Skip to main content

Currently Skimming:

3 Planning a Full Study
Pages 39-46

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 39...
... · Not enough is yet known about cybersecurity as related to freight IT or the impact of potential measures to enhance security. Therefore, the committee concludes that a need exists for a comprehensive study to assess the current challenges in cybersecurity in freight transportation information systems and to identify possible strategies to mitigate identified vul nerabilities.
From page 40...
... Second, a risk management analysis must be conducted to evaluate possible measures to enhance cybersecurity, their costs, and their benefits. As discussed in Chapter 2, the nature of the coordinated information system that serves the nation's freight transportation system makes this risk analysis extraordinarily difficult compared with other computer secu rity assessments.
From page 41...
... Ignoring cost could have serious economic consequences, handing terrorists one of their stated objectives. It is difficult to estimate economic impacts across a broad sector such as freight transportation.
From page 42...
... One or more federally funded research and development centers could do the detailed analysis. Various academic research programs also could be involved.
From page 43...
... Then the systems -- and the intermodal, interconnected system -- can be examined for vulnerabilities and the potential consequences if those vul nerabilities should be exploited. Much of this work would reflect generic IT vulnerability studies, but the specific use of the technologies in the freight industry would have to be reviewed.
From page 44...
... Possible measures to address the vulnerabilities identified in Tasks 1 and 2 should be identified for each mode and for the overall freight transportation system, because of its pervasive intermodal nature, as well as for technologies and processes as they are now and as they may evolve. Analyses should be made of the expected costs (including potential interference with normal operations)
From page 45...
... In connection with this task, emerging technologies and practices should be examined to determine what role, if any, they could play in addressing identified cybersecurity gaps and deficiencies. Integral to such an assessment should be both an analysis of various modes of the industry and an analysis of the overall, intermodal freight transportation system, along with an assess ment of how realistic and attractive these technologies and practices would appear to decision makers -- that is, their economic and operational incen tives and disincentives.
From page 46...
... Some cybersecurity measures may bring with them cor responding economic benefits. For example, the use of digital signatures might reduce costs related to errors and fraud detection and management.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.