victims include the owner of the credit card and the issuing bank)

The thieves did not just stop at jamming the car and taking it away, they would go ahead and gather the car's unique key, which does correspond, to the identity of the car. There was great danger of not only losing the car but also important user ID on the and this prompted London police to warn owners of the risk that they posed

Who was the attacker? If it isn't known for certain, write a sentence or two about what is known or speculated. How would you respond if you were a victim in one of the attacks?

The thieves must have been very intelligent individuals with the ability to understand how they could navigate high tech devices fitted in the BMW cars and even copy the ID of the car key to their own car keys. These cannot be categorized as cyber thieves but they make use of the same idea of cyber theft to steal cars. In such case I would only ensure my car security through physical securing by paying an attendant to physically look out for the car when packed in order to ensure that the thieves do not gain access into the car.

Describe the steps you would take

There is only one step that I would take which is to ensure that there is physical mode security to guide the car whenever it is out and packed in a place where the thieves can access it. This is a form a car that has its own internal technology, the only way to secure it is to ensure that no one gain access to it and temper with internal systems.

Reference no: EM131222337

Questions Cloud

What do you notice about the way that the poem sounds : Summarize each poem in one or two sentences. How is sound working in the poem? What happens in the poem? Who is speaking? What is the poem's message? What do you notice about the way that the poem sounds? Does this poem make use of any poetic soun..
What was the most interesting part of the event to you : Describe the event itself. What happened? What was the most interesting part of the event to you? What did you like least about the event? Would you describe this event as a good learning experience for you? How was the event beneficial to you..
What is the purpose of the listing presentation : CPPDSM4011A List property for lease. What is the purpose of the listing presentation? Who is the only party that is legally empowered to give the agent instructions to act? Is there a requirement by law to sign a PO Form 6 Appointment of agent for a ..
What is the purpose of the name attribute for form : What is the purpose of the name attribute for form input elements? In what situations should the value of name be a simple name or an array name such as sports[]?
What business or organization was the target of the attack : What business or organization was the target of the attack? What did the attack do to the organization? (for instance, did the attackers steal credit card numbers, deface websites, etc.?)
What specific details in the resurrection accounts : What specific details in the resurrection accounts in the Gospels can be examined historically? Explain why they can be examined historically. Why does Albl say that the Christian understanding of Jesus is shocking and offensive? What does he say is..
Establish a controlled foreign-exchange market : Why did the Mexican government establish a controlled foreign-exchange market, and why did that market differ from the free market?
Opportunity to scale up investment : Suppose you can delay investment for one year. This means in one year, you can observe whether the project value has increased or decreased and based on this information decide whether you want to invest $100 to "purchase" the project at it's curr..
Discuss how can you use goal-setting to increase motivation : Discuss how can you use goal-setting to increase motivation and improve job performance? Discuss how you could improve job satisfaction and influence job performance?

Reviews

Write a Review

Other Subject Questions & Answers

  Define developmental disorder resulting from toxic chemicals

Discuss the causes, symptoms, and available treatments of the brain degeneration caused by amyotrophic lateral sclerosis (ALS), multiple sclerosis, and Korsakoff's syndrome.

  Absorption versus variable costing

There are several ways a company can allocate overhead costs to products produced or services provided. Two of these methods are absorption costing and variable costing.

  Ethics in contemporary society

Ethics in Contemporary Society

  An incumbent senator appears on television

An incumbent senator appears on television, saying that she should be re-elected because she has brought jobs to the state. Obviously, this effort is mass mediated and is an attempt to persuade. For it to be considered advertising, which other condit..

  Sociological perspectives-functionalism-conflict theory

Be certain to consider the three main sociological perspectives -- functionalism, conflict theory, and interactionism

  Although nationalism created political problems

Although nationalism created political problems in many nineteenth-century European states, it may have been a postive force increasing a sense of naional identity in?

  Impact the sociological theories-functionalism

How does each theory apply to the selected sociological institution? What are the similarities? What are the differences? How does each theory affect the views of the individual who is part of the institution?

  Criminal investigation

What are the invesitgative methods of inquiry and how are they used in criminal investigation?

  Analyze the criteria for the sale of receivables

Analyze the criteria for the sale of receivables. Based on your analysis, propose one (1) method that would achieve the maximum amount of money from the sale. Provide a rationale for your response

  State and explain any five key result areas where objectives

State and explain any FIVE key result areas where objectives may be set by an organisation.

  What programs are available to albert in community

What programs are available to Albert in your community

  Historical development of nursing-a timeline

Nursing dates far back into ancient times, where woman were seen as the caregivers. However, the science of the profession was initiated by a famous nurse over 100 years ago in the late 1800's, under the leadership of Florence Nightingale.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd