Problem 1: In the article Hackers remotely kill a Jeep on the highway by Andy Greenberg, what capabilities did the attackers gain on the attacked systems?
Problem 2: What attack vectors did the hackers use in the attack?
Problem 3: What security controls could be recommended to system designers to mitigate these vulnerabilities?