Skip to main content

2020 | OriginalPaper | Buchkapitel

2. Cyber Security in Aviation, Maritime and Automotive

verfasst von : Martti Lehto

Erschienen in: Computation and Big Data for Transport

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Critical information infrastructures support vital services such as energy, transport, telecommunications, financial services, etc., that are so essential that their unavailability may adversely affect the well-being of a nation. Transport is a critical national infrastructure. Disruption to the transport network has significant impacts on everyday life of citizens, national defence, security, and the vital functions of the state. This critical infrastructure is managed and maintained by a complex set of actors, each of whom tackle cyber security differently. The cyber security risk landscape in transport is currently evolving towards the point that risks that were once considered unlikely began occurring with regularity. This ongoing trend can be attributed to higher maturity of attack tools and methods, increased exposure, and increased motivation of attackers. In the past, most of the attacks were conventional and the attackers individuals or small groups of hackers. Now these very-high-impact risks will also force us to become better at protecting our assets and devising creative solutions to mitigate risks. Safety and security are two sides of the same coin. The cyber security threat is increasingly becoming cyber-physical, as vehicles, aircrafts, vessels, infrastructure, and control systems become increasingly connected. Accordingly, physical safety—an established practice across transport sectors—and cyber security will become one and the same. This necessitates a significant shift in the manufacturing and operation culture of the transport. This article introduces cyber security threat and risk environment in aviation, maritime and automotive. In addition, the article presents examples cyber-attacks against those systems. The article also discusses the principles that should be implemented in cyber security in transport.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aitken K (2016) Cyber security in intelligent mobility transport systems catapult Aitken K (2016) Cyber security in intelligent mobility transport systems catapult
2.
Zurück zum Zitat Automotive IQ (2017) Safety & security report Automotive IQ (2017) Safety & security report
3.
Zurück zum Zitat Biesecker C (2017) Boeing 757 testing shows airplanes vulnerable to hacking, DHS says Biesecker C (2017) Boeing 757 testing shows airplanes vulnerable to hacking, DHS says
5.
Zurück zum Zitat Bodeau D, Graubart R (2013) Cyber resiliency and NIST special publication 800-53 Rev. 4 controls. MITRE Tech Rep Bodeau D, Graubart R (2013) Cyber resiliency and NIST special publication 800-53 Rev. 4 controls. MITRE Tech Rep
7.
Zurück zum Zitat Boyes H, Isbell R (2017) Code of practice cyber security for ships Boyes H, Isbell R (2017) Code of practice cyber security for ships
8.
Zurück zum Zitat Brewster T (2015) Attack on LOT polish airline grounds 10 flights. Forbes Brewster T (2015) Attack on LOT polish airline grounds 10 flights. Forbes
10.
Zurück zum Zitat ENISA (2011) ENISA Analysis of cyber security aspects in the maritime sector ENISA (2011) ENISA Analysis of cyber security aspects in the maritime sector
12.
Zurück zum Zitat EU (2010) Directive 2010/64/EU of the European Parliament and of the Council on the right to interpretation and translation in criminal proceedings: transposition strategies with regard to interpretation and translation EU (2010) Directive 2010/64/EU of the European Parliament and of the Council on the right to interpretation and translation in criminal proceedings: transposition strategies with regard to interpretation and translation
14.
Zurück zum Zitat Forbes VL (2018) The global maritime industry remains unprepared for future cybersecurity challenges. Future Directions, Nedlands Forbes VL (2018) The global maritime industry remains unprepared for future cybersecurity challenges. Future Directions, Nedlands
15.
Zurück zum Zitat Greenberg A (2015) Hackers remotely kill a jeep on the highway - With me in it. Wired Greenberg A (2015) Hackers remotely kill a jeep on the highway - With me in it. Wired
16.
Zurück zum Zitat Hunt T (2016) Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs. Blog post, February Hunt T (2016) Controlling vehicle features of Nissan LEAFs across the globe via vulnerable APIs. Blog post, February
17.
Zurück zum Zitat Huq N, Vosseler R, Swimmer M (2017) Cyberattacks against intelligent transportation systems. TrendLabs Research Paper Huq N, Vosseler R, Swimmer M (2017) Cyberattacks against intelligent transportation systems. TrendLabs Research Paper
18.
22.
Zurück zum Zitat Kallio H (2016) Literature review on cyber security of vehicles Kallio H (2016) Literature review on cyber security of vehicles
23.
Zurück zum Zitat Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H et al (2010) Experimental security analysis of a modern automobile. 2010 IEEE symposium on security and privacy. IEEE, Berkeley, pp 447–462CrossRef Koscher K, Czeskis A, Roesner F, Patel S, Kohno T, Checkoway S, McCoy D, Kantor B, Anderson D, Shacham H et al (2010) Experimental security analysis of a modern automobile. 2010 IEEE symposium on security and privacy. IEEE, Berkeley, pp 447–462CrossRef
24.
Zurück zum Zitat Lodge D (2016) Hacking the Mitsubishi outlander PHEV hybrid. PenTestPartners, June 5 Lodge D (2016) Hacking the Mitsubishi outlander PHEV hybrid. PenTestPartners, June 5
25.
Zurück zum Zitat Miller C, Valasek C (2013) Adventures in automotive networks and control units. DefCon 21:260–264 Miller C, Valasek C (2013) Adventures in automotive networks and control units. DefCon 21:260–264
26.
Zurück zum Zitat Miller C, Valasek C (2014) A survey of remote automotive attack surfaces. Black Hat USA 2014:94 Miller C, Valasek C (2014) A survey of remote automotive attack surfaces. Black Hat USA 2014:94
27.
Zurück zum Zitat Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015:91 Miller C, Valasek C (2015) Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015:91
28.
Zurück zum Zitat Miller C, Valasek C (2016) CAN message injection. Black Hat USA Miller C, Valasek C (2016) CAN message injection. Black Hat USA
29.
Zurück zum Zitat Osborne C (2018) NonPetya ransomware forced Maersk to reinstall 4000 servers, 45000 PCs. ZDNet Osborne C (2018) NonPetya ransomware forced Maersk to reinstall 4000 servers, 45000 PCs. ZDNet
Metadaten
Titel
Cyber Security in Aviation, Maritime and Automotive
verfasst von
Martti Lehto
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37752-6_2

    Premium Partner