Tackling cybersecurity in the ITS sector

Kyle Stetar blog author image
6월 30, 2023

It’s time for the ITS sector to re-think and modernize network security to protect against today’s cybersecurity threats.

ITS Americas blog

The unsettling times of the past two years have highlighted the cracks in our IT networks for nefarious actors to rear their ugly heads and unleash a torrent of cyberattacks. In fact, a recent report indicated that cyber incidents have risen a whopping 600 percent over this dark period.

As the world settles into its new normal, industries are being challenged to re-visit their network security strategies. In the Intelligent Transportation Systems (ITS) sector that means re-thinking and modernizing network security to guard against today’s threats.

Previously, launching a cyberattack of this scale would have required significant resources only available to state actors or large organizations. However, today’s tools are more easily accessible and ready to exploit vulnerabilities. Each connection comes with a cybersecurity risk ― at some level. And as transportation becomes more connected, with vehicles that exchange information in real-time with other vehicles and with infrastructure, opportunities to take down entire transportation ecosystems will only rise. With each connected system and subsystem, and the proliferation of new technologies into transportation networks, the need for robust cybersecurity measures increases. To increase efficiency and automation, the convergence of Operational Technology (OT) and Information Technology (IT) will accelerate, and more systems will be integrated with the connected road, remotely supervised by the Operation Control Centre (OCC).

Trust no one

A solid approach to cyber defense in the transportation industry must consider the data network since that’s where most cyber exploits originate. Understanding network vulnerabilities lets IT personnel head off attacks before they can affect mission-critical systems and impact public safety. For example, if a network switch is left at the default configuration a hacker only needs to download the readily available user manual to find potential security gaps and infiltrate the system.

Additionally, IT need to consider a rules-based security strategy with a layered approach to access that ensures root users, super admins, and admin-level users are clearly defined, and that the levels of access control are consistently enforced.

A zero trust network security strategy can safeguard the organisations’ resources, as well as the network, by focusing on protecting access to the resources. Zero trust assumes attackers are already present and ready to attack — there is no implicit trust. Micro- and macro-segmentation ensures access is limited to the resources needed when the request is made. Zero trust applies multiple layers of security protection equally to every internal and external person, system, subsystem, application, and device that attempts to access the network. For example, if someone wants to connect with a camera to which they do not have access, an intelligent network switch can detect and reject that attempt. Such systems can also inspect within the packet to determine whether certain traffic is allowed. Additionally, all network resources are continuously scanned for unusual or malicious activities.

While each transportation operator’s requirements are unique, the following five elements are critical steps for assessing and implementing a security strategy:

1. Monitor: Identify data types, applications, assets, and network services to be protected

2. Validate: Assess data flows, including cloud environments and how network resources interact

3. Plan: Architect and segment the network around data types, applications, assets and services

4. Simulate: Develop and test the policies to verify they protect all network resources

5. Enforce: Continuously monitor to detect violations, remediate and strengthen the policy

Security baked-in

At Alcatel-Lucent Enterprise we are helping transport operators modernize their ITS networking vision with built-in security protection. We deliver reliable, high-level functionality, greater resilience and network security by design, even in the most challenging transportation conditions. The Alcatel-Lucent OmniSwitch® family of switches takes enterprise-grade functionality from the data centre all the way to the edge with the OmniSwitch 6865 and OmniSwitch 6465 families developed to support mission-critical applications that need to operate in extreme environments. These switches can withstand challenging indoor/outdoor, extreme heat/cold transportation environments, while intelligent software ensures reliable performance and security. Additionally, these rugged switches can be stacked to create a virtual chassis and are specifically designed for transportation and traffic control systems.

The ALE OmniSwitch family is field-proven and globally deployed across all industries. ALE products undergo real-world trials, including penetration testing to address today’s growing cyber threat. But security isn’t just about our products. A newly formed organization within ALE is working to ensure that security is integrated and managed at the organizational level. This cultural approach to security sets us apart from our competitors. From designers to developers, ALE incorporates security considerations at every level, ensuring cyber protections are intrinsic at every stage, from design through to support.

ALE’s robust networking solutions deliver the protection needed to make ITS a reality today and help transport operators evolve toward a safer, more secure tomorrow.

Kyle Stetar blog author image

Kyle Stetar

Director of Strategic Partnerships, Transportation

Kyle has more than 15 years experience in commercial leadership and applications engineering for transportation systems including Intelligent Transportation Systems, Mass-Transit and Aerospace, and is passionate about improving mobility outcomes with technology for good.

저자에 대해

최신 블로그

a man and a woman looking at a laptop
교육

랜섬웨어 시대 캠퍼스 사이버 보안에 맞서다

캠퍼스 사이버 보안 위협을 줄이기 위한 전략을 사용하면 악의적인 사용자 액세스를 제한하고 노출을 줄이는 데 도움이 될 수 있습니다. 

Blog 1200x299
Autonomous Network

Wi-Fi 6란 무엇이며 왜 관심을 가져야 할까요?

802.11 ax는 차세대 무선 네트워크 표준인 Wi-Fi 6입니다. 이 표준의 이점에 대해 읽어보고 팟캐스트에서 전문가들의 의견을 들어보세요.

Blog 1200x299
WLAN

비즈니스 운영과 직원의 안전을 동시에 유지하는 법

위기의 시대에 간단하고 안전한 원격 네트워킹 솔루션으로 끈김없는 비즈니스 운영과 직원의 안전을 동시에 실현할 수 있습니다.

solid-public-wifi-banner
IoT

강력한 공용 Wi-Fi 네트워크를 구축하는 방법

모바일 및 IoT 연결의 보편화가 도시의 Wi-Fi 환경에 부담을 가중하고 있습니다.  아래에서 강력한 공용 Wi-Fi 네트워크를 구축하는 방법에 대해 알아보세요.

Tags - 보안

Chat