14 Oct 2022

106

Cyber Attacks on Transportation Systems Sector (Rail or Air)

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 855

Pages: 3

Downloads: 0

The threats associated with Cybersecurity in the transportation sector have a significant impact on not only general operations but also on property damage and deaths (Amoroso, 2013) . In the transportation industry, several attacks have been reported in the last one decade. The following essay seeks to illustrate that the Department of Homeland Security has been pivotal in the prevention and mitigation of cyber-attacks in the transportation industry, but more still needs to be done to sensitize the public. 

Effects of Cyber Attacks in the Transportation Industry 

The potential effects so far have been common in the industrial control systems (ICSs). Critical to note is that ICSs refers to computer-based systems, facilities, as well as equipment that are used in remotely controlling sensitive or critical physical functions and processes (Amoroso, 2013) . Such systems play a pivotal role in collecting operational and measurement data from the field locations before processing and displaying the data. In addition, the systems are involved in relaying and controlling commands to remote, local equipment to operators or human-machine interfaces. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

In reference to the ICSs, one of the main effects of cyber-attacks is that it leads to trains and aircraft to function as a closed system, which is extremely risky. Notably, the new generation aircraft, as well as legacy aircraft, have been retrofitted or designed with technologies as wireless connectivity capabilities such as Bluetooth, Ethernet IP-enabled networks, GPS among others (Amoroso, 2013) . At the same time, trains have now been supplied with onboard IT systems that help in providing and receiving real-time updates on the condition of tracks, operation and separation of trains as well as other operational information. Although such technologies are utilized to ensure that there is the provision of faster as well as more reliable communications, cyber-attacks targeting these developments in the wireless communication trains and aircraft makes them function as open systems instead of closed systems, which further increases more e-enabled risks and threats. 

On the other hand, it is pivotal to note that many pipelines have been installed with SCADA systems, control valves, automated pressure as well as the RTUs. In times of cyber-attacks to these infrastructural systems, most of the pressure regulators and control valves can be affected simultaneously. The impact is that such attacks would lead to simultaneous fires and explosions that are overwhelming for both local and state emergency responses. In fact, if such massive cyber-attacks were to take place, then the resulting conflagrations could lead to the destruction of cities in the country. 

In most of the recent cyber-attacks, delays in the transportation system were experienced (Alperen, 2017). In 2012, hackers decided to take control of passenger rail lines in the America’s northwest, leading to the destruction of signals and delays. According to the Transportation Security Administration (TSA), the railroad was slowed for a short period leading to about fifteen minutes of delay in the entire transport system (Alperen, 2017). In this regard, it is worth noting that most of the current control systems are not only highly interconnected but also automated (López et al., 2012). Interconnected transport networks are regulated through the use of many devices and systems such as signal and ramp metering systems, field devices that help in feeding the traffic management centers as well as weather information systems. Notably, control systems that are found at terminals and ports have automated access to specific areas as well as control systems found at container unloading and loading operations. In this way, the potential impact to multiple systems if individual systems or devices were deliberately attacked would not be imaginable. 

The Role Played by Department of Homeland Security 

Ensuring that cybersecurity is guaranteed in the transportation systems calls for collaboration by all partners (Amoroso, 2013). The primary role of the Sector’s partners is to collaborate in planning for and countering threats associated with cyber-attacks. Some of the main contributors to cybersecurity include the DHS and the DOT. The two departments work together in encouraging unity in their efforts specifically on cybersecurity initiatives as well as great efficiency in the evaluation of cyber vulnerabilities, threats, and consequences (Alperen, 2017). The DHS, in particular, has partnered with other groups such as the Transportation Systems Sector Cyber Security Working Group (TSSCWG) in coming up with strategies of managing risks through enhancement and maintenance of awareness as well as the promotion of collaborative, voluntary and sustainable actions within American communities. 

Further, the DHS, as well as the FBI have played a pivotal role in assisting many entities, including those in the transportation sector, and which have been affected by cyber-attacks in the analysis and provision of necessary measures for prevention (Amoroso, 2013). In such circumstances, DHS has been discovering and sharing thousands of indicators from analyses of cyber-attacks incidents. In the transportation sector, DHS has focused on four areas. The first area involves providing tactics that are commonly applied in gaining illicit access to systems and networks. Secondly, the DHS and other stakeholders such as the FBI have been providing training on vulnerabilities in targeted transportation networks and systems that are frequently exploited. Another area of concern is the sensitization of the indicators of illegal cyber activities that are commonly noted in the post-incident analyses that might have been disregarded or missed. Finally, DHS has been helping to highlight and recommend protective steps and measures that have been absent or lacking with the aim of mitigating future attacks. 

Conclusion 

Based on the above overview, it is clear that cyber-attacks in the transportation system remain to be one of the biggest threats. Different stakeholders especially the DHS have played a pivotal role in the prevention of cyber-attacks. However, more needs to be done especially sensitizing the public on what they need to do in times of such attacks. 

References 

Amoroso, E. G. (2013). Cyber-attacks: Protecting national infrastructure . Waltham, MA: 

Butterworth-Heinemann/Elsevier. 

Alperen, M. J. (2017). Foundations of homeland security: Law and policy . John Wiley & Sons 

Inc. 

López, J., Setola, R., & Wolthusen, S. D. (2012). Critical infrastructure protection: Information 

infrastructure models, analysis, and defense . Berlin: Springer. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Cyber Attacks on Transportation Systems Sector (Rail or Air).
https://studybounty.com/cyber-attacks-on-transportation-systems-sector-rail-or-air-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Military Science

Sexual Assault Response Coordinator, Victim Advocate, or Healthcare Provider

In the military society, there are numerous challenges that soldiers undergo, for instance, discrimination due to race, gender, and sexual harassment. Most of the problems remain unreported in the military,...

Words: 2308

Pages: 8

Views: 167

17 Sep 2023
Military Science

History of Multi-Engine Flight

Technology is amazing. Technology is one thing that is tricky to compete against. It changes every time with an introduction of a slightest adjustments or idea. An example is an evolution which took place in the...

Words: 1479

Pages: 5

Views: 85

17 Sep 2023
Military Science

What is Distributed Leadership?

Holt, D., Palmer, S., Gosper, M., Sankey, M., & Allan, G. (2014). Framing and enhancing distributed leadership in the quality management of online learning environments in higher education. Distance Education...

Words: 484

Pages: 2

Views: 48

17 Sep 2023
Military Science

Napoleonic Wars, Jomini, & Clausewitz

Q1 Answer Antonie-Henri, Baron Jomini was a French-Swiss officer who argued that the American states entered into the civil war to reclaim and defend American rights and to maintain and protect greater American...

Words: 452

Pages: 2

Views: 446

17 Sep 2023
Military Science

Command Sergeants Major Greatest Impact

During the operations process, Command Sergeant Major is the most significant advisor of the battalion and as such, his impact must be felt. He has more experience than any other individual does during the battalion....

Words: 225

Pages: 1

Views: 469

17 Sep 2023
Military Science

Subterranean Warfare: How to Fight and Win Beneath the Earth

Humankind has sought the means to protect self since the dawn of time. At first, human sought protection from the environment as self-preservation was foremost in his mind. Caves and caverns provided shelter which...

Words: 385

Pages: 1

Views: 73

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration