|
|
|
|
|
|
|
1.1 The Concept of Security. |
|
|
|
1.2 Transportation and Security. |
|
|
|
1.3 Security in the ITS Context. |
|
|
|
1.4 Scope and Audience of the Book. |
|
|
|
1.5 Content and Organization the Book. |
|
|
|
|
|
|
|
|
|
Chapter 2: The Need for Surface Transportation Infrastructure Security. |
|
|
|
|
|
|
2.2 Common characteristics of surface transportation systems. |
|
|
|
2.3 Common threats to surface transportation systems. |
|
|
|
|
|
|
|
|
|
|
|
| 2.3.4 HAZMAT. |
|
|
|
|
|
|
|
|
|
|
|
2.3.8 Biological and Chemical Attacks. |
|
|
|
|
|
|
|
|
|
2.4 Defending against threats both external and internal. |
|
|
|
2.5 Why Transportation Infrastructure Security is Important. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chapter 3: Leveraging ITS to Reduce Risk and Exposure Using ITS Security Areas. |
|
|
|
|
|
|
3.2 Disaster Response and Evacuation. |
|
|
|
3.3 Freight and Commercial Vehicle Security. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3.8 Transportation Infrastructure Security. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chapter 4: Risk Assessment Framework. |
|
|
|
4.1 Risk Assessment Framework. |
|
|
|
|
|
|
4.1.2 Risks Assessment Methods. |
|
|
|
4.1.2.1 Blue Ribbon Panel Method. |
|
|
|
4.1.2.2 Fault-Tree Analysis. |
|
|
|
4.1.2.3 Simulation Analysis. |
|
|
|
4.1.2.3 Monte Carlo Analysis. |
|
|
|
4.1.2.4 Weibull Hazard Models. |
|
|
|
4.1.3 Mitigation and Countermeasures. |
|
|
|
4.1.4 Selection of Options. |
|
|
|
4.2 Opportunities and Challenges. |
|
|
|
4.3 Application of the Framework. |
|
|
|
|
|
|
|
|
|
Chapter 5: Application of Risk Assessment and Management Tools. |
|
|
|
5.1 Application of Risk Assessment Methods. |
|
|
|
5.1.1 Blue Ribbon Panel Method. |
|
|
|
5.1.2 Fault-Tree Analysis. |
|
|
|
5.1.2.1 Quantitative Evaluation of Fault-tree. |
|
|
|
5.1.2.2 Minimal Cut Sets. |
|
|
|
5.1.3 Weibull Hazards Model Example. |
|
|
|
5.2 Application of Evacuation Models and Traffic Models for Response Planning. |
|
|
|
5.3 Application of Other Methods. |
|
|
|
|
|
|
|
|
|
Chapter 6: Fundamentals of Computer Network Security for ITS. |
|
|
|
|
|
|
Elements of Computer Network Security. |
|
|
|
Importance of Computer Network Security. |
|
|
|
Approach to Computer Network Security. |
|
|
|
|
|
|
|
|
|
6.1.3 Security Requirements. |
|
|
|
6.1.4 Recommended Controls. |
|
|
|
|
|
|
|
|
|
6.1.7 Continuing Attention. |
|
|
|
Computer Network Security in ITS. |
|
|
|
Network Security Objectives. |
|
|
|
|
|
|
|
|
|
6.1.10 Message Integrity and Nonrepudiation. |
|
|
|
|
|
|
|
|
|
Future of Network Security and Its Impacts on Securing ITS Network. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7.3.4 (Unauthorized) Disclosure. |
|
|
|
|
|
|
7.4.1 Information Security. |
|
|
|
7.4.2 ITS Personnel Security. |
|
|
|
7.4.3 Operational Security. |
|
|
|
7.4.4 Security Management. |
|
|
|
7.5 Securing ITS Subsystems. |
|
|
|
7.6 Securing Communications Between Subsystems. |
|
|
|
7.7 Security and ITS Standards. |
|
|
|
7.7.1 National Transportation Communications for ITS Protocol (NTCIP). |
|
|
|
7.7.1.1 NTCIP Center-to-Center. |
|
|
| 7.7.1.1.1 WSDL/SOAP/XML. |
|
| 7.7.1.1.2 DATEX-ASN. |
|
|
|
|
|
7.7.1.2 NTCIP Center-to-Field. |
|
|
|
7.7.1.2.1 SNMP and SFMP Security. |
|
|
|
|
|
|
7.7.2 Traffic Management Data Dictionary (TMDD) and Message Sets. |
|
|
|
7.7.3 Commercial Vehicle Information Systems and Networks (CVISN). |
|
|
|
|
|
|
7.7.5 Dedicated Short Range Communications (DSRC). |
|
|
|
7.7.6 Incident Management (IM). |
|
|
|
7.7.7 Transit Communications Interface Profiles (TCIP). |
|
|
|
7.7.7.1 Security and Incident Management Process. |
|
|
|
7.7.7.2 Manage Incidents and Security Business Process. |
|
|
|
7.7.7.3 Fare Collection and Revenue Management Security. |
|
|
|
7.7.8 Advanced Traveler Information Systems (ATIS). |
|
|
|
|
|
|
|
|
|
|
|
|
Chapter 8: ITS Security Areas and Multimodal Transportation Security. |
|
|
|
|
|
|
|
|
|
8.1.1.1 Demand Management and Evacuation. |
|
|
|
8.1.1.2 Information Dissemination. |
|
|
|
8.1.1.3 Passenger Screening Procedures. |
|
|
|
|
|
|
8.1.1.3.2 Canine Inspection. |
|
|
|
|
|
|
8.1.2.1 Chemical Sensors Systems. |
|
|
|
8.1.2.2 Radiation Detection Systems. |
|
|
|
8.1.2.3 Biological Agent Sensors. |
|
|
|
8.1.2.4 Disaster Recovery. |
|
|
|
8.1.2.5 Design for Security. |
|
|
|
8.1.3 Perception of Security. |
|
|
|
8.2 Protecting Vehicles and Infrastructure. |
|
|
|
|
|
|
8.2.1.1 Private vehicle parking. |
|
|
|
8.2.1.2 Shuttles and Ground Fleet Vehicles. |
|
|
|
8.2.1.3 Future Resources. |
|
|
|
|
|
|
8.2.2.1 Personnel Authentication. |
|
|
|
8.2.2.2 Access Management. |
|
|
|
8.2.2.3 Surveillance Systems. |
|
|
|
8.2.2.4 Personnel Training. |
|
|
|
8.2.3 Rail Vehicles and Infrastructure. |
|
|
|
8.2.3.1 Highway Rail Intersections. |
|
|
|
8.2.3.2 Monitoring track infrastructure. |
|
|
|
8.2.3.3 Tradeoff between Safety and Security. |
|
|
|
|
|
|
|
|
|
|
|
|
8.3.1.1 Visual Inspections. |
|
|
|
|
|
|
8.3.1.3 Pulsed Fast Neutron Analysis and Thermal Neutron Activation. |
|
|
|
8.3.1.4 Future Directions in Detection Systems. |
|
|
| 8.3.2 HAZMAT. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Chapter 9: Process for Developing A Regional Transportation Security Plan. |
|
|
|
|
|
|
9.2 Developing a Regional Transportation Security Architecture. |
|
|
|
9.2.1 Security in a Regional ITS Architecture Development Process. |
|
|
|
9.2.1.1 Identify Security Objectives. |
|
|
|
9.2.1.2 Identify Threats. |
|
|
|
9.2.1.3 Identify Critical Assets. |
|
|
|
9.2.1.4 Define Roles and Responsibilities. |
|
|
|
9.2.1.5 Define Security Requirements. |
|
|
|
9.2.1.6 Identify Security Boundaries. |
|
|
|
9.2.1.7 Isolate Critical Assets. |
|
|
|
9.2.1.8 Identify Sensitive Information. |
|
|
|
|
|
|
9.2.1.10 Identify Security Services. |
|
|
|
9.2.1.11 Select Security Standards. |
|
|
|
|
|
|
9.2.1.13 Define Security Mechanisms. |
|
|
|
9.2.1.14 Implement Security Mechanisms. |
|
|
|
9.2.1.15 Monitor and Revise. |
|
|
|
9.2.2 Developing a Regional Transportation Security Architecture. |
|
|
|
9.2.2.1 Identify Security Risks. |
|
|
|
9.2.2.2 Select Security Services to Mitigate Risks. |
|
|
|
9.2.2.3 Develop a Concept of Operations. |
|
|
|
9.2.2.4 Develop Implementation Plan. |
|
|
|
|
|
|
9.3 Developing a Project Security Plan. |
|
|
|
|
|
|
|
|
|
|
|
|
Chapter 10: Issues and Opportunities for Transportation Infrastructure Security. |
|
|
|
10.1 ITS Security versus Privacy. |
|
|
|
10.2 Public and Private Roles. |
|
|
|
10.3 Stakeholder Cooperation and Coordination Requirements. |
|
|
|
10.3.1 Information sharing. |
|
|
|
10.3.2 Resource Sharing Agreements. |
|
|
|
10.4 Funding Sources and Constraints. |
|
|
|
|
|
|
10.6 Future Directions and Opportunities. |
|
|
|
|
|
|
|
|
|
Appendix A: National ITS Architecture Subsystem Security Descriptions. |
|
|
|
Appendix B: Securing Architecture Flows. |
|
|
|
Appendix C: USDOT FHWA Final Rule. |
|
|
|
Appendix D: USDOT FTA Policy on Transit Projects. |
|
|
|
Appendix E: Weibull Distribution Support. |
|
|
|
|
|