原文传递 SURVIVABILITY OF INTELLIGENT TRANSPORTATION SYSTEMS.
题名: SURVIVABILITY OF INTELLIGENT TRANSPORTATION SYSTEMS.
作者: Smith-BL; Sielken-RS
关键词: Best-practices; Case-studies; Cyber-attack; Emergency-preparedness; Information-technology; Intelligent-transportation-systems; National-its-architecture; Prevention-; Protection-; Recommendations-; Security-; Threats-
摘要: Intelligent Transportation Systems (ITS) are being deployed around the world to improve the safety and efficiency of surface transportation through the application of advanced information technology. The introduction of ITS exposes the transportation system to new vulnerabilities, such as cyber attack. In order to ensure that ITS fulfills its potential, it is imperative that those implementing such systems design and operate them to survive cyber attacks and other information technology-related threats. Information system survivability is defined as the capability of a system to fulfill its mission in a timely manner in the presence of attacks, failures, or accidents. While total survivability may not be achievable, it can be greatly increased with conscientious efforts. This study reviewed previous survivability research on ITS and information systems, examined the National ITS Architecture for survivability issues, and performed case studies of a number of regional ITS systems. Results from these sources were synthesized into the final recommendations contained in this report. These recommendations include: (a) Requirements: Resistance, Recognition, Recovery, and Adaptation. Virginia Department of Transportation should include requirements in the categories of resistance, recognition, recovery, and adaptation in all future system requests for proposals (RFPs); (b) Survivability Program. Each ITS system should have a survivability program that includes both technical and nontechnical elements; and (c) Best Practices. In addition to proper requirements and a survivability program, the best practices developed for general information technology applications should be used. Best practices include security (physical and system), design/requirements, redundancy, system configuration, and the principle of least privilege.
总页数: 1999/10. 9809-9910 pp20 (2 Tab., Refs.)
报告类型: 科技报告
检索历史
应用推荐