Cybersecurity

V2I cybersecurity

Photo: Metamorworks / Stock.adobe.com

Article December 03, 2018
Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications are emerging for next-generation vehicles in surface transportation systems.   Using V2V and V2I communications, connected vehicles (CVs) share information with other vehicles and with transportation infrastructure, which...
Labor's Legacy in downtown Detroit, honoring the city's 300th anniversary in 2001.
News June 07, 2018
Once again, I missed more than I got to experience, but nonetheless there was much of interest. (Side note: Two members of the ITSA board visited the Traffic & Transit booth and I told them directly my dissatisfaction and concern about the number of concurrent sessions, and they did listen, so...
Sacramento transit system hit by hackers
News November 22, 2017
The Sacramento Regional Transit (SacRT) system fell victim this past weekend to computer hackers. The hackers erased data and are now threatening to do more harm if SacRT doesn't pay them one bitcoin, now worth approximately $8,000.   The attack erased parts of computer programs on the agency’s...
News November 28, 2016
In an unfortunate scenario over the recent Thanksgiving weekend, hackers apparently breached San Francisco’s mass transit system, forcing the agency to shut down its light-rail ticketing machines and point-of-payment systems and allowing passengers to ride for free.   A message reading “You hacked...
Security in intelligent transportation requires sensible planning and implementation of a defense-in-depth strategy. The combination of constructive, operational and reactive strategies over the long term can create a robust defense, where overall security can be achieved in scales greater than the sum of its parts.

Security in intelligent transportation requires sensible planning and implementation of a defense-in-depth strategy. The combination of constructive, operational and reactive strategies over the long term can create a robust defense, where overall security can be achieved in scales greater than the sum of its parts. 

Article April 08, 2016
Many a traffic engineer is familiar with fiddling the door lock on a traffic controller cabinet.   Not too long ago, that was the only security task in maintaining traffic systems for technicians in the field. Security controls for these kinds of traffic management systems, in particular for older...
DOTs need to take the right steps to avoid attack
Article April 08, 2016
The transportation systems for highways and arterials in the U.S. have advanced from a collection of independently operating devices to highly interconnected, far-reaching and integrated systems.   These integrated systems require a reliable communication network that spans a broad geographical...
DOTs cannot afford to take hand off cybersecurity switch
Article April 08, 2016
If you are caught in the middle of this sandstorm, don’t even think about blinking your eyes. One second is all a hacker needs to penetrate a firewall and drop a load of Armageddon on a department of transportation (DOT).   “At any given moment there are about 20,000 attacks [happening] on the...
Subscribe to RSS - Cybersecurity
Overlay Init