Cyber-Security

Improved Essays
Cyber-Security in Transportation
Technology in transportation can result in productivity gains, however a higher dependency on information technology also leads to greater exposure and potential of being a target for cyber-crimes such as denial of service, stealing of passenger private information and cyber terrorisms.
According to analysis for incidents from 2002-2004 transportation systems faced 16% of total cyber hackings and terrorisms on critical infrastructure (IEEE, 2007). Transportation information systems can face cyber-attacks on highway traffic controls systems, pipeline control systems, train control, and power/telecommunications.
What is RFID?
“RFID systems are relatively simple, consisting of readers and tags. Readers radiate
…show more content…
Although adopting secure RFID technology continues to be a challenge due to lack of interoperability with vendors and hardware limitations with inadequate energy and computing power in devices. Standardization and security has become an afterthought with the growing demands of smart technology everywhere. Some vendors comply with security standards ISO/IEC 14443 but far too many have proprietary methods of applying …show more content…
In 2013 a University of Washington grad student was able to reverse engineer ORCA cards to obtain information on card holder’s travels. The grad student used a third-party software developer kit to access unprotected data transmitted by the smart cards. Protecting RFID tags from side-channel attacks is an expensive and time consuming process for large-scale RFID structures found in transportation systems. Many researchers seek to solve this problem by proposing cost efficient means of applying authentication as a way to impede side-channeling attacks. Authentication protocols are classified into two categories, non-encryption based and encryption based. Encryption based authentication systems are processor-intensive and are limited by the storage size of microchips on RFID tags. IEEE members proposed a new protocol based on randomized skip lists-based authentication (RSLA) as an alternative to existing slow and vulnerable authentication systems. (Sun, 2016) They introduced RSLA as a means to protect against authentication schemes compromised by brute force by demonstrating how the skip list-based protocol will offer larger key ranges without sacrificing storage space for stronger

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Encrypting data is vital for a network as many hackers are seeking to find the easiest way to steal data. If data is left in plain text the hacker would have data and other important information at their disposal. Therefore,…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cost Benefit Analysis

    • 1774 Words
    • 7 Pages

    An RFI is an informal communication in which the target vendor may respond with its general marketing materials, product features, or services listings. An RFI may be useful in determining what products are commonly available among vendors or learning about the history/longevity of a specific vendor. This method is can be executed quickly with little preparation on the part of the soliciting organization. A request for proposal (RFP) on the other hand, involves a considerable investment of time and preparation for an organization.…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Miller, J. and J. Miller., (2009). 21st Century Criminology: A Reference Handbook. 1st ed.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Vulnerabilities and threats to Critical Infrastructures and other related risks have been recognized for a long time. Since 1997, critical infrastructure has been a great concern. “Critical Infrastructure is classified as a National Concern because of its scope and its importance to the nation.” () There seem to be fourteen areas of infrastructures that require protection from threats. These areas are Transportation, Food, Water, Public Safety, Government, Emergency services, Finance and much more, these infrastructures are essential to the economy because they provide goods and services to the economy and national defense.…

    • 113 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Critical Infrastructure (CI) is very important because the nation relies on it to carry out its essential activities. Since there are many essential activities that must be carry out at all times across the nation, CI has been divided into 16 different CI sectors (Department of Homeland Security, 2017). While each sector is different and perform different functions, all CI sectors are interdependent. That means that each CI sector relies on the functions of other CI sector(s) in order to be able to carry out their functions. That is why all CI Sectors are equally important because the disruption of one CI sector could also lead to the disruption of another or multiple CI sectors.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ¨Usually law enforcement agencies collect data on a suspect after they have been identified. This often resulted in missed opportunities, lost lives, just paving the way for only more destruction. But what if data could be collected in advance, before the suspect was even known? What if just the act of collecting data could result in the identification of completely new suspects? More than a few have pondered this question, just days after the Sept. 11th attacks on New York and the Pentagon, John Yoo, the Justice Department lawyer at the time, wrote an internal memo that argued that the government should use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies…

    • 806 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    After the terrorist assaults in 2001, the national government moved rapidly to build spending on flying security and take control of traveler and stuff screening at U.S. airplane terminals. TSA confronts interesting difficulties in its endeavors to secure our Nation 's transportation frameworks. While insight demonstrates to us we should stay concentrated on aeronautics security specifically, TSA is likewise accused of securing mass travel, rail, expressway, and pipeline areas. To work adequately, TSA must keep on creating in its part as a counterterrorism organization with a devoted and expert workforce. We should fortify the security of our transportation frameworks, utilizing a variety of abilities including knowledge data, innovation, and in particular, the devotion and carefulness of each worker at TSA.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    They amuse data gathers by cookies and different innovations, such as insensitive information (Apple, 2014). Besides, Apple 's map services, give the precision into its GPS administrations (Staff, 2015). IOS gadgets gives new security viewpoints, but they have easy to utilize. Numerous angles are empowered naturally, along these lines IT divisions don 't require to execute wide designs. Most security aspects as gadget encryption are not configurable, subsequently clients can 't…

    • 905 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays