{"id":5177,"date":"2016-02-12T18:47:43","date_gmt":"2016-02-12T18:47:43","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5177"},"modified":"2020-02-26T11:05:23","modified_gmt":"2020-02-26T16:05:23","slug":"securing-smart-city-transport-two-studies","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/securing-smart-city-transport-two-studies\/5177\/","title":{"rendered":"Securing smart city transport: two studies"},"content":{"rendered":"<p><a href=\"https:\/\/business.kaspersky.com\/smart-city-security-1\/4874\/\" target=\"_blank\" rel=\"noopener nofollow\">Securing Smart Cities<\/a>, a not-for-profit global initiative that aims to solve the existing and future cybersecurity problems of smart cities, has <a href=\"https:\/\/www.kaspersky.com\/about\/news\/press\/2016\/Securing-Smart-Cities-consults-ENISA-on-cyber-security-and-the-resilience-of-Intelligent-Public-Transport\" target=\"_blank\" rel=\"noopener nofollow\">contributed<\/a> to two studies of The European Union Agency for Network and Information Security (ENISA) on the cybersecurity of public transport in a smart city.<\/p>\n<p>We previously posted about the Securing Smart Cities initiative just last December. Smart City is a long-standing concept which is becoming a reality. However, the path to realization may become hugely problematic, and may potentially lead to large-scale disasters unless approached the right way. What is \u2018right\u2019 here?<\/p>\n<p>It should come as no surprise that the main concern for Kaspersky Lab and our partners within SSC initiative is related to the cybersecurity of the \u201csmart\u201d infrastructure.<\/p>\n<p>In fact, this infrastructure in general and so-called \u201cintelligent public transport\u201d (IPT) in particular relies heavily on network communications and IT. Because of this, \u201csmart\u201d transportation systems become \u201ca natural target\u201d for cyberthreats that will have an impact \u201cnot only on the operations of the transport service, but also on the whole economy and potentially on the health and safety of citizens\u201d.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Securing smart city transport: two studies #smartcity<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F5bni&amp;text=Securing+smart+city+transport%3A+two+studies+%23smartcity\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It is therefore vital that cybersecurity is an important part of all smart transport projects from their very conception.<\/p>\n<p>Despite gains, connectivity may fall victim to a cyberattack unless counter-measures are established by default along the whole perimeter. To ensure this perimeter\u2019s security \u2013 and the proper level of resilience \u2013 risks should be properly assessed and all possible \u201centry points\u201d and targets acknowledged.<\/p>\n<p>But there are no established policies of ensuring cybersecurity on transport in EU for now \u2013 the awareness level is low and it is difficult for operators to dedicate budget to this specific objective.<\/p>\n<p>Both ENISA studies are there to help. The first one \u201cproposes a pragmatic approach that will highlight the critical assets of Intelligent Public Transport systems\u201d, giving an overview of the existing security measures (good practices) that could be deployed to protect these critical assets and ensure security of the IPT system, based on a survey and interviews of experts from the sector, municipalities, operators, manufacturers, and policy makers.<\/p>\n<p>It is important to mention that \u201cGood practices\u201d are not limited to technical measures: they also integrate policies, standards, operational, and organizational measures for the involved parties, so that they could more easily understand which critical assets to protect and how.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Both studies address best practices in regard to #smartcity transportation systems security. These practices are applicable elsewhere too<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F5bni&amp;text=Both+studies+address+best+practices+in+regard+to+%23smartcity+transportation+systems+security.+These+practices+are+applicable+elsewhere+too\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The study identifies critical assets of intelligent transport systems from a business and societal point of view and highlights good security practices against cyberthreats.<\/p>\n<p>The second study states its objective is \u201cto model the architecture of the transport sector\u201d in smart cities and \u201cto describe good cyber security practices of IPT operators.\u201d<\/p>\n<p>The good practices are put into a relationship with different city maturity levels, so that representatives of operators and municipalities can quickly assess whether or not they lag behind other cities with the same maturity level in terms of cyber security and, if so, to take appropriate actions.<\/p>\n<p>We thought\u00a0these studies might be\u00a0interesting to all IT-related businesses. Feel free to familiarize yourselves with them via these links:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/smart-infrastructures\/intelligent-public-transport\/good-practices-recommendations\" target=\"_blank\" rel=\"noopener nofollow\">\u201cCyber Security and Resilience of Intelligent Public Transport\u201d<\/a><\/li>\n<li><a href=\"https:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/smart-infrastructures\/intelligent-public-transport\/smart-cities-architecture-model\" target=\"_blank\" rel=\"noopener nofollow\">\u201cArchitecture Model of the Transport Sector in Smart Cities\u201d<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Securing Smart Cities has contributed to two studies of The European Union Agency for Network and Information Security (ENISA) on the cybersecurity of public transport in a smart city.<\/p>\n","protected":false},"author":209,"featured_media":15463,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2391,2392,2313],"class_list":{"0":"post-5177","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-enisa","10":"tag-securing-smart-cities","11":"tag-smartcity"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/securing-smart-city-transport-two-studies\/5177\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/securing-smart-city-transport-two-studies\/5177\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/securing-smart-city-transport-two-studies\/5177\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/enisa\/","name":"ENISA"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5177"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5177\/revisions"}],"predecessor-version":[{"id":33635,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5177\/revisions\/33635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15463"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}