Skip to main content

European data security agency focuses on public transportation cyber security

In the light of the trend towards smart cities, the European Union Agency for Network and Information Security (ENISA) has released a report on smart cities and their intelligent public transportation (IPT) systems. The report, Cyber Security and Resilience of Intelligent Public Transport, focuses on the protection of the assets critical to IPT in the context of smart cities. These assets are considered critical as they contribute to the normal operation of local public transport networks, including metr
February 15, 2016 Read time: 2 mins
In the light of the trend towards smart cities, the European Union Agency for Network and Information Security (ENISA) has released a report on smart cities and their intelligent public transportation (IPT) systems.

The report, Cyber Security and Resilience of Intelligent Public Transport, focuses on the protection of the assets critical to IPT in the context of smart cities. These assets are considered critical as they contribute to the normal operation of local public transport networks, including metro, buses, light rail and other modes of mass public transport found in smart cities.

It also gives an overview of the existing security measures, or good practice, that could be deployed to protect critical assets and ensure security of the IPT system, based on a survey and interviews of experts from the sector, municipalities, operators, manufacturers and policy makers.

The report makes recommendations for the European Commission (EU) and its member states, IPT operators and manufacturers of IPT systems, including:

The EU and its member states should promote an EU-wide public/private collaboration on IPT cyber security and facilitate the development of a common EU approach to IPT security, including the development of harmonised standards.

IPT operators should integrate cyber security, its strategy and risk management into their corporate governance and routinely re-evaluate their cyber security processes.

Manufacturers of IPT systems should develop products/solutions that match the cyber security requirements of IPT end-users, collaborate in the development of IPT-specific standards and apply them to IPT solutions and develop a trusted information sharing platform.

Related Content

  • US enforcement regulation to deliver clearer guidelines?
    February 2, 2012
    Jim Tuton of American Traffic Solutions looks at the evolution of automated enforcement in North America "Technological regulation will become more sophisticated at the federal level, giving states clearer guidelines" Jim Tuton In just 20 years, photo enforcement in North America has grown from a single speed camera in a small town in Arizona to thousands of photo traffic enforcement cameras which are now operating in 350 communities spread across 27 states and three Canadian provinces. Most of these p
  • European trends in environmental monitoring and enforcement
    February 2, 2012
    David Crawford surveys European trends in environmental monitoring and enforcement
  • Aberdeen and Zagreb win EU sustainable mobility awards
    March 12, 2013
    The European Commission has announced the winners of the 2012 Sustainable Urban Mobility Plans (SUMP) Award and the European Mobility Week (EMW) Award. Aberdeen and Zagreb were presented with their awards by European Commissioners Siim Kallas and Janez Potočnik at a joint award ceremony in Brussels, Belgium on 6 March. Aberdeen took the top honour in the Sustainable Urban Mobility Plans Award ahead of two other finalists, Ljutomer, Slovenia and Toulouse, France. Aberdeen is a city of around 220,000 inhabita
  • Communication: the future of machine vision
    May 30, 2013
    Jason Barnes asks leading machine vision industry figures what they consider to be the educational barriers to the technology’s increased uptake by the ITS sector. The recent rush by some organisations within the ITS sector to associate themselves with the term ‘machine vision’ underlines just how important the technology has become in a relatively short space of time. However, despite the technology having been applied in certain traffic management applications for some years, there remains a significant s