0% found this document useful (0 votes)
60 views8 pages

Tesla

Tesla faces threats to its networked information security from cybercrime, ransomware, insider threats, and weak security practices. To protect itself, Tesla implements employee training on data security, hardware/software patches, data encryption, and creates a data loss prevention plan. However, Tesla still risks insider theft, as in a recent case where a former employee stole thousands of confidential files and code from Tesla. Tesla is also at risk of ransomware attacks, as demonstrated by a Russian man who pleaded guilty to trying to extort Tesla by offering to plant ransomware on their network.

Uploaded by

Ahmed Adel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views8 pages

Tesla

Tesla faces threats to its networked information security from cybercrime, ransomware, insider threats, and weak security practices. To protect itself, Tesla implements employee training on data security, hardware/software patches, data encryption, and creates a data loss prevention plan. However, Tesla still risks insider theft, as in a recent case where a former employee stole thousands of confidential files and code from Tesla. Tesla is also at risk of ransomware attacks, as demonstrated by a Russian man who pleaded guilty to trying to extort Tesla by offering to plant ransomware on their network.

Uploaded by

Ahmed Adel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

TESLA

Done by:Ahmed
THREATS FACED WITH SECURITY
OF NETWORKED INFORMATION
• Cybercrime:Tesla is at risk of cyber attacks from hackers who may attempt to gain access to its networked information for
various reasons such as to steal data or disrupt operations.
• Ransomware:Tesla could also be vulnerable to ransomware attacks where hackers hold the company's data hostage and
demand a ransom in exchange for its release.
• Insider threats:There is also the risk of insider threats where employees with malicious intentions could access and misuse
company data.
• Weak security practices:Tesla is also at risk of data breaches where confidential information could be accessed and stolen
by unauthorized parties
• Gaps in data protection regulations: regularly review and update their data protection policies and practices to ensure
that they are effective and compliant with relevant laws and regulations.
SECURITY PROCEDURES TO PROTECT
NETWORKED INFORMATION
•1) Training employees on data security best practices
•2) Implementing hardware or software patches to prevent data breaches in the first place
•3) Data encryption to prevent unauthorized access to data
•4) Making sure employees understand and comply with company policy on data encryption
• 5) Creating a data loss prevention plan to backups and other secure storage method if a
data breach does occur
THREATS
• Tesla has seen various benefits from its investment in networked information
security. They have been able to lower the danger of cyberattacks on their
networks and data centres by investing in access control, network segmentation,
and data encryption .As a result, their networks and data centres are more
reliable, there are fewer data breaches, and communication is better.

• An active monitoring and response plan must be put in place in order to spot
suspicious activity and take appropriate action in order to guarantee that the
organisation is best equipped to minimise these dangers. To further safeguard
Tesla's networked information security, a revised cyber security policy as well as
the adoption of secure technologies and procedures are required. Tesla can
guarantee the continuous safe and secure functioning of its networked
information systems by resolving these issues.
SECURITY PROCEDURES
• Tesla uses password management to make sure that all login information is secured, limiting unwanted
access to user accounts. Data encryption protects any data from unauthorised access while it is being
transported over the network and stored.
• Strong access control further restricts access to corporate networks and any sensitive data. Last but not
least, Tesla makes sure that any external contractor, worker, or other third party that has access to their
network is subject to a thorough background check.
INSIDER THREAT
• According to the official Filing, Tesla is suing a former employee and software engineer named Alex
Khatilov alleging trade secret theft and breach of contract.
• Khatilov was hired by Tesla in to work on their quality assurance team.
• According to Tesla, after only 3 days, Khatilov began transferring files and python scripts to his personal
Dropbox account. Tesla claim the code that was stolen had “200 man-years of work” to develop.
• Tesla claim that their infosec team “detected the downloading of up to approximately 26,000 files on
January 6 through its monitoring software. The team immediately reviewed the activity and concluded
that it was not an authorized transfer. Tesla also discovered that the files contained a complete set of all
automation scripts produced by the Quality Assurance Engineering team for WARP Drive over the last
twelve years.”
• On the 6th of January, Tesla actually challenged Khatilov about the action while he was working remotely.
During this interview Khatilov claimed that he “had only transferred a couple of personal administrative
documents”. In fact, he had transferred thousands and thousands of documents.
RANSOMWARE
• Computer viruses that threaten to delete your files unless you pay a ransom are known as ransomware.
• A Russian man in the US has pleaded guilty to plotting to extort money from the electric car
company Tesla.
• Egor Igorevich Kriuchkov is accused of offering an employee $1m (£721,000) to place ransomware in
the computer network of the company's battery plant in Nevada.
• He planned to use the ransomware to steal company secrets for extortion, prosecutors alleged.
• The 27-year-old pleaded guilty on Thursday in Reno, Nevada.
• Mr Kriuchkov acted on behalf of criminals abroad and tried to bribe a Tesla employee in person,
prosecutors said.
• Ransomware attacks companies or organisations by scrambling their internal computer networks, stealing
information or locking users out. The attackers then demand large sums of money in return for ending the
hack.
THE END

You might also like