Bananabot (talk | contribs)
Added archive URLs for 10 citation(s) using CRWCitationBot
Bananabot (talk | contribs)
Added archive URLs for 1 citation(s) using CRWCitationBot
 
Line 17: Line 17:


===Potential Security Risk===
===Potential Security Risk===
The implementation of FoD will require internet-access through SaaS for the necessary software to function. However, this can open more areas of attack for cybercriminals if not handled correctly, for example: a connected car could experience a Denial of Service attack, which can manipulate the engine and car locks.<ref>{{Cite web |title=Cybersecurity Challenges in the Automotive Industry |url=https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/#:~:text=In%20a%202014%20study%2C%20researchers,found%20in%20their%20connected%20vehicles. |access-date=25 Aug 2025 |website=Security Compass}}</ref>
The implementation of FoD will require internet-access through SaaS for the necessary software to function. However, this can open more areas of attack for cybercriminals if not handled correctly, for example: a connected car could experience a Denial of Service attack, which can manipulate the engine and car locks.<ref>{{Cite web |title=Cybersecurity Challenges in the Automotive Industry |url=https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/#:~:text=In%20a%202014%20study%2C%20researchers,found%20in%20their%20connected%20vehicles. |access-date=25 Aug 2025 |website=Security Compass |archive-url=http://web.archive.org/web/20250326042539/https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/ |archive-date=26 Mar 2025}}</ref>


==Examples==
==Examples==