Global Satellite Services

Size: px
Start display at page:

Download "Global Satellite Services"

Transcription

1 Global Satellite Services Position Integrity & The World of Spoofing Daan Scheer Global Strategic Businesss Development Satellite Positioning & Integrity

2 Content 1. Location revolution 2. World of Spoofing 3. Mitigation 4. SATGUARD - NMA Proposition NMA - Navigation Message Authentication 5. Fugro & Asset integrity 2

3 A changing world IoT, Autonomous navigating assets, Smart cities & harbours, Electronic road pricing, all with location as a centerpiece Over the coming decade processes and systems will rely more and more on quality positioning and equally those are exposed to more cyber attack related risks; Position Integrity is a clear necessity 3

4 Imagine NO Geolocation service or a WRONG position! 4

5 Imagine NO Geolocation service or a WRONG position! The line is First In First Out, meaning the next request will go to the Uber cab who has been waiting the longest and is in the waiting area (in blue): International airport Penang, Malaysia Your location within the airport / pickup lot does not affect your position in the queue, however you will not receive dispatches unless you are in the waiting area 5

6 World of Spoofing 6

7 The world of spoofing - Likelihood Self-spoofing (Uber case) or Being spoofed? Who is the attacker & What is objective? What are the Attacker s skills & What resources available? Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015) 7

8 The world of spoofing - Variables Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015) 8

9 The world of spoofing - Use cases Low Value Asset Tracker: o Tamper motivated, tracking (Insurance telematics, ERP, vehicle fleet & fishing vessel tracking) High Value Asset Tracking: o Non-tampered, externally spoofed, tracking (High value goods or vehicles / trains) Portable Tracker: o Constrained on power, tamper motivated, tracking (Tagging) High Value Positioning: o Non-tampered, externally spoofed, positioning (Autonomous driving, dynamic positioning (rig)) GNSS Disciplined Timing: o Power & financial transactions 9

10 The world of spoofing - Threat sources Individual Operator: o Driver avoiding being tracked o Limited resource and little technical ability Lone Criminal: o Motivated by financial gain Prestige Attacker: o Hacker, academic, journalism o Motivated by publicizing their achievement o Moderate resources but significant technical ability Organized Crime: o Motivated by financial gain and possess sizeable resources Organized Attacker: o Terrorists or foreign intelligence services o Motivated by the disruptive effect of the attack, potentially unlimited resources and ability. 10

11 The world of spoofing - Likelihood score Uber case Attack likelihood: Extreme (4), High (3), Moderate (2), Low (1), or Negligible (0) 11 Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015)

12 The world of spoofing - Countermeasures Full Position Integrity Cryptographic source External-data aided position qualification Authentication of signal & message 12

13 Fusion of systems for maximal resilience GNSS Navigation Message (NM) Ephemeris (incl. Time & Clock) Satellite health IMU Inertial sensor aid Full system resilience GNSS Authentication Other signals Software System (positioning) software & Receiver Autonomous Integrity Monitoring Other sensors Video, Radar, Ultrasonic, Lidar & Map match GNSS Signal Pseudo range GNSS Augmentation Corrections, Satellite Health, Real time & Extended ephemeris 13

14 Navigation Message Authentication Ensures the received GNSS signals carry the correct messages Authenticity of messages established using a global GNSS receiver network Digital signature information produced for authenticated messages Signature information distributed to the user User checks that received navigation message matches signature Observe in Fugro s global reference network & broadcast digital signature 14

15 Spoofing complexity GNSS receivers & spoofing detection methods Multiple spoofing signals and/or at multiple locations (Self) spoofing using synchronised signals RAIM & IMU other external aids (signals & sensors) Pseudo range Authentication (Dual Antenna or CRPA) Re-transmission (Self) spoofing using pre-recorded (Self) spoofing using signal generator Change ephemeris for use in Assisted GPS Navigation Message Authentication Receiver technology Mass market - Land Low-end High-end 15

16 Fugro people and equipment 10,000 Employees 26 Vessels 98 CPT Trucks 40 Laboratories 28 Jack-up Platforms 16 R+D centres 239 Land-based Drill Rigs 18 Offshore Drill Rigs 119 ROVs 5 AUVs 169 Offices Source: Fugro AR

17 Multiple applications are vulnerable Website & use cases 17

18 Position critical processes need reliable location services Navigation Message Authentication provides a clear yes or no as to spoofing detection in all receiver domains and adds redundancy to the system 18

19 We are Fugro proud to provide geo-intelligence, location services and asset integrity solutions to contribute to a liveable world Daan Scheer

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

ESOA > The Connected Automobile. Connected Automobiles Market Overview Paul Gudonis, Global Network & Services

ESOA > The Connected Automobile. Connected Automobiles Market Overview Paul Gudonis, Global Network & Services ESOA > The Connected Automobile Connected Automobiles 2016 Market Overview Paul Gudonis, Global Network & Services Policy @ESOA_SAT ESOA Members CIS Space Systems Satellite CommunicaEons Services TV &

More information

The Australian Government s Approach to Critical Infrastructure Resilience

The Australian Government s Approach to Critical Infrastructure Resilience The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General

More information

State of play of the European GNSS

State of play of the European GNSS State of play of the European GNSS Tachograph forum Flavio SBARDELLATI, GSA Market Development 3 December 2018, Brussels GSA in a nutshell What? Gateway to Services Galileo & EGNOS Operations and Service

More information

Certification of EGNSS Timing Receivers and Services

Certification of EGNSS Timing Receivers and Services Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint

More information

Spoofing GNSS Timing Receivers

Spoofing GNSS Timing Receivers Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical

More information

The Information Age has brought enormous

The Information Age has brought enormous Cyber threat to ships real but manageable KAI hansen, akilur rahman If hackers can cause laptop problems and access online bank accounts or credit card information, imagine the havoc they can wreak on

More information

Update on LBS Location based services and IoT Internet of Things

Update on LBS Location based services and IoT Internet of Things Update on LBS Location based services and IoT Internet of Things This presentation can be interpreted only together with the oral comments accompanying it GNSS is considered a commodity inside smartphones

More information

Machine-Based Penetration Testing

Machine-Based Penetration Testing Always in Control CyBot Suite Machine-Based Penetration Testing www.cronus-cyber.com - April 2016 CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path

More information

Assessing the Civil GPS Spoofing Threat

Assessing the Civil GPS Spoofing Threat Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell

More information

SECURING THE CONNECTED ENTERPRISE.

SECURING THE CONNECTED ENTERPRISE. SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE

More information

S e c u rity S o lu tio n s

S e c u rity S o lu tio n s 1 S e c u rity S o lu tio n s Introduction to security 2 Why Security Is Necessary? Following question may be familiar to some people Doing all that security is expensive and generates no money. Do we

More information

Machine-Based Penetration Testing

Machine-Based Penetration Testing Always in Control CyBot Suite Machine-Based Penetration Testing CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: CyBot

More information

Port Facility Cyber Security

Port Facility Cyber Security International Port Security Program Port Facility Cyber Security Cyber Risk in the Marine Transportation System MAR'01 1 Objectives IDENTIFY motivations behind a cyber attack. IDENTIFY various types of

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

High Quality Positioning: a Key to Success for Autonomous Driving

High Quality Positioning: a Key to Success for Autonomous Driving High Quality Positioning: a Key to Success for Autonomous Driving SaPPART final workshop Alberto Fernandez Wyttenbach Brussels, 4 October 2017 This presentation can be interpreted only together with the

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 3 - revised September 2016 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning

More information

CYBER SECURITY AWARENESS IN THE MARITIME INDUSTRY

CYBER SECURITY AWARENESS IN THE MARITIME INDUSTRY CYBER SECURITY AWARENESS IN THE MARITIME INDUSTRY A joint production by DNV GL and GARD 1 SAFER, SMARTER, GREENER STRUCTURE STATUS ON CYBER SECURITY IN MARITIME SHIPPING Risk scenarios (threats) Best practices

More information

GPS SPOOFING: NO LONGER A FISH STORY

GPS SPOOFING: NO LONGER A FISH STORY SESSION ID: MBS-F03 GPS SPOOFING: NO LONGER A FISH STORY Michael Shalyt CEO and Co-Founder Aperio Systems @MShalyt Outline Intro the world is being measured. Good examples of bad data. GPS forgery and

More information

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

Inertial Systems. Ekinox Series TACTICAL GRADE MEMS. Motion Sensing & Navigation IMU AHRS MRU INS VG

Inertial Systems. Ekinox Series TACTICAL GRADE MEMS. Motion Sensing & Navigation IMU AHRS MRU INS VG Ekinox Series TACTICAL GRADE MEMS Inertial Systems IMU AHRS MRU INS VG ITAR Free 0.05 RMS Motion Sensing & Navigation AEROSPACE GROUND MARINE Ekinox Series R&D specialists usually compromise between high

More information

Science & Technology Directorate: R&D Overview

Science & Technology Directorate: R&D Overview Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology

More information

EGNSS Mass Market Applications - Mobility as a service and Smart cities, IoT, Commercial and Social LBS

EGNSS Mass Market Applications - Mobility as a service and Smart cities, IoT, Commercial and Social LBS EGNSS Mass Market Applications - Mobility as a service and Smart cities, IoT, Commercial and Social LBS Justyna Redelkiewicz Market Segment Officer, LBS and IOT 5 October 2016 The 2017 H2020 Call for applications

More information

CyBot Suite. Machine-based Penetration Testing

CyBot Suite. Machine-based Penetration Testing CyBot Suite Machine-based Penetration Testing CYBOT PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: CyBot Pro CyBot Enterprise

More information

Summary of Cyber Security Issues in the Electric Power Sector

Summary of Cyber Security Issues in the Electric Power Sector Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing

More information

Galileo Open Service Authentication: A Complete Service Design and Provision Analysis

Galileo Open Service Authentication: A Complete Service Design and Provision Analysis Galileo Open Service Authentication: A Complete Service Design and Provision Analysis P. Walker, CGI; V. Rijmen, University of Leuven; I. Fernández-Hernández, L. Bogaardt, European Commission; G. Seco-Granados,

More information

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016 Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Location-Specific Cyber Risk

Location-Specific Cyber Risk Location-Specific Cyber Risk Lincoln Kaffenberger Cyber Threat Intelligence Officer IMF Information Security Group John Kupcinski Director, Cyber Security KPMG 1 Agenda Why assess the cyber risks by a

More information

Strategies for Maritime Cyber Security Leveraging the Other Modes

Strategies for Maritime Cyber Security Leveraging the Other Modes Strategies for Maritime Cyber Security Leveraging the Other Modes Michael Dinning Innovative Technologies for a Resilient Marine Transportation System June 24, 2014 The National Transportation Systems

More information

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm Insider Threat Program: Protecting the Crown Jewels Monday, March 2, 2:15 pm - 3:15 pm Take Away Identify your critical information Recognize potential insider threats What happens after your critical

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity

More information

LANDINS Georeferencing and Orientation System

LANDINS Georeferencing and Orientation System LANDINS Georeferencing and Orientation System LANDINS Georeferencing and Orientation System Landins is a simple, turnkey position and orientation system for land-based mobile applications. It offers dependable

More information

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017 Threat analysis Tuomas Aura CS-C3130 Information security Aalto University, autumn 2017 Outline What is security Threat analysis Threat modeling example Systematic threat modeling 2 WHAT IS SECURITY 3

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business Qualification Specification Level 2 Award in Cyber Security Awareness For Business ProQual 2016 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates 4 Assessment

More information

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer

More information

Autonomy & Operational Sustainability

Autonomy & Operational Sustainability Autonomy & Operational Sustainability Whether you are in the business of Energy, Utilities, Communications, Smart Infrastructure or Commerce, the one thing you want is for your systems to continue working.

More information

M-2-M-2-People. How Mobility Enables Visibility. Daniel Munyan Director, M2M Center of Excellence Computer Sciences Corporation 6/1/2012 1

M-2-M-2-People. How Mobility Enables Visibility. Daniel Munyan Director, M2M Center of Excellence Computer Sciences Corporation 6/1/2012 1 M-2-M-2-People How Mobility Enables Visibility Daniel Munyan Director, M2M Center of Excellence 6/1/2012 1 The Timeless Challenge of Logistics Achieving Enterprise Visibility / Situation Awareness Tracking

More information

GPS Vulnerability Report

GPS Vulnerability Report GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements

More information

e:

e: t: @crosswordcyber e: tom.clark@crosswordcybersecurity.com Risk Analysis Tool: www.rizikon.com Research Database: https://clue.crosswordcybersecurity.com The View From 2018 An exercise to identify emerging

More information

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

UAS Operation in National Air Space (NAS) Secure UAS Command and Control UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,

More information

Chapter 1. Chapter 2. Chapter 3

Chapter 1. Chapter 2. Chapter 3 Contents Preface ix Chapter 1 Terrorism 1 Terrorism in General 2 Definition of Terrorism 3 Why Choose Terrorism 4 Goals of Terrorists 5 Selection of Targets and Timing of Attacks 6 Perpetrators 7 Weapons

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

13W-AutoSPIN Automotive Cybersecurity

13W-AutoSPIN Automotive Cybersecurity 13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview

More information

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE International Maritime Organization Regulations IMO has given shipowners and managers until 2021 to incorporate cyber risk management into

More information

Patient Information Security

Patient Information Security Patient Information Security An overview of practice and procedure UK CAB Meeting 13th April 2012 Nathan Lea Senior Research Associate CHIME, UCL Overview - Questions that have been asked What happens

More information

Overview Brosix stringent corporate security requirements.

Overview Brosix stringent corporate security requirements. Brosix Security Data security is a high priority at Brosix, enabling us to con nue achieving the goal of providing efficient and secure online real me communica on services. Table of Contents Overview

More information

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs Ali Behfarnia and Ali Eslami Department of Electrical Engineering and Computer Science Wichita State University, Wichita, KS, USA Email:

More information

DigiTraq STA. SIGFOX Ready GPS Tracker. Or Contact us: Please visit the HidnSeek Website for more info:

DigiTraq STA. SIGFOX Ready GPS Tracker.  Or Contact us: Please visit the HidnSeek Website for more info: DigiTraq STA SIGFOX Ready GPS Tracker Please visit the HidnSeek Website for more info: www.hidnseek.fr Or Contact us: contact@hidnseek.fr FEATURES Built-in with IP67 enclosure DigiTraq SIGFOX Ready GPS

More information

Cyber Security: Threat and Prevention

Cyber Security: Threat and Prevention Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will

More information

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp 22 nd June

More information

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

Evaluation of the Existing CORS Network Infrastructure in Singapore to Meet User Demand Singapore Land Authority Presenter: Victor Khoo

Evaluation of the Existing CORS Network Infrastructure in Singapore to Meet User Demand Singapore Land Authority Presenter: Victor Khoo Evaluation of the Existing CORS Network Infrastructure in Singapore to Meet User Demand Dr Victor Khoo Senior Principal Surveyor 1 Presenter: Objective Why need to review? To stay relevant and meet users

More information

Forensics and Active Protection

Forensics and Active Protection Forensics and Active Protection Computer and Network Forensics Research Project 2003 Work Update Yanet Manzano Florida State University manzano@cs.fsu.edu manzano@cs.fsu.edu 1 Outline CNF Project Goal

More information

Digital Strategies for Development in Asia and the Pacific

Digital Strategies for Development in Asia and the Pacific Digital Strategies for Development in Asia and the Pacific Bambang Susantono Vice President Knowledge Management and Sustainable Development Let s Imagine a Child in 2030 S/He learns through smart holographic

More information

About Cronus Cyber Technologies

About Cronus Cyber Technologies CyBot Pro About Cronus Cyber Technologies Cronus Cyber is a software product company that develops software solutions for the Automated Penetration Testing market place. Cronus Cyber is a leading provider

More information

Cyber and information security applicable for the maritime sector

Cyber and information security applicable for the maritime sector MARITIME Cyber and information security applicable for the maritime sector Svante Einarsson 1 SAFER, SMARTER, GREENER Introduction 2 The tip of the iceberg 2015: 64,199 reported IT Security incidents just

More information

Vehicle Area Networks:

Vehicle Area Networks: Vehicle Area Networks: Making the Environment Smart Vehicle Area Networks: Making the Environment Smart Public safety and commercial fleets increasingly rely on mobile communications between headquarters

More information

SMART Ship Program. Najmeh Masoudi Cyber safety and security manager. Palazzo S. Giorgio - Genova, 28/06/ Copyright Bureau Veritas

SMART Ship Program. Najmeh Masoudi Cyber safety and security manager. Palazzo S. Giorgio - Genova, 28/06/ Copyright Bureau Veritas SMART Ship Program Palazzo S. Giorgio - Genova, 28/06/2017 Najmeh Masoudi Cyber safety and security manager Biography Najmeh Masoudi Cyber safety and security project manager Bureau Veritas Marine & Offshore

More information

Business Continuity Planning Keeping Pace with New Technology

Business Continuity Planning Keeping Pace with New Technology Business Continuity Planning Keeping Pace with New Technology Old issues, new threats Force Majeure Increasing severe weather incidents, terrorist attacks Legacy modernization Cutover issues, system crashes,

More information

NOSAC. Phase I and Phase II FINAL REPORT

NOSAC. Phase I and Phase II FINAL REPORT NOSAC Cyber Security / Cyber Risk Management Sub-Committee Phase I and FINAL REPORT March 30, 2016 Background NOSAC Subcommittee on Cybersecurity/Cyber Risk set up April 8, 2016 Co-Chairs: Kelly McClelland

More information

Designing for the Industrial Internet Accelerating the Industrial Internet of Things

Designing for the Industrial Internet Accelerating the Industrial Internet of Things Accelerating the Industrial Internet of Things 338 West Nanjing Road, 2707-09 Shanghai 200041 China www.iotone.com IoT enables Industrie 4.0. 2 Why IoT? The Internet enabled people to share information

More information

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection

More information

Smart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong

Smart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong Smart Cards By: Definition Smart cards, chip card, or integrated circuit card (ICC) are card with embedded integrated circuits that contain a computer chip capable of carrying out a cryptographic protocol.

More information

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYDFS Cybersecurity Regulations: What do they mean? What is their impact? June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing

More information

Europeanizing Transport Security

Europeanizing Transport Security Young Researchers Seminar 2013 Young Researchers Seminar 2011 Lyon, France, June 5-7 2013 DTU, Denmark, June 8-10, 2011 Europeanizing Transport Security Policy and Research Recommendations Samuel Rothenpieler,

More information

To Audit Your IAM Program

To Audit Your IAM Program Top Five Reasons To Audit Your IAM Program Best-in-class organizations are auditing their IAM programs - are you? focal-point.com Introduction Stolen credentials are the bread and butter of today s hacker.

More information

INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY

INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY VERSION 2.2 OCTOBER 2001 SUMMARY Software is easy to tamper with and reverse engineer so unprotected software deployed on malicious hosts can t be trusted by corporations

More information

Measuring the World: Designing Robust Vehicle Localization for Autonomous Driving. Frank Schuster, Dr. Martin Haueis

Measuring the World: Designing Robust Vehicle Localization for Autonomous Driving. Frank Schuster, Dr. Martin Haueis Measuring the World: Designing Robust Vehicle Localization for Autonomous Driving Frank Schuster, Dr. Martin Haueis Agenda Motivation: Why measure the world for autonomous driving? Map Content: What do

More information

CHIEF INFORMATION OFFICER

CHIEF INFORMATION OFFICER OFFICE OF THE CHIEF INFORMATION OFFICER DEPARTMENT OF HEALTH AND HUMAN SERVICES U. S. D E P A R T M E N T O F H E A L T H A N D H U M A N S E R V I C E S Public-Private Collaboration - Bridging the Gap

More information

Korea ICT Market Overview. Yoonmi Kim Finpro Korea

Korea ICT Market Overview. Yoonmi Kim Finpro Korea Korea ICT Market Overview Yoonmi Kim Finpro Korea 5G Advanced Network Key Players Network Service Provider Electronics Company Car and Car Component Company - 5G Antenna Technoloies for Mobile device and

More information

SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk. Doug Haines Haines Security Solutions 9 April 2013

SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk. Doug Haines Haines Security Solutions 9 April 2013 SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk Doug Haines Haines Security Solutions 9 April 2013 The Broad Picture Learning Objectives Know the differences

More information

Electronic and Mission Systems

Electronic and Mission Systems Electronic and Mission Systems Boeing Networks, Space, and Security Small Business Workshop Bob Tamaru November 8, 2011 Where We Fit In Boeing Boeing Military Aircraft AEW&C P-8A C-17 Italy Japan 7A7 F-18

More information

DriveLinQ Driver Manual For Cabmate Customers

DriveLinQ Driver Manual For Cabmate Customers DriveLinQ Driver Manual For Cabmate Customers Mobile Knowledge Systems Inc. Suite 100-11 Hines Rd, Kanata, Ontario, Canada, K2K 2X1 Copyright Copyright 2014 Mobile Knowledge Systems Inc. All Rights Reserved.

More information

Maritime cyber security: Threats & Opportunities. Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant

Maritime cyber security: Threats & Opportunities. Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant Maritime cyber security: Threats & Opportunities Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant Agenda Cyber threats to the marine industry Attack surface overview (harbour / ships

More information

Singapore Autonomous Vehicle Initiative (SAVI)

Singapore Autonomous Vehicle Initiative (SAVI) Singapore Autonomous Vehicle Initiative (SAVI) Dr Chin Kian Keong Group Director, Transportation and Road Operations CHIN_Kian_Keong@lta.gov.sg 1 Singapore ASIA Singapore Land area: 719 m 2 Population:

More information

Internet of Things (IoT) Securing the Connected Ecosystem

Internet of Things (IoT) Securing the Connected Ecosystem Internet of Things (IoT) Securing the Connected Ecosystem June 2018 Making sense of the buzzwords: What is the Internet of Things Internet of Things (IoT) refers to a world of intelligent, connected devices

More information

Real Time Traffic Information Delivered to the Dashboard

Real Time Traffic Information Delivered to the Dashboard REAL TIME TRAFFIC INFORMATION DELIVERED TO THE DASHBOARD Martin O Hara Senior Design Consultant Trafficmaster PLC, Cranfield, England INTRODUCTION Trafficmaster are the UK s premier supplier of traffic

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity

More information

MODAInnovations Complete Academic Project Solutions

MODAInnovations Complete Academic Project Solutions MODAInnovations Complete Academic Project Solutions 9538304161 www.modainnovations.com modainnovations@gmail.com ECE PROJECTS S NO 1 2 3 4 Project Title A Low Cost Web Based Remote System With Built-In

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?

More information

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our

More information

Transportation Security Risk Assessment

Transportation Security Risk Assessment Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction

More information

Designing a GPS Receiver Network with GNSS Algorithm for Accuracy and Safety

Designing a GPS Receiver Network with GNSS Algorithm for Accuracy and Safety International Global Navigation Satellite Systems Society IGNSS Symposium 2007 The University of New South Wales, Sydney, Australia 4 6 December, 2007 Designing a GPS Receiver Network with GNSS Algorithm

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

Security analysis and assessment of threats in European signalling systems?

Security analysis and assessment of threats in European signalling systems? Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide

More information