SlideShare a Scribd company logo
1 of 15
APPLYING THE NIST CYBER
SECURITY FRAMEWORK TO
TRANSPORTATION SYSTEMS
Introduction
NHI Instructor Development Course
INTRODUCTIONS
1
Instructor:
Ray Murphy
ITS Specialist, USDOT/FHWA
ray.murphy@dot.gov
 Electrical Engineer
 Transportation Cyber Security
 Connected and Automated Vehicle technologies
Introduction
NHI Instructor Development Course
ENGAGE IN YOUR LEARNING
• Your interests?
• Your familiarity with the National Institute of
Standards and Technology (NIST) Framework?
• Your thoughts on transportation cybersecurity?
2
Introduction
NHI Instructor Development Course
COURSE MODULES
3
Why is Cybersecurity Important and How Does It Impact
the Transportation Ecosystem?
NIST Framework Core
Tiers, Profile, and Applying the Framework at Your
Organization
Current US DOT Initiatives to Enhance Cybersecurity
Additional Resources and Tying It Together
1
3
2
4
5
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
MODULE 1 LEARNING OBJECTIVES
Upon completion of Module 1, participants will be able to:
- Why transportation cybersecurity is important
- Cyber threats on your infrastructure and operations
- Recognize device vulnerabilities or weaknesses
4
Why is Cybersecurity Important and How Does It Impact the
Transportation Ecosystem?1
1.1
1.2
1.3
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
WHAT IS CYBERSECURITY?
5
The protection of…
• Information Systems
• Hardware & Software
• Theft, damage, disruption or misdirection
(including controlling physical access)
The protection against harm…
• via network access,
• malpractice by operators,
• deviating from secure procedures.
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
CRITICAL INFRASTRUCTURE
6
Photo source: trainweb.org
The U.S. Highway system includes…
• Interstate Highway,
• Strategic Highways &
Arterial Roadways,
• Intermodal Connectors
• Bridges and Tunnels
Introduction
NHI Instructor Development Course
PROTECTION OF CRITICAL INFRASTRUCTURE
7
• Advanced Computing,
• Sensing, and
• Communication
Technologies
• Infrastructure Owner/Operators
• System Security/Protection
• Design & Maintenance Responsibilities.
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
WHAT ARE WE TRYING TO PROTECT AND WHY?
Transportation Management Systems have at least Four
operational objectives:
• The primary focus of cybersecurity protection should be on
the most critical; your operational objectives
8
1. Safety
2. Mobility
3. Environment
4. Communication
Operational Objectives
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
CYBER THREAT EXAMPLES
9
• Interruption targeted at crashing systems
• Distributed DoS - multiple machines used
to overwhelm bandwidth
Denial of
Service
(DoS)
• Malicious inserted software - disruptive,
subversive & hostile
• Used to gain access & gather sensitive
information
Malware
• Malware via email, malicious attachment
or links restricts use until a ransom is paid
• Blocks access to data unless a decryption
key is paid for
Ransomware
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
VULNERABILITIES TO TRANSPORTATION OPERATIONS
10
• Can interact with other network devices
• Has vulnerability due to lack of patching
Legacy
Systems
• 1st step in gaining access
• Combined to deliver malware / ransomware
Brute Force
• Unlocked/Exposed ITS infrastructure
• Readily available Vendor & detailed
product information
Physical
Vulnerabilities
NHI Instructor Development Course
TRAFFIC MANAGEMENT SYSTEMS
11
Potential Vulnerabilities:
Within a software
environment an Attack
surface is the sum of
the different points or
vectors where an
unauthorized user (the
"attacker") can try to
enter data to or extract
data.
Keeping the attack
surface as small as
possible is a basic
security measure.
• Malware
• Compromised
networks &
credentials
• Poorly
configured
security
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
KNOWLEDGE CHECK
Cybersecurity is the protection of information systems
from theft or damage to the ________, the ________,
the _________on them, and from disruption or
misdirection of the services they provide.
a) virus
b)hardware
c) information
d)software
e) ransomware
12
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
KNOWLEDGE CHECK
Cybersecurity is the protection of information systems
from theft or damage to the HARDWARE, the SOFTWARE,
the INFORMATION on them, and from disruption or
misdirection of the services they provide.
13
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
LEARNING OBJECTIVES REVIEW
14
Why is Cybersecurity Important and How Does it
Impact the Transportation Ecosystem?1
Now you should be able to:
• Articulate why cybersecurity is important and how it
impacts the transportation system
• Describe cyber threats and how they can impact an
agency’s infrastructure and operations
• Recognize devices that could be vulnerabilities or
weaknesses in your own systems
1.1
1.2
1.3

More Related Content

What's hot

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Software Security
Software SecuritySoftware Security
Software SecurityAkNirojan
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutionshassanmughal4u
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical HackerKnowledgehut
 
Network management and security
Network management and securityNetwork management and security
Network management and securityAnkit Bhandari
 
Willie Albert Norris
Willie Albert NorrisWillie Albert Norris
Willie Albert NorrisWillie Norris
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber securityWilliam Mathews
 

What's hot (20)

Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
Information security
Information securityInformation security
Information security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Software Security
Software SecuritySoftware Security
Software Security
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
loaiCV2014
loaiCV2014loaiCV2014
loaiCV2014
 
Network Security
Network Security Network Security
Network Security
 
Certied Ethical Hacker
Certied Ethical HackerCertied Ethical Hacker
Certied Ethical Hacker
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Chris Holley resume
Chris Holley resumeChris Holley resume
Chris Holley resume
 
Computer security
Computer securityComputer security
Computer security
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Willie Albert Norris
Willie Albert NorrisWillie Albert Norris
Willie Albert Norris
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Competitive cyber security
Competitive cyber securityCompetitive cyber security
Competitive cyber security
 

Similar to Applying the nist framework to transportation systems mod 1 nhi instructor development course_ray murphy 10-18-19

Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingAPNIC
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
Symposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACASymposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACAAntoine Vigneron
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project 99X Technology
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present DangersPeter Wood
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 

Similar to Applying the nist framework to transportation systems mod 1 nhi instructor development course_ray murphy 10-18-19 (20)

Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with trainingASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
ASEAN-JAPAN Cyber Security Seminar: How to fill your team gaps with training
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Symposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACASymposium AFAI Cybersecurity CSX ISACA
Symposium AFAI Cybersecurity CSX ISACA
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Network Security - Real and Present Dangers
Network Security - Real and Present DangersNetwork Security - Real and Present Dangers
Network Security - Real and Present Dangers
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Application security
Application securityApplication security
Application security
 
Case study
Case studyCase study
Case study
 

More from raymurphy9533

Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Michael C. Murphy Celebration of Life by Ray 1-20-15
Michael C. Murphy   Celebration of Life by Ray 1-20-15Michael C. Murphy   Celebration of Life by Ray 1-20-15
Michael C. Murphy Celebration of Life by Ray 1-20-15raymurphy9533
 
Wydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyWydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyraymurphy9533
 
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12raymurphy9533
 
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 picturesFHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 picturesraymurphy9533
 
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12raymurphy9533
 
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12raymurphy9533
 
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12raymurphy9533
 
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...raymurphy9533
 
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12raymurphy9533
 
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12raymurphy9533
 
CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811raymurphy9533
 
Weather & the connected vehicle 092811
Weather & the connected vehicle 092811Weather & the connected vehicle 092811
Weather & the connected vehicle 092811raymurphy9533
 
Rachael's baby shower chicago may 2011
Rachael's baby shower   chicago may 2011Rachael's baby shower   chicago may 2011
Rachael's baby shower chicago may 2011raymurphy9533
 
Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711raymurphy9533
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinarraymurphy9533
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinarraymurphy9533
 
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs WebinarModerator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinarraymurphy9533
 

More from raymurphy9533 (20)

Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Michael C. Murphy Celebration of Life by Ray 1-20-15
Michael C. Murphy   Celebration of Life by Ray 1-20-15Michael C. Murphy   Celebration of Life by Ray 1-20-15
Michael C. Murphy Celebration of Life by Ray 1-20-15
 
Wydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyWydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphy
 
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12
 
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 picturesFHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
 
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
 
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
 
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12
 
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...
 
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
 
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
 
CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811
 
Weather & the connected vehicle 092811
Weather & the connected vehicle 092811Weather & the connected vehicle 092811
Weather & the connected vehicle 092811
 
RWM Strategies
RWM StrategiesRWM Strategies
RWM Strategies
 
Rachael's baby shower chicago may 2011
Rachael's baby shower   chicago may 2011Rachael's baby shower   chicago may 2011
Rachael's baby shower chicago may 2011
 
Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinar
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinar
 
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs WebinarModerator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
 
Jennifer
Jennifer Jennifer
Jennifer
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Applying the nist framework to transportation systems mod 1 nhi instructor development course_ray murphy 10-18-19

Editor's Notes

  1. Good day & Welcome to Applying the National Institute of Standards and Technology or NIST Cyber Security Framework to Transportation Systems
  2. I am Ray Murphy  and will be serving as your instructor today.   I am an Intelligent Transportation Systems Specialist with the Federal Highway Administration under the US Department of Transportation My formal training is as an Electrical Engineer and I support Transportation Cyber Security, Connected & Automated Vehicle technologies
  3. Think about why you are here today. If time permits, I’d like everyone to introduce themselves and touch on these questions as to help identify “what’s in it for me”? What are you most interested to learn about? What is your familiarity with the National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure? Why do you think cybersecurity is important for transportation systems?  Record in the parking lot and relate as they are shown later in the course if applicable If the group is large or time is a concern, I’ll poll the audience by asking them to raise hands or shout out answers to the questions on the screen. We can Create a “parking lot” using the whiteboard or Post-its to Document any questions that you want addressed throughout the session. We’ll entertain any questions that may not be within the scope for today’s workshop and follow up on these after the workshop. Key Message: The purpose of this course is to help transportation professionals improve their understanding of the subject and offer the tools that are useful for learning more about cyber security and resilience. Each of the subject areas could be a course of their own and are constantly changing, which is expected as the technologies are evolving under competitive pressure. Interactivity: If time permits, I’ll have each person introduce themselves.
  4. This course is intended to provide an overview on Applying the National Institute of Standards and Technology or NIST Cyber Security Framework to Transportation Systems. The material is designed in a modular fashion, Module 1 will address Why is Cybersecurity Important and How Does It Impact the Transportation Ecosystem? Module 2 will introduce the NIST Framework Core Module 3 will delve a bit deeper into the NIST Framework Tiers, Profile, and Applying the Framework at Your Organization We will end with Module 4 where I’ll provide an overview of some of the Current US DOT Initiatives to Enhance Cybersecurity  Module 5 is a listing of additional resources that will help you apply the NIST framework.
  5. So Let’s Get Started with Module 1, “Why is Cybersecurity Important and How Does It Impact the Transportation Ecosystem?” Here are the 3 learning objectives we’ll focus on within this module. Upon completion of Module 1, participants will be able to: 1st Articulate why cybersecurity is important and how it impacts the transportation system Secondly, Describe cyber threats and how they can impact an agency’s infrastructure and operations And the 3rd – be able to Recognize devices that could be vulnerabilities or weaknesses in your own systems 
  6. Let’s Set the stage for the course with a common definition of cyber security Cybersecurity, broadly speaking, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection from the services they provide It includes controlling physical security and software security providing protection against harm that may come from outsider threat via network access, or insider threat by operators, whether intentional, or accidental deviating from secure procedures.
  7. Transportation fits into the larger scheme of our nation's critical infrastructure  U.S. Highway system includes the interstate highway, strategic highways, arterial roadways, intermodal connectors, as well as bridges and tunnels. 
  8. Let’s transition from a national level of critical infrastructure to why you should care about this as transportation infrastructure owners & operators As you all may know, the transportation sector is changing. The use of advanced computing, sensing, and communication technologies support transportation systems in meeting the increasing operational challenges on our national ground transportation network. As Intelligent Transportation Systems (ITS) and other technologies are being increasingly deployed, infrastructure owners/operators should include system security and protection in their design, operations and maintenance responsibilities.
  9. Ask yourself – what are we trying to protect and why? In general, most transportation management systems touch on the following 4 operational objectives: Safety is always fundamental. Mobility is typically a major concern. It will surely benefit from improved connectivity… through improved situational awareness and coordination between vehicles and management systems. The Environment will benefit from less congestion which will result in less fuel consumption. Public communication is an essential tool for mastering and controlling your message to the public and has become a latent expectation from a much more connected population. The point is, as transportation owners and operators, especially with limited resources, it’s daunting to protect everything and we suggest that your Focus be on your operational objectives.
  10. Now that you know what you are trying to protect, let’s dig deeper into what specifically you are protecting from. I’d like to now Introduce the type of cyber threats and ensure everyone knows their basic definitions. We’re delving into these at a high level. There is additional information on each on these topics in the resources in the back of your workbook. If your questions aren’t answered by these resources, please contact me. A Denial of Service: or (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer or network. A denial-of-service is accomplished by flooding the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users. DoS attacks can cost an organization both time and money while their resources and services are inaccessible. A Distributed denial-of-service or (DDoS) attack occurs when multiple machines are operating together to attack one target. DDoS allows for exponentially more requests to be sent to the target, therefore increasing the attack power. It also increases the difficulty of attribution, as the true source of the attack is harder to identify.   Malware which is short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is often disguised as, or embedded in, non-malicious files. Ransomware is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid. While some simple computer ransomware can lock the system in a way that is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called crypto viral extortion, which encrypts the victim’s files in a way that makes them nearly impossible to recover without the decryption key. …ransomware gets a user to open a malicious attachment or link to a compromised website. Once a document is open or a link has been clicked, then the ransomware scans local drives for files to encrypt. Some variants may even encrypt unmapped network drives, extending the reach of the infection and making potential damage even more widespread. Interactivity: It is important to note that this is not an exhaustive list of cyber threats… Does anyone else know of any others?
  11. It is also important to note that sophisticated hackers will use a combination of methods to access systems and or devices. Legacy systems were put in place decades ago with no thought of cybersecurity.  The problem with legacy systems is that they run old and sometimes outdated versions of operating systems or application software that are no longer supported. Such systems that interact with other network devices that are unpatched, making them vulnerable to attacks and exploits A Brute force attack consists of an attacker submitting many passwords or passphrases and can be the 1st step in gaining access. The attacker systematically checks all possible passwords and passphrases until the correct one is found, usually in an automated manner perhaps by software robot devices or BOTs Anything “password protected” is vulnerable to the brute force method Physical Vulnerabilities which exist may involve ITS infrastructure which sits physically exposed on roadways and roadsides, can sometimes be unlocked, making them highly accessible. Additionally, vendor & product information may be readily available online. Can anyone briefly share their experiences with any of these vulnerabilities?
  12. Let’s Take it a step further, let’s look at a TMC layout and discuss potential vulnerabilities and possible attack vectors. Within a software environment an Attack surface is the sum of the different points or vectors where an unauthorized user (the "attacker") can try to enter data to or extract data. Keeping the attack surface as small as possible is a basic security measure. Common attacks on a TMC network include: Malware delivered using email or a compromised website or walked in by a user either inadvertently or deliberately Compromised partner networks & user credentials Poorly configured security including external firewall, switches, or agency webpages; The perimeter is made up of common field devices connected together over a network spread across a wide geographical area. Interactivity: What other edge devices can you think of?
  13. Let’s take a quick knowledge check… (INTERACTION) Cybersecurity is the protection of information systems from theft or damage to the WHAT, the WHAT, the WHAT on them, and from disruption or misdirection of the services they provide In addition, Cybersecurity includes controlling physical security and software security which provides protection against harm that may come from outsider threats
  14. Let’s take a quick knowledge check… (INTERACTION) Cybersecurity is the protection of information systems from theft or damage to the hardware, the software, the information on them, and from disruption or misdirection of the services they provide In addition, Cybersecurity includes controlling physical security and software security which provides protection against harm that may come from outsider threats
  15. Now that you’ve finished this lesson, you should be able to: convey why cybersecurity is important and how it can impact transportation systems, describe cyber threats and how they can impact your infrastructure & operations determine what transportation devices that are vulnerable and at risk This concludes the module 1 Interactivity: Any questions on what we just covered?