SlideShare a Scribd company logo
WHY CYBERSECURITY
IS IMPORTANT TO THE
TRANSPORTATION
ECOSYSTEM
NHI INSTRUCTOR DEVELOPMENT COURSE
Ray Murphy
ITS Specialist, USDOT/FHWA
ray.murphy@dot.gov
Introduction
NHI Instructor Development Course
INTRODUCTIONS
1
Instructor:
Ray Murphy
ITS Specialist, USDOT/FHWA
 Over 2 decades as a State DOT Electrical Engineer
 Transportation Cyber Security
 Connected and Automated Vehicle technologies
Introduction
NHI Instructor Development Course
ENGAGE IN YOUR LEARNING…
WHAT’S IN IT FOR ME?
• Your familiarity with the Cyber Security?
• Your thoughts on transportation Cyber Security?
2
Introduction
NHI Instructor Development Course
WHAT’S IN IT FOR ME?
Transportation Cyber Security is important to you,
because:
• As infrastructure operators & owners, you are
entrusted in protecting the information systems
including software and hardware investments
which operate & manage the transportation
network.
3
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
LEARNING OBJECTIVES
Upon completion participants will be able to:
- Defend why transportation cybersecurity is important
- Explain Cyber threats on your infrastructure/operations
- Identify device vulnerabilities or weaknesses
4
1.
2.
3.
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
WHAT IS CYBERSECURITY?
5
The protection of…
• Information Systems
• Hardware & Software
• Theft, damage, disruption or misdirection
(including controlling physical access)
The protection against harm…
• via network access,
• malpractice by operators,
• deviating from secure procedures.
Introduction
NHI Instructor Development Course
PROTECTION OF THE
TRANSPORTATION ECOSYSTEM
6
Photo source: US DOT ITS JPO PCB
Why should you
care about
protecting
transportation
infrastructure?
Introduction
NHI Instructor Development Course
PROTECTION OF THE
TRANSPORTATION ECOSYSTEM
7
• Advanced Computing
• Sensing and
• Communication
Technologies
• System Security & Protection
• Design, Operations & Maintenance Responsibilities.
Photo source: US DOT ITS JPO PCB
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
WHAT ARE WE TRYING TO PROTECT
AND WHY?
8
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
WHAT ARE WE TRYING TO PROTECT
AND WHY?
Transportation Management Systems have
at least Four operational objectives:
• The primary focus of cybersecurity protection should be on
the most critical; your operational objectives
9
1. Safety
2. Mobility
3. Environment
4. Communication
Operational Objectives
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
CYBER THREAT EXAMPLES
10
• Interruption targeted at crashing systems
• Distributed DoS - overwhelm bandwidth
Denial of
Service
(DoS)
• Malicious inserted software
• Gain access & gather information
Malware
• Type of Malware
• Blocks access to data
Ransomware
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
VULNERABILITIES TO
TRANSPORTATION OPERATIONS
11
• Can interact with other network devices
• Has vulnerability due to lack of patching
Legacy
Systems
• 1st step in gaining access
• Combined to deliver malware / ransomware
Brute Force
• Unlocked/Exposed ITS infrastructure
• Readily available Vendor & detailed
product information
Physical
Vulnerabilities
NHI Instructor Development Course
TRAFFIC MANAGEMENT SYSTEMS
12
Potential Vulnerabilities:
Attack surface =
the sum of the
different points
or vectors where
an "attacker"
can try to enter
or extract data.
• Malware
• Compromised
networks &
credentials
• Poorly
configured
security
Photo source: US DOT ITS JPO PCB
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
KNOWLEDGE CHECK - CYBERSECURITY
Cybersecurity is the protection of information systems
from theft or damage to the 1)________, the
2)________, the 3)_________on them, and from
disruption or misdirection of the services they provide.
a)virus
b)hardware
c) information
d)software
e) ransomware
13
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
KNOWLEDGE CHECK - CYBERSECURITY
Cybersecurity is the protection of information systems
from theft or damage to the 1)hardware, the 2)software,
the 3)information on them, and from disruption or
misdirection of the services they provide.
14
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
TMC NETWORK COMMON ATTACKS
Common attacks on a TMC network may include:
• Malware delivered using email or a compromised
1)__________or 2)_____________either inadvertently
or deliberately.
• Compromised partner 3)_______ & user 4)________.
a)firewall
b)Website
c) networks
d)switch
15
e) software
f) walked in
g) credentials
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
TMC NETWORK COMMON ATTACKS
Common attacks on a TMC network may include:
• Malware delivered using email or a compromised
1)website or 2) walked in either inadvertently or
deliberately.
• Compromised partner 3) networks & user 4)credentials.
16
WhyisCybersecurityImportantandhowdoesitimpacttheTransportationEcosystem?
NHI Instructor Development Course
LEARNING OBJECTIVES REVIEW
17
You should now be able to:
• Defend why cybersecurity is important and how it
impacts the transportation system
• Explain cyber threats and how they can impact an
agency’s infrastructure and operations
• Identify devices that could be vulnerabilities or
weaknesses in your own systems
1.
2.
3.
Introduction
NHI Instructor Development Course 18
Ray Murphy
ITS Specialist, USDOT/FHWA
ray.murphy@dot.gov
QUESTIONS

More Related Content

What's hot

What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercisesisc2-hellenic
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
NFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info SecurityNFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info SecurityWesley Moore
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingBryan Len
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 PresentationAmy McMullin
 

What's hot (20)

Security tools
Security toolsSecurity tools
Security tools
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
hacker culture
hacker culturehacker culture
hacker culture
 
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
PACE-IT, Security+1.1: Introduction to Network Devices (part 3)
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
NFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info SecurityNFA Interpretive Notice on Info Security
NFA Interpretive Notice on Info Security
 
Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
 
Most Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex TrainingMost Advanced Cybersecurity, Network Security Training - Tonex Training
Most Advanced Cybersecurity, Network Security Training - Tonex Training
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
Chapter 3 Presentation
Chapter 3 PresentationChapter 3 Presentation
Chapter 3 Presentation
 
PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)PACE-IT, Security+1.4: Common Network Protocols (part 2)
PACE-IT, Security+1.4: Common Network Protocols (part 2)
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
 

Similar to Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray Murphy 10-25-19

All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxInfosectrain3
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxInfosectrain3
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxinfosec train
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfinfosec train
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxInfosectrain3
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxAkttripathi
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 

Similar to Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray Murphy 10-25-19 (20)

All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptx
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdf
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
security_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptxsecurity_assessment_report_nidhi yadav.pptx
security_assessment_report_nidhi yadav.pptx
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from raymurphy9533

Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18raymurphy9533
 
Michael C. Murphy Celebration of Life by Ray 1-20-15
Michael C. Murphy   Celebration of Life by Ray 1-20-15Michael C. Murphy   Celebration of Life by Ray 1-20-15
Michael C. Murphy Celebration of Life by Ray 1-20-15raymurphy9533
 
Wydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyWydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyraymurphy9533
 
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12raymurphy9533
 
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 picturesFHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 picturesraymurphy9533
 
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12raymurphy9533
 
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12raymurphy9533
 
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12raymurphy9533
 
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...raymurphy9533
 
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12raymurphy9533
 
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12raymurphy9533
 
CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811raymurphy9533
 
Weather & the connected vehicle 092811
Weather & the connected vehicle 092811Weather & the connected vehicle 092811
Weather & the connected vehicle 092811raymurphy9533
 
Rachael's baby shower chicago may 2011
Rachael's baby shower   chicago may 2011Rachael's baby shower   chicago may 2011
Rachael's baby shower chicago may 2011raymurphy9533
 
Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711raymurphy9533
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinarraymurphy9533
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinarraymurphy9533
 
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs WebinarModerator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinarraymurphy9533
 

More from raymurphy9533 (20)

Preparing for CV Deployment read ahead 9-8-18
Preparing for CV Deployment   read ahead 9-8-18Preparing for CV Deployment   read ahead 9-8-18
Preparing for CV Deployment read ahead 9-8-18
 
Michael C. Murphy Celebration of Life by Ray 1-20-15
Michael C. Murphy   Celebration of Life by Ray 1-20-15Michael C. Murphy   Celebration of Life by Ray 1-20-15
Michael C. Murphy Celebration of Life by Ray 1-20-15
 
Wydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphyWydot tim 3 26-13 by ray murphy
Wydot tim 3 26-13 by ray murphy
 
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12Ray Murphy of FHWA   Chicago HS for Agricultural Sciences Career Day 05-11-12
Ray Murphy of FHWA Chicago HS for Agricultural Sciences Career Day 05-11-12
 
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 picturesFHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
FHWA and Chicago HS for Agricultural Sciences shadow day 02-08-12 pictures
 
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Brian Smith of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Brian Smith of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
 
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12Dave Platz of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-08-12
Dave Platz of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-08-12
 
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12Tom Saad of FHWA   Chicago HS for Agricultural Sciences Shadow day 02-08-12
Tom Saad of FHWA Chicago HS for Agricultural Sciences Shadow day 02-08-12
 
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...Larry O'Donnell of FHWA   Chicago HS for Agricultural Sciences Shadow Day 02-...
Larry O'Donnell of FHWA Chicago HS for Agricultural Sciences Shadow Day 02-...
 
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
Ray Murphy of FHWA host Chicago HS for Aricultural Sciences Shadow Day 02 08-12
 
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
FHWA Overview - Chicago HS for Agricultural Sciences Shadow Day 02-08-12
 
CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811CT DOT Mtg ITS RWIS Clarus 092811
CT DOT Mtg ITS RWIS Clarus 092811
 
Weather & the connected vehicle 092811
Weather & the connected vehicle 092811Weather & the connected vehicle 092811
Weather & the connected vehicle 092811
 
RWM Strategies
RWM StrategiesRWM Strategies
RWM Strategies
 
Rachael's baby shower chicago may 2011
Rachael's baby shower   chicago may 2011Rachael's baby shower   chicago may 2011
Rachael's baby shower chicago may 2011
 
Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711Posting travel times on dms webinar 042711
Posting travel times on dms webinar 042711
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinar
 
Moderator & speaker bios posting travel times on dynamic message signs webinar
Moderator & speaker bios   posting travel times on dynamic message signs webinarModerator & speaker bios   posting travel times on dynamic message signs webinar
Moderator & speaker bios posting travel times on dynamic message signs webinar
 
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs WebinarModerator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
Moderator & Speaker Bios - Posting Travel Times on Dynamic Message Signs Webinar
 
Jennifer
Jennifer Jennifer
Jennifer
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 

Why Cyber Security is Important to the Transportation Ecosystem NHI IDC Ray Murphy 10-25-19

Editor's Notes

  1. Good day & Welcome to Why Cyber Security is important and to Transportation Systems
  2. I am Ray Murphy  and will be serving as your instructor today.   I am an Intelligent Transportation Systems Specialist with the Federal Highway Administration under the US Department of Transportation My formal training is as an Electrical Engineer and I support Transportation Cyber Security, Connected & Automated Vehicle technologies
  3. Think about why you are here today and what’s in it for you”? ((If the group is large or time is a concern, I’ll poll the audience by asking them to raise hands or shout out answers to the questions on the screen. )) Interactivity: I’d like everyone to introduce themselves and touch on these questions What is your familiarity with Cyber Security? Why do you think cybersecurity is important for transportation systems?  We can Create a “parking lot” using the whiteboard or Post-its to Document any questions that you want addressed throughout the session. We’ll entertain any questions that may not be within the scope for today’s workshop and follow up on these after the workshop.
  4. The reasons for why transportation cyber security is important to you is because: As infrastructure operators & owners, you are entrusted in protecting the information systems including software and hardware investments which manage the transportation network.
  5. Upon completion of Module 1, participants will be able to: 1st Articulate why cybersecurity is important and how it impacts the transportation system Secondly, Describe cyber threats and how they can impact an agency’s infrastructure and operations And the 3rd – be able to Recognize devices that could be vulnerabilities or weaknesses in your own systems 
  6. Let’s Set the stage for the course with a common definition of cyber security Cybersecurity, broadly speaking, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection from the services they provide It includes controlling physical security and software security providing protection against harm that may come from outsider threat via network access, or insider threat by operators, whether intentional, or accidental deviating from secure procedures.
  7. Let’s transition from a national level of critical infrastructure to why you should care about this as transportation infrastructure owners & operators
  8. As you all may know, the transportation sector is changing. The use of advanced computing, sensing, and communication technologies support transportation systems in meeting the increasing operational challenges on our national highway transportation network. As various technologies are being increasingly deployed, infrastructure owners/operators should include system security and protection in their design, operations and maintenance responsibilities.
  9. Ask yourself – what are we trying to protect and why? In general, most transportation management systems touch on the following 4 operational objectives: Safety is always fundamental. Mobility is typically a major concern. It will surely benefit from improved connectivity… through improved situational awareness & coordination between vehicles & management systems. The Environment will benefit from less congestion resulting in less fuel consumption. Public communication is essential tool for managing your message to the public. The point is, as transportation owners and operators, especially with limited resources, it’s daunting to protect everything and we suggest that your focus be on these operational objectives.
  10. Ask yourself – what are we trying to protect and why? In general, most transportation management systems touch on the following 4 operational objectives: Safety is always fundamental. Mobility is typically a major concern. It will surely benefit from improved connectivity… through improved situational awareness & coordination between vehicles & management systems. The Environment will benefit from less congestion resulting in less fuel consumption. Public communication is essential tool for managing your message to the public. The point is, as transportation owners and operators, especially with limited resources, it’s daunting to protect everything and we suggest that your focus be on these operational objectives.
  11. Now that you know what you are trying to protect, let’s dig deeper into what specifically you are protecting from. I’d like to now Introduce several example type of cyber threats and their basic definitions. We’re delving into these at a high level. There is additional information on each on these topics in Module 5 and in the back of your workbook. If your questions aren’t answered by these resources, please contact me. A Denial of Service: or (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. A DoS is accomplished by flooding the targeted host or network until the target cannot respond or simply crashes, preventing access for legitimate users. A Distributed denial-of-service or (DDoS) attack occurs when multiple machines are operating together to attack one target. Malware which is short for malicious software, is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. Malware is often disguised as, or embedded in, non-malicious files. Ransomware is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid. It can encrypt the victim’s files in a way that makes them nearly impossible to recover without the decryption key. Interactivity: It is important to note that this is not an exhaustive list of cyber threats… Does anyone else know of any others?
  12. It is also important to note that sophisticated hackers will use a combination of methods to access systems and or devices. Legacy systems were put in place decades ago with no thought of cybersecurity.  The problem with legacy systems is that they run old and sometimes outdated versions of operating systems or application software that are no longer supported. Such systems that interact with other network devices that are unpatched, making them vulnerable to attacks and exploits A Brute force attack consists of an attacker submitting many passwords and can be the 1st step in gaining access. The attacker systematically checks all possible passwords and passphrases until the correct one is found, usually in an automated manner perhaps by software robot devices or BOTs… Anything “password protected” is vulnerable to the brute force method Physical Vulnerabilities which exist may involves exposed, unlocked ITS infrastructure making them highly accessible. Additionally, vendor & product information may be readily available online. Can anyone briefly share their experiences with any of these vulnerabilities?
  13. Let’s Take it a step further, let’s look at a TMC layout and discuss potential vulnerabilities and possible attack vectors. Within a software environment an Attack surface is the sum of the different points or vectors where an unauthorized user (the "attacker") can try to enter data to or extract data. Keeping the attack surface as small as possible is a basic security measure. Common attacks on a TMC network include: Malware delivered using email or a compromised website or walked in by a user either inadvertently or deliberately Compromised partner networks & user credentials Poorly configured security including external firewall, switches, or agency webpages; The perimeter is made up of common field devices connected together over a network. Interactivity: What other edge devices can you think of?
  14. Let’s take a quick knowledge check… (INTERACTION) Cybersecurity is the protection of information systems from theft or damage to the WHAT, the WHAT, the WHAT on them, and from disruption or misdirection of the services they provide In addition, Cybersecurity includes controlling physical security and software security which provides protection against harm that may come from outsider threats
  15. Let’s take a quick knowledge check… (INTERACTION) Cybersecurity is the protection of information systems from theft or damage to the hardware, the software, the information on them, and from disruption or misdirection of the services they provide In addition, Cybersecurity includes controlling physical security and software security which provides protection against harm that may come from outsider threats
  16. Let’s take a quick knowledge check… (INTERACTION) Cybersecurity is the protection of information systems from theft or damage to the WHAT, the WHAT, the WHAT on them, and from disruption or misdirection of the services they provide In addition, Cybersecurity includes controlling physical security and software security which provides protection against harm that may come from outsider threats
  17. Let’s take a quick knowledge check… (INTERACTION) Cybersecurity is the protection of information systems from theft or damage to the WHAT, the WHAT, the WHAT on them, and from disruption or misdirection of the services they provide In addition, Cybersecurity includes controlling physical security and software security which provides protection against harm that may come from outsider threats
  18. Now that you’ve finished this lesson, you should be able to: convey why cybersecurity is important and how it can impact transportation systems, describe cyber threats and how they can impact your infrastructure & operations determine what transportation devices that are vulnerable and at risk This concludes the module 1 Interactivity: Any questions on what we just covered?
  19. I am Ray Murphy  and will be serving as your instructor today.   I am an Intelligent Transportation Systems Specialist with the Federal Highway Administration under the US Department of Transportation My formal training is as an Electrical Engineer and I support Transportation Cyber Security, Connected & Automated Vehicle technologies