Skip to main content

Cybersecurity in Transit Systems (2022) / Chapter Skim
Currently Skimming:


Pages 3-6

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 3...
... 3   Introduction This chapter provides information about the purpose of the synthesis, issues to be addressed by the synthesis, the scope of the research (i.e., the topics that are included in the synthesis) , and the research method used.
From page 4...
... 4 Cybersecurity in Transit Systems or technology environments such as the cloud. The study team identified five emerging trends that met the following criteria: • The trend was already affecting or likely to significantly affect transit agencies and operations over the near term (1–3 years)
From page 5...
... Introduction 5   Operational or control systems include technologies such as SCADA, train controls, signal controls, automatic vehicle location and so forth, that monitor and control the physical world with an emphasis on safety, protection of physical assets, and reliability. Information or data systems include business applications, ride apps, fare collection, and so on, that collect, process, store, and report on data with an emphasis on data confidentiality, integrity, and accessibility.
From page 6...
... 6 Cybersecurity in Transit Systems Chapter 2: Literature Review. This chapter summarizes key findings concerning cybersecurity trends, threats, incidents, mitigation strategies, and countermeasures from previously published research, from official sources, and from contemporary news accounts.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.