strategies for maritime cyber security leveraging the other...

24
Strategies for Maritime Cyber Security – Leveraging the Other Modes Michael Dinning The National Transportation Systems Center Advancing transportation innovation for the public good U.S. Department of Transportation Office of the Secretary of Transportation John A. Volpe National Transportation Systems Center Innovative Technologies for a Resilient Marine Transportation System June 24, 2014

Upload: others

Post on 17-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

Strategies for Maritime Cyber Security –

Leveraging the Other Modes

Michael Dinning

The National Transportation Systems Center

Advancing transportation innovation for the public good

U.S. Department of Transportation

Office of the Secretary of Transportation

John A. Volpe National Transportation Systems Center

Innovative Technologies for a Resilient Marine Transportation System June 24, 2014

Page 2: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

2

First a test.

Can you...

Page 3: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

3

Navigate with this?

Page 4: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

4

…without a computer?

Find your container…

Page 5: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

5

…without a computer?

Load your ship…

Page 6: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

6

Maintain fluidity …without automation?

Page 7: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

7

If not, you need to pay attention to cyber security because…

Image Credit: http://wendycason.com

Page 8: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

8

Dependent on IT & control systems

when afloat

Image Credit: http://www.interschalt.de/grafiken/3Dship_n_gr.gif

Page 9: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

9

Dependent on IT & control systems

when ashore

Cargo handling equipment

Automated cargo handling

equipment

Port security and access

controls

Commercial trucks

Terminal Operating

Center

Shore-based safe vessel operation systems

(i.e. GPS, locks and dams, etc.)

Container cranes

Cargo tracking systems

Page 10: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

10

Cyber attacks have targeted

maritime supply chains

Employee awareness and security controls are critical

Coordination of cyber and physical security is key

Page 11: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

11

June 19, 2014: The FCC issues its largest fine in history ($34.9M) to a company selling signal jammers.

GPS is vulnerable to

jamming & spoofing

Page 12: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

12

Cyber security requires a

life-cycle approach

12

Risk Assessment

Security Architecture

System Prioritization

Remediation &

Implementation Security Policy

Security Training

Incident Response & Recovery

Intrusion Detection

Assess

Implement

Design

O

per

ate

Risk Management

Program

Page 13: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

13

Best practices in other modes

Risk Assessment

Security Architecture

System Prioritization

Remediation &

Implementation Security Policy

Security Training

Incident Response & Recovery

Intrusion Detection

Assess

Implement

Design

O

per

ate

Risk Management

Program

Page 14: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

14

What are the vulnerabilities & risks?

Page 15: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

15

Airport Controls Systems (CS)

e-Enabled Aircraft Control

Systems (CS)

Airport Lighting and Monitoring Control System (ALMCS)

ARINC Gatelink

Baggage Handling System (BHS)

TRAM

Example: identifying vulnerabilities in

aviation

Electronic Flight Bag (EFB)/IPad

Avionics - Wireless

Page 16: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

16

Example: identifying vulnerabilities in

automobiles

Volpe Center Cyber Security Lab

Page 17: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

17

DHS/NIST framework for cyber

security & cyber resilience reviews

Cyber Resilience Review 1. Asset Management 2. Configuration & Change Management 3. Risk Management 4. Controls Management 5. Vulnerability Management 6. Incident Management 7. Service Continuity Management 8. External Dependencies Management 9. Training and Awareness 10. Situational Awareness

Voluntary Framework

Page 18: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

18

Cyber Security Evaluation Tool (CSET)

Assesses cybersecurity programs against standards & recommendations

Aviation Pipeline

Maritime Highway

Page 19: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

19

How can the risks be mitigated?

Recommended practices

Page 20: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

20

How do we create awareness?

Smokey the Cybear

Save Our Systems

Page 21: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

21

Need to address human systems

integration

How do we recognize system failures and/or attacks? Do we have “down time procedures”?

Royal Majesty grounding when GPS failed

Page 22: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

22

How do we respond to threats?

Page 23: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

23

What should the maritime community do to

develop & implement a cyber security strategy?

• Identify vulnerabilities

• Develop and evaluate controls

• Compile recommended practices

• Develop training for maritime IT & control systems

• Develop and exercise response capabilities

Assess overall risk & resilience

Page 24: Strategies for Maritime Cyber Security Leveraging the Other Modesonlinepubs.trb.org/onlinepubs/conferences/2014/MTS2014/Dinning.pdf · Strategies for Maritime Cyber Security – Leveraging

24

Michael Dinning

U.S. Department of Transportation

John A. Volpe National Transportation Systems Center

55 Broadway, Cambridge, MA 02142

[email protected]

617-494-2422 (w)

617-694-7518 (m)

The ideas in this briefing are the personal thoughts of the author, not the United States Department of Transportation. The United States Government does not endorse products or manufacturers. Trade or manufacturers’

names appear solely to illustrate the concepts presented in the briefing.