Moving forward there are potential challenges for autonomous vehicles that may create for the future of cybersecurity. Risks such as hacking are one of the many threats linked with these cars. The Alliance for Telecommunications Industry Solutions (ATIS), the risks of cyber intrusion can vary from access to the personal and financial information of the owner, driver or passenger, to even the loss of control of the vehicle. The stat that I also found interesting is that more cars become connected, the more cyber security concerns will rise, especially since the connected car market is expected to quadruple by 2021.It is no longer just GPS or satellite radio, cars are connected throughout and into dealerships and personal homes.
This article starts with the concept that Schools should teach students learn how to stop malicious hackers by learning their ways. Imagine a world where security guards learn to be robbers first. The first step for students, before moving into a government or corporate job where they work to prevent hacks, is to learn the darker side of the trade: exploiting loopholes, thieving from servers, cracking passwords–and not just learning and performing them, in a classroom set up especially for the experience. Students learn the tricks they need to break past a system’s defenses, but not when to use which tricks. Imagine getting the keys, not the locks is the analogy the author used. I think this article even though is a few years old relates to our program and what we are learning. The classes listed in this article have the same names as in our program.
Air Force Major Jack Skoda, a cyber defense instructor in Vermont Air National Guard’s Information Operations Squadron, believes that cyberspace is “all around us, all the time.” I found it interesting how he likens cyber defense specialists as having the same attributes as military minds. His thoughts are that “they understood their domain, and they used that understanding to bring the effect they needed at the time of their choosing to win decisively,” said Skoda. “And that doesn’t change in cyber.” Major Skoda teaches Cyber Security in the military and a local community college and switched his mentality accordingly. Military personnel are problem solving, they are already thinking about budget, number of people to get a job done and how long a specific task may or may not take whereas a traditional college student doesn’t have that experience. He uses his military experience to emphasize why security protocols are important. underlying message to all his students remains consistent: know your trade, frontwards and backwards. That is why there is a shortage of warriors like him in cyber-security – the ones who have mastered this trade.