Transportation Cyber Security
Length: Approximately 4 hours
Description
Data, technology, and Internet of Things (IOT) are playing a prominent role in delivering today’s transportation services. This is likely to grow significantly as the Connected and Autonomous Vehicles (CAVs) emerge on our highways. Cybersecurity of data, technology and IOT is essential to ensure safe and reliable transportation services. More public sector agencies and municipalities are being targeted and attacked. Information and operations technology professionals need a practitioner’s perspective to vigilantly address these evolving threats. This course is designed to take a strategic view of these influences, filter it through the practitioner perspective and equip participants to know what to do and what to look for in relation to cybersecurity.
Click the caret below to view the Course Outline.
Objectives
Upon completion of the course, participants will be able to:
- Analyze the complex and rapidly changing technologies associated with the broad discipline of cyber security
- List the tools that are useful for learning more about cyber security and resilience
Outline (click to display)
LESSON 1. Why Do Hackers Hack?
- What About My Conflict Monitor?
- Worst-Case Scenarios
- The Hacker Mentality
- The Risk Curve
- TMC Diagram
- Stages of an Attack
LESSON 2. Field Devices
- DMS Security
- Website Security
- PII Releases Cost
- Impact of Social Media Attack
- Signal Control System
- Traffic Control System Security
- Communications Equipment Attacks: Example
- Transit Cards
- Crowd-Sourced Traffic Data
- IT Equipment
- Hacking Over the Airwaves
LESSON 3. Center-To-Field Network Security
- Field Networks
- Cloned Cell Sites
- Using Licensed Frequencies
- Who Is Really a Threat?
- Case Studies
- SUN_HACKER (How did the hacker know?)
- Green Lights Forever
LESSON 4. Back Office/Traffic Management Center
- General TMC Layout
- Slammer Worm
- TMC Failures
- Beefing Up the TMC System
- Transportation Management Network
- Personal Devices
- Wireless Peripherals
- Backups
- Data Diodes
- Firewall
- Honey Pot
- Basic Mousetrap
- What are a Normal and Abnormal Activities?
- Staff & Operators: Sentries on the Wall
- Security Breaches
- Security the TMC
- Authenticate and Encrypt
- Disrupting the Attack Chain
LESSON 5. The Weakest Link—Users, Operators, and Managers
- What Is Social Engineering?
- About Your Passwords…
- PIN Number
- The Problem with Password