Features on demand: Difference between revisions
Added archive URLs for 10 citation(s) using CRWCitationBot |
Added archive URLs for 1 citation(s) using CRWCitationBot |
||
| Line 17: | Line 17: | ||
===Potential Security Risk=== | ===Potential Security Risk=== | ||
The implementation of FoD will require internet-access through SaaS for the necessary software to function. However, this can open more areas of attack for cybercriminals if not handled correctly, for example: a connected car could experience a Denial of Service attack, which can manipulate the engine and car locks.<ref>{{Cite web |title=Cybersecurity Challenges in the Automotive Industry |url=https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/#:~:text=In%20a%202014%20study%2C%20researchers,found%20in%20their%20connected%20vehicles. |access-date=25 Aug 2025 |website=Security Compass}}</ref> | The implementation of FoD will require internet-access through SaaS for the necessary software to function. However, this can open more areas of attack for cybercriminals if not handled correctly, for example: a connected car could experience a Denial of Service attack, which can manipulate the engine and car locks.<ref>{{Cite web |title=Cybersecurity Challenges in the Automotive Industry |url=https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/#:~:text=In%20a%202014%20study%2C%20researchers,found%20in%20their%20connected%20vehicles. |access-date=25 Aug 2025 |website=Security Compass |archive-url=http://web.archive.org/web/20250326042539/https://www.securitycompass.com/whitepapers/cybersecurity-challenges-in-the-automotive-industry/ |archive-date=26 Mar 2025}}</ref> | ||
==Examples== | ==Examples== | ||