Global Satellite Services
|
|
- Antonia Ramsey
- 5 years ago
- Views:
Transcription
1 Global Satellite Services Position Integrity & The World of Spoofing Daan Scheer Global Strategic Businesss Development Satellite Positioning & Integrity
2 Content 1. Location revolution 2. World of Spoofing 3. Mitigation 4. SATGUARD - NMA Proposition NMA - Navigation Message Authentication 5. Fugro & Asset integrity 2
3 A changing world IoT, Autonomous navigating assets, Smart cities & harbours, Electronic road pricing, all with location as a centerpiece Over the coming decade processes and systems will rely more and more on quality positioning and equally those are exposed to more cyber attack related risks; Position Integrity is a clear necessity 3
4 Imagine NO Geolocation service or a WRONG position! 4
5 Imagine NO Geolocation service or a WRONG position! The line is First In First Out, meaning the next request will go to the Uber cab who has been waiting the longest and is in the waiting area (in blue): International airport Penang, Malaysia Your location within the airport / pickup lot does not affect your position in the queue, however you will not receive dispatches unless you are in the waiting area 5
6 World of Spoofing 6
7 The world of spoofing - Likelihood Self-spoofing (Uber case) or Being spoofed? Who is the attacker & What is objective? What are the Attacker s skills & What resources available? Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015) 7
8 The world of spoofing - Variables Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015) 8
9 The world of spoofing - Use cases Low Value Asset Tracker: o Tamper motivated, tracking (Insurance telematics, ERP, vehicle fleet & fishing vessel tracking) High Value Asset Tracking: o Non-tampered, externally spoofed, tracking (High value goods or vehicles / trains) Portable Tracker: o Constrained on power, tamper motivated, tracking (Tagging) High Value Positioning: o Non-tampered, externally spoofed, positioning (Autonomous driving, dynamic positioning (rig)) GNSS Disciplined Timing: o Power & financial transactions 9
10 The world of spoofing - Threat sources Individual Operator: o Driver avoiding being tracked o Limited resource and little technical ability Lone Criminal: o Motivated by financial gain Prestige Attacker: o Hacker, academic, journalism o Motivated by publicizing their achievement o Moderate resources but significant technical ability Organized Crime: o Motivated by financial gain and possess sizeable resources Organized Attacker: o Terrorists or foreign intelligence services o Motivated by the disruptive effect of the attack, potentially unlimited resources and ability. 10
11 The world of spoofing - Likelihood score Uber case Attack likelihood: Extreme (4), High (3), Moderate (2), Low (1), or Negligible (0) 11 Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015)
12 The world of spoofing - Countermeasures Full Position Integrity Cryptographic source External-data aided position qualification Authentication of signal & message 12
13 Fusion of systems for maximal resilience GNSS Navigation Message (NM) Ephemeris (incl. Time & Clock) Satellite health IMU Inertial sensor aid Full system resilience GNSS Authentication Other signals Software System (positioning) software & Receiver Autonomous Integrity Monitoring Other sensors Video, Radar, Ultrasonic, Lidar & Map match GNSS Signal Pseudo range GNSS Augmentation Corrections, Satellite Health, Real time & Extended ephemeris 13
14 Navigation Message Authentication Ensures the received GNSS signals carry the correct messages Authenticity of messages established using a global GNSS receiver network Digital signature information produced for authenticated messages Signature information distributed to the user User checks that received navigation message matches signature Observe in Fugro s global reference network & broadcast digital signature 14
15 Spoofing complexity GNSS receivers & spoofing detection methods Multiple spoofing signals and/or at multiple locations (Self) spoofing using synchronised signals RAIM & IMU other external aids (signals & sensors) Pseudo range Authentication (Dual Antenna or CRPA) Re-transmission (Self) spoofing using pre-recorded (Self) spoofing using signal generator Change ephemeris for use in Assisted GPS Navigation Message Authentication Receiver technology Mass market - Land Low-end High-end 15
16 Fugro people and equipment 10,000 Employees 26 Vessels 98 CPT Trucks 40 Laboratories 28 Jack-up Platforms 16 R+D centres 239 Land-based Drill Rigs 18 Offshore Drill Rigs 119 ROVs 5 AUVs 169 Offices Source: Fugro AR
17 Multiple applications are vulnerable Website & use cases 17
18 Position critical processes need reliable location services Navigation Message Authentication provides a clear yes or no as to spoofing detection in all receiver domains and adds redundancy to the system 18
19 We are Fugro proud to provide geo-intelligence, location services and asset integrity solutions to contribute to a liveable world Daan Scheer
The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationESOA > The Connected Automobile. Connected Automobiles Market Overview Paul Gudonis, Global Network & Services
ESOA > The Connected Automobile Connected Automobiles 2016 Market Overview Paul Gudonis, Global Network & Services Policy @ESOA_SAT ESOA Members CIS Space Systems Satellite CommunicaEons Services TV &
More informationThe Australian Government s Approach to Critical Infrastructure Resilience
The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General
More informationState of play of the European GNSS
State of play of the European GNSS Tachograph forum Flavio SBARDELLATI, GSA Market Development 3 December 2018, Brussels GSA in a nutshell What? Gateway to Services Galileo & EGNOS Operations and Service
More informationCertification of EGNSS Timing Receivers and Services
Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint
More informationSpoofing GNSS Timing Receivers
Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical
More informationThe Information Age has brought enormous
Cyber threat to ships real but manageable KAI hansen, akilur rahman If hackers can cause laptop problems and access online bank accounts or credit card information, imagine the havoc they can wreak on
More informationUpdate on LBS Location based services and IoT Internet of Things
Update on LBS Location based services and IoT Internet of Things This presentation can be interpreted only together with the oral comments accompanying it GNSS is considered a commodity inside smartphones
More informationMachine-Based Penetration Testing
Always in Control CyBot Suite Machine-Based Penetration Testing www.cronus-cyber.com - April 2016 CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path
More informationAssessing the Civil GPS Spoofing Threat
Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell
More informationSECURING THE CONNECTED ENTERPRISE.
SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE
More informationS e c u rity S o lu tio n s
1 S e c u rity S o lu tio n s Introduction to security 2 Why Security Is Necessary? Following question may be familiar to some people Doing all that security is expensive and generates no money. Do we
More informationMachine-Based Penetration Testing
Always in Control CyBot Suite Machine-Based Penetration Testing CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: CyBot
More informationPort Facility Cyber Security
International Port Security Program Port Facility Cyber Security Cyber Risk in the Marine Transportation System MAR'01 1 Objectives IDENTIFY motivations behind a cyber attack. IDENTIFY various types of
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationHigh Quality Positioning: a Key to Success for Autonomous Driving
High Quality Positioning: a Key to Success for Autonomous Driving SaPPART final workshop Alberto Fernandez Wyttenbach Brussels, 4 October 2017 This presentation can be interpreted only together with the
More informationUnit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 3 - revised September 2016 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning
More informationCYBER SECURITY AWARENESS IN THE MARITIME INDUSTRY
CYBER SECURITY AWARENESS IN THE MARITIME INDUSTRY A joint production by DNV GL and GARD 1 SAFER, SMARTER, GREENER STRUCTURE STATUS ON CYBER SECURITY IN MARITIME SHIPPING Risk scenarios (threats) Best practices
More informationGPS SPOOFING: NO LONGER A FISH STORY
SESSION ID: MBS-F03 GPS SPOOFING: NO LONGER A FISH STORY Michael Shalyt CEO and Co-Founder Aperio Systems @MShalyt Outline Intro the world is being measured. Good examples of bad data. GPS forgery and
More informationSecuring connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity
Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems
More informationCybersecurity, safety and resilience - Airline perspective
Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,
More informationInertial Systems. Ekinox Series TACTICAL GRADE MEMS. Motion Sensing & Navigation IMU AHRS MRU INS VG
Ekinox Series TACTICAL GRADE MEMS Inertial Systems IMU AHRS MRU INS VG ITAR Free 0.05 RMS Motion Sensing & Navigation AEROSPACE GROUND MARINE Ekinox Series R&D specialists usually compromise between high
More informationScience & Technology Directorate: R&D Overview
Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology
More informationEGNSS Mass Market Applications - Mobility as a service and Smart cities, IoT, Commercial and Social LBS
EGNSS Mass Market Applications - Mobility as a service and Smart cities, IoT, Commercial and Social LBS Justyna Redelkiewicz Market Segment Officer, LBS and IOT 5 October 2016 The 2017 H2020 Call for applications
More informationCyBot Suite. Machine-based Penetration Testing
CyBot Suite Machine-based Penetration Testing CYBOT PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: CyBot Pro CyBot Enterprise
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationTHIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA
THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing
More informationGalileo Open Service Authentication: A Complete Service Design and Provision Analysis
Galileo Open Service Authentication: A Complete Service Design and Provision Analysis P. Walker, CGI; V. Rijmen, University of Leuven; I. Fernández-Hernández, L. Bogaardt, European Commission; G. Seco-Granados,
More informationSensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016
Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationLocation-Specific Cyber Risk
Location-Specific Cyber Risk Lincoln Kaffenberger Cyber Threat Intelligence Officer IMF Information Security Group John Kupcinski Director, Cyber Security KPMG 1 Agenda Why assess the cyber risks by a
More informationStrategies for Maritime Cyber Security Leveraging the Other Modes
Strategies for Maritime Cyber Security Leveraging the Other Modes Michael Dinning Innovative Technologies for a Resilient Marine Transportation System June 24, 2014 The National Transportation Systems
More informationInsider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm
Insider Threat Program: Protecting the Crown Jewels Monday, March 2, 2:15 pm - 3:15 pm Take Away Identify your critical information Recognize potential insider threats What happens after your critical
More informationRailroad Infrastructure Security
TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationRobert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group
Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity
More informationLANDINS Georeferencing and Orientation System
LANDINS Georeferencing and Orientation System LANDINS Georeferencing and Orientation System Landins is a simple, turnkey position and orientation system for land-based mobile applications. It offers dependable
More informationThreat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017
Threat analysis Tuomas Aura CS-C3130 Information security Aalto University, autumn 2017 Outline What is security Threat analysis Threat modeling example Systematic threat modeling 2 WHAT IS SECURITY 3
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationQualification Specification. Level 2 Award in Cyber Security Awareness For Business
Qualification Specification Level 2 Award in Cyber Security Awareness For Business ProQual 2016 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment
More informationGerman OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer
German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer
More informationAutonomy & Operational Sustainability
Autonomy & Operational Sustainability Whether you are in the business of Energy, Utilities, Communications, Smart Infrastructure or Commerce, the one thing you want is for your systems to continue working.
More informationM-2-M-2-People. How Mobility Enables Visibility. Daniel Munyan Director, M2M Center of Excellence Computer Sciences Corporation 6/1/2012 1
M-2-M-2-People How Mobility Enables Visibility Daniel Munyan Director, M2M Center of Excellence 6/1/2012 1 The Timeless Challenge of Logistics Achieving Enterprise Visibility / Situation Awareness Tracking
More informationGPS Vulnerability Report
GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements
More informatione:
t: @crosswordcyber e: tom.clark@crosswordcybersecurity.com Risk Analysis Tool: www.rizikon.com Research Database: https://clue.crosswordcybersecurity.com The View From 2018 An exercise to identify emerging
More informationUAS Operation in National Air Space (NAS) Secure UAS Command and Control
UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,
More informationChapter 1. Chapter 2. Chapter 3
Contents Preface ix Chapter 1 Terrorism 1 Terrorism in General 2 Definition of Terrorism 3 Why Choose Terrorism 4 Goals of Terrorists 5 Selection of Targets and Timing of Attacks 6 Perpetrators 7 Weapons
More informationEnhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationTHE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE
THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into
More informationPatient Information Security
Patient Information Security An overview of practice and procedure UK CAB Meeting 13th April 2012 Nathan Lea Senior Research Associate CHIME, UCL Overview - Questions that have been asked What happens
More informationOverview Brosix stringent corporate security requirements.
Brosix Security Data security is a high priority at Brosix, enabling us to con nue achieving the goal of providing efficient and secure online real me communica on services. Table of Contents Overview
More informationRisk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs
Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs Ali Behfarnia and Ali Eslami Department of Electrical Engineering and Computer Science Wichita State University, Wichita, KS, USA Email:
More informationDigiTraq STA. SIGFOX Ready GPS Tracker. Or Contact us: Please visit the HidnSeek Website for more info:
DigiTraq STA SIGFOX Ready GPS Tracker Please visit the HidnSeek Website for more info: www.hidnseek.fr Or Contact us: contact@hidnseek.fr FEATURES Built-in with IP67 enclosure DigiTraq SIGFOX Ready GPS
More informationCyber Security: Threat and Prevention
Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will
More informationMGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?
MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp 22 nd June
More informationPresented by Joe Burns Kentucky Rural Water Association July 19, 2005
Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationEvaluation of the Existing CORS Network Infrastructure in Singapore to Meet User Demand Singapore Land Authority Presenter: Victor Khoo
Evaluation of the Existing CORS Network Infrastructure in Singapore to Meet User Demand Dr Victor Khoo Senior Principal Surveyor 1 Presenter: Objective Why need to review? To stay relevant and meet users
More informationForensics and Active Protection
Forensics and Active Protection Computer and Network Forensics Research Project 2003 Work Update Yanet Manzano Florida State University manzano@cs.fsu.edu manzano@cs.fsu.edu 1 Outline CNF Project Goal
More informationDigital Strategies for Development in Asia and the Pacific
Digital Strategies for Development in Asia and the Pacific Bambang Susantono Vice President Knowledge Management and Sustainable Development Let s Imagine a Child in 2030 S/He learns through smart holographic
More informationAbout Cronus Cyber Technologies
CyBot Pro About Cronus Cyber Technologies Cronus Cyber is a software product company that develops software solutions for the Automated Penetration Testing market place. Cronus Cyber is a leading provider
More informationCyber and information security applicable for the maritime sector
MARITIME Cyber and information security applicable for the maritime sector Svante Einarsson 1 SAFER, SMARTER, GREENER Introduction 2 The tip of the iceberg 2015: 64,199 reported IT Security incidents just
More informationVehicle Area Networks:
Vehicle Area Networks: Making the Environment Smart Vehicle Area Networks: Making the Environment Smart Public safety and commercial fleets increasingly rely on mobile communications between headquarters
More informationSMART Ship Program. Najmeh Masoudi Cyber safety and security manager. Palazzo S. Giorgio - Genova, 28/06/ Copyright Bureau Veritas
SMART Ship Program Palazzo S. Giorgio - Genova, 28/06/2017 Najmeh Masoudi Cyber safety and security manager Biography Najmeh Masoudi Cyber safety and security project manager Bureau Veritas Marine & Offshore
More informationBusiness Continuity Planning Keeping Pace with New Technology
Business Continuity Planning Keeping Pace with New Technology Old issues, new threats Force Majeure Increasing severe weather incidents, terrorist attacks Legacy modernization Cutover issues, system crashes,
More informationNOSAC. Phase I and Phase II FINAL REPORT
NOSAC Cyber Security / Cyber Risk Management Sub-Committee Phase I and FINAL REPORT March 30, 2016 Background NOSAC Subcommittee on Cybersecurity/Cyber Risk set up April 8, 2016 Co-Chairs: Kelly McClelland
More informationDesigning for the Industrial Internet Accelerating the Industrial Internet of Things
Accelerating the Industrial Internet of Things 338 West Nanjing Road, 2707-09 Shanghai 200041 China www.iotone.com IoT enables Industrie 4.0. 2 Why IoT? The Internet enabled people to share information
More informationUNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)
UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection
More informationSmart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong
Smart Cards By: Definition Smart cards, chip card, or integrated circuit card (ICC) are card with embedded integrated circuits that contain a computer chip capable of carrying out a cryptographic protocol.
More informationNYDFS Cybersecurity Regulations: What do they mean? What is their impact?
June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing
More informationEuropeanizing Transport Security
Young Researchers Seminar 2013 Young Researchers Seminar 2011 Lyon, France, June 5-7 2013 DTU, Denmark, June 8-10, 2011 Europeanizing Transport Security Policy and Research Recommendations Samuel Rothenpieler,
More informationTo Audit Your IAM Program
Top Five Reasons To Audit Your IAM Program Best-in-class organizations are auditing their IAM programs - are you? focal-point.com Introduction Stolen credentials are the bread and butter of today s hacker.
More informationINTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY
INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY VERSION 2.2 OCTOBER 2001 SUMMARY Software is easy to tamper with and reverse engineer so unprotected software deployed on malicious hosts can t be trusted by corporations
More informationMeasuring the World: Designing Robust Vehicle Localization for Autonomous Driving. Frank Schuster, Dr. Martin Haueis
Measuring the World: Designing Robust Vehicle Localization for Autonomous Driving Frank Schuster, Dr. Martin Haueis Agenda Motivation: Why measure the world for autonomous driving? Map Content: What do
More informationCHIEF INFORMATION OFFICER
OFFICE OF THE CHIEF INFORMATION OFFICER DEPARTMENT OF HEALTH AND HUMAN SERVICES U. S. D E P A R T M E N T O F H E A L T H A N D H U M A N S E R V I C E S Public-Private Collaboration - Bridging the Gap
More informationKorea ICT Market Overview. Yoonmi Kim Finpro Korea
Korea ICT Market Overview Yoonmi Kim Finpro Korea 5G Advanced Network Key Players Network Service Provider Electronics Company Car and Car Component Company - 5G Antenna Technoloies for Mobile device and
More informationSM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk. Doug Haines Haines Security Solutions 9 April 2013
SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk Doug Haines Haines Security Solutions 9 April 2013 The Broad Picture Learning Objectives Know the differences
More informationElectronic and Mission Systems
Electronic and Mission Systems Boeing Networks, Space, and Security Small Business Workshop Bob Tamaru November 8, 2011 Where We Fit In Boeing Boeing Military Aircraft AEW&C P-8A C-17 Italy Japan 7A7 F-18
More informationDriveLinQ Driver Manual For Cabmate Customers
DriveLinQ Driver Manual For Cabmate Customers Mobile Knowledge Systems Inc. Suite 100-11 Hines Rd, Kanata, Ontario, Canada, K2K 2X1 Copyright Copyright 2014 Mobile Knowledge Systems Inc. All Rights Reserved.
More informationMaritime cyber security: Threats & Opportunities. Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant
Maritime cyber security: Threats & Opportunities Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant Agenda Cyber threats to the marine industry Attack surface overview (harbour / ships
More informationSingapore Autonomous Vehicle Initiative (SAVI)
Singapore Autonomous Vehicle Initiative (SAVI) Dr Chin Kian Keong Group Director, Transportation and Road Operations CHIN_Kian_Keong@lta.gov.sg 1 Singapore ASIA Singapore Land area: 719 m 2 Population:
More informationInternet of Things (IoT) Securing the Connected Ecosystem
Internet of Things (IoT) Securing the Connected Ecosystem June 2018 Making sense of the buzzwords: What is the Internet of Things Internet of Things (IoT) refers to a world of intelligent, connected devices
More informationReal Time Traffic Information Delivered to the Dashboard
REAL TIME TRAFFIC INFORMATION DELIVERED TO THE DASHBOARD Martin O Hara Senior Design Consultant Trafficmaster PLC, Cranfield, England INTRODUCTION Trafficmaster are the UK s premier supplier of traffic
More informationHeavy Vehicle Cyber Security Bulletin
Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationThink Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe
Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity
More informationMODAInnovations Complete Academic Project Solutions
MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In
More informationBusiness Continuity Management
Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?
More informationENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE
ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our
More informationTransportation Security Risk Assessment
Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction
More informationDesigning a GPS Receiver Network with GNSS Algorithm for Accuracy and Safety
International Global Navigation Satellite Systems Society IGNSS Symposium 2007 The University of New South Wales, Sydney, Australia 4 6 December, 2007 Designing a GPS Receiver Network with GNSS Algorithm
More informationSecurity Policies and Procedures Principles and Practices
Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability
More informationSecurity analysis and assessment of threats in European signalling systems?
Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide
More information