ITS Flashcards

(76 cards)

1
Q

define safety

A

a state of being safe from injury or harm
The state of being away from hazards caused by natural forces or human errors randomly.

The source of hazard is formed by natural forces and/or human errors. In other words, the term safety is used to refer to the condition of being protected from the aspects that are likely to cause harm.

In addition, the term safety can be used to refer to the state at which one has the control of the risk-causing aspects hence protecting himself or herself against the risk that is fully unintended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

define security

A

being free from danger or threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

difference between safety and security

A

safety usually how someone feels about a system and it’s ability of keep them from harm

security is more about how an organisation mitigates threats from usually human sources that might want to harm an individual/organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is GNSS?

A

Global Navigation Satellite Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Main GNSS systems

A

GPS, Galileo, GLONASS, BEIDOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are GNSS challenges?

A

Complexity
User base
Institutional control
Performance variance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GNSS challenges - Complexity - define

A

control segment, satellites, modelling, signal generation
– signal path effects, receiver hardware/electronics/algorithms
- anomalies or failures can occur at any stage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

GNSS challenges - user base - define

A

User base - multiple users globally,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GNSS challenges - institutional control - define

A

Institutional control - need to keep some aspects limited due to security concerns.
e.g. Military Use GPS “Selective Avaialabilty” option can be used to degrade use to non-military applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

GNSS challenges - Performance variance - define

A

Performance variance - position of users and satellites in space and time
Atmospheric Conditions
Multipath errors (bouncing off buildings)
RNP - required navigation performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GNSS vulnerabilities (16)

A

Signal failure

solar flare

tropospheric interaction

multipaths

jamming

Disturbance- wanted signals affected by unwanted signals

Spoofing

Meaconing

receiver leap seconds

week number rollover

withdrawal of service

System of systems (integration)

deliberate reduction of signal

Cyber attack

near channel interference

Space debris

EMP

Anti-satellite missiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GNSS mitigations

A

Resilience - alternative approaches to roll over to should performance be degraded

Standards - internationally agreed methods of developing solutions and how data can be shared for systems interoperability and confidence in users base

Testing - agreed assurance that systems work to defined criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of PNT?

A

GNSS

Eloran (Radio Navigation Systems)

Inertial Navigation Systems INS

Atomic Clocks

Network Based Positioning (Enhanced 911 service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CNI uses of GNSS

A

Chemical

Civil nuclear- both timing and position for safety systems, monitoring and control

Communications - current low but increasing for timing due to more systems out there

Defence - wide range of applications from targeting weapons, logistics, mission planning, to pretty much any other requirement seen by other CNI sectors

Emergency services - both timing and position - navigation, routing, incident identification, location of lost people

Energy- both timing and position for safety systems, identifying new pipe routes etc, monitoring and control

Finance - timing for trading

Food - position -track vehicles, pests, automated machines, yield mapping

Government - not a direct user, but needs to rely on GNSS to make the critical services it delivers work.

Health- both timing and position some isotopes for use are time critical from reactor to use therefore depends on transport systems so show how different CNI overlaps

Space- both timing and position

Transport - position

Water- both timing and position for safety systems, locating leaks, identifying new pipe routes etc, monitoring and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is security policy?

A
  • high-level statement of beliefs, goals, & objectives &, general means for attainment for protection
  • set at a high level, what is desired to be achieved, and does not specify “how” to accomplish the objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is security policy needed?

A
  • to ensure money is spent in an appropriate manner to deliver expected outcomes
  • infrastructure increasingly connected & accessible, hence more prone to manipulation & destruction
  • crucial decisions and defensive action must be prompt and precise
  • a security policy establishes what must be done to protect infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Secure by design principles (10)

A

minimise attack surface

establish secure defaults

Principle of least privilege - only allow minimum access necessary

Principle of defence in depth - multiple controls that approach risk are preferable

Fail securely

Don’t trust services

Separation of duties

Avoid security by obscurity

keep security simple (Economize Mechanism & Make security useable)

Fix security issues correctly

Audit Sensitive Events

Never invent security technology

Promote Privacy

Secure the weakest link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Blackett Review

A

Improving Awareness

Addressing Vulnerabilities and Threats

Improving Resilience

Preparing For The Future

Mitigating Dependence on GNSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Blackett review recommendations - Improving awareness

A
  • Improving awareness

Recommendation 1
Operators of CNI should review their reliance on GNSS, whether direct or through other GNSS-dependent systems, and report it to the lead government department for their sector. The Cabinet Office should assess overall dependence of CNI on GNSS.

Recommendation 2
Loss or compromise of GNSS-derived PNT should be added to the National Risk Assessment in its own right, rather than as a dimension of space weather alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Blackett review recommendations - Addressing vulnerabilities and threats

A
  • Addressing vulnerabilities and threats

Recommendation 3
The Department for Digital, Culture, Media and Sport (DCMS), with Ofcom, should continue to address the risk of interference to GNSS-dependent users,including CNI, in allocation of radio spectrum to new services and applications .

Recommendation 4
DCMS should review, with Ofcom, the legality of sale, ownership and use of devices and software intended to cause deliberate interference to GNSS receivers or signals – to determine whether the Wireless Telegraphy Act 2006 requires revision.-

Recommendation 5
CNI operators should assess – with guidance from the National CyberSecurity Centre (NCSC) and the Centre for the Protection of National Infrastructure(CPNI) – whether they need to monitor interference of GNSS at key sites such as ports.Where operators do monitor, data should be shared with the relevant lead government department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Blackett review recommendations - Improving resilience-

A
  • Improving resilience-

Recommendation 7
The existing cross-government working group on PNT should be put on a formal footing to monitor and identify ways to improve national resilience. It should report to the Cabinet Office, which can coordinate necessary actions among departments.

Recommendation 8a
Procurers of GNSS equipment and services for CNI applications – with guidance from the relevant lead government department and organisations such as NCSC and CPNI – should specify consistent requirements encompassing GNSS and PNT system issues of accuracy, integrity, availability and continuity, as well as requirements specific to the immediate equipment, system and application.

Recommendation 8b
Government should ensure that, for GNSS and PNT equipment, a coordinated approach is taken to performance standards, terminology, validation criteria,independent testing and evaluation procedures, and the accreditation of test facilities. It should work with industry, trade associations, accreditation bodies and organisations that develop and set standards.

Recommendation 8c
Government should adopt a facilitating role to ensure that legislation and regulations relevant to PNT and GNSS are appropriate and proportionate, and that due consideration is given to the needs of different sectors.

Recommendation 9
The Department for Business, Energy and Industrial Strategy, in partnership with Innovate UK & the cross-government working group on PNT, should map PNT testing facilities & explore how industry and critical services can better access them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Blackett review recommendations - Preparing for the future

A
  • Preparing for the future

Recommendation 10
Growing demand for time and geo-location create opportunities for the UK to leverage its academic and industrial expertise in these areas. UK Research and Innovation should invite the research community and industry to develop proposals to achieve greater coordination among existing centres of excellence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Blackett review recommendations - Mitigating dependence on GNSS

A
  • Mitigating dependence on GNSS

Recommendation 6
CNI operators should make provision – with guidance from NCSC and CPNI – for the loss of GNSS by employing GNSS-independent back-up systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Principles of Security policy (6)

A

reflect widest security objectives

Enable the business of related entities (e.g. Government)

Risk management is key with appropriate owner

Account for statutory obligations and protections

Enable right attitudes and behaviours

Polices and processes for reporting issues/incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
SecPol document components (9)
Development trade off (detailed vs brief) Dependant on - size, services, tech, money (and other resources) available Purpose Scope Background Policy statement (overarching principles) Enforcement Responsibility Related documents
26
Elements of good policy (12)
Clear, concise and realistic defined scope and applicability Consistent with other policy/guidance Open to risk based change Identifies areas of responsibility for users, admin and management Sufficient guidance to develop procedures Balances protection with productivity How incidents are handled Has an SRO - e.g. Gov official Flexible and adaptable to tech and procedural change Involves relevant stakeholders Doesn't impede business on mission/goals Provides organisation with assurance and acceptable protection from external and internal threats.
27
Sec by Des - attack surface
reduce nodes available to an attacker to enter a building/system
28
Sec by Des - Secure defaults
Default is a secure experience with the user reducing their security if allowed e.g. password aging and complexity as default
29
Sec by Des - Least privilege
where need to know exists - eg a CEO probably does not need to access all the HR files
30
Sec by Des - defence in depth
add layers of validation and control e.g. 2 factor authentication
31
Sec by Des - Fail securely
ensure that systems are not set to allow failure into admin roles etc
32
Sec by Des - don't trust services
Check what data is being requested and used by external parties e.g. reward schemes
33
Sec by Des - Separation of duties
Fraud control approaches such as requestors cannot sign for assets, approvers cannot be requesters etc.
34
Sec by Des - avoid sec by obscurity
nearly always fails, using other principles to ensure the security is generated, not through obscuring code (and generally fails poorly)
35
Sec by Des - keep sec simple
Attack surface and simplicity go hand in hand
36
Elements of a sustainable city
Mixed-use and polycentric cities Transit-oriented development Active transport modes Healthy urban environment Smart and innovative cities Digital infrastructure Productive cities
37
What is FRAM?
Functional resonance analysis method
38
Elements of FRAM?
1. Equivalence of success and failures 2. Approximate adjustments 3. Emergent outcomes 4. Functional resonance
39
6 components of FRAM
Components: Time Control Input Output Precondition Resources
40
STAMP elements
Elements: controller process model control actions feedback controlled process
41
Define risk management
coordinated activities to direct and control an organization with regard to risk
42
Define risk
The effect of uncertainty on objectives (ISO)
43
Define threat (security)
a person or thing likely to cause damage, danger or increase a risk of something unwanted occurring
44
Risk calculation(s)
Risk = threat * probability * consequence
45
What is a hazard?
A process, phenomenon or human activity that may cause loss of life, injury or other health impacts, property damage, social and economic disruption or environmental degradation.
46
Hazard types
Natural hazards: natural processes and phenomena Anthropogenic hazards: human activities and choices (‘man-made’) Socionatural hazards: combination of natural and anthropogenic factors
47
Define vulnerability
The conditions determined by physical, social, economic and environmental factors or processes which increase the susceptibility of an individual, a community, assets or systems to the impacts of hazard or A weakness of an asset or group of assets that can be exploited by one or more threats where an asset is anything that has value to the organization, its business operations and their continuity, including information resources that support the organization's mission.
48
Define threat
A potential cause of an incident, that may result in harm of systems and organization.
49
Define risk
The potential loss of life, injury, or destroyed or damaged assets which could occur to a system, society or a community in a specific period of time, determined probabilistically as a function of hazard, exposure, vulnerability and capacity. (It is important to consider the social and economic contexts in which disaster risks occur and that people do not necessarily share the same perceptions of risk and their underlying risk factors.)
50
FTA?
Fault tree analysis use AND/OR gates to show how indivudal or multiple factors can contribute to a top level risk - eg, fire protection failure
51
13 CNI sectors
chemicals civil nuclear communication defence emergency services energy finance food government health space transport water
52
National risk register
takes high level risks, puts them into a risk matrix and assigns departmental owners for mitigation Blackett reviews, eg GNSS and space weather useful to highlight potential threats from each risk and potential mitigation measures.
53
Define risk
possibility of something happening Risk = hazard x exposure x vulnerability effect of uncertainty on objectives Risk = probability x consequences
54
Risk management tools
register - table - risk, owner, overall rating, current rating, target rating, trend matrix - grid of likelihood against impact
55
Inherent risk?
risk before treatment
56
residual risk
risk with currently implemented treatments
57
target risk (risk apetite)
level of risk with planned treatment
58
Risk options from ISO 31000
Avoid - don't do the activity Eliminate - remove the risk source Likelihood - change Consequence - change Share/Transfer - insurance/partnerships Retain - informed decision Take/Increase - pursue opportunity
59
What is transport?
complex interdependent interactions of: people demand (people and goods) infrastructure travel modes technology operations concept of operations business modes, governance & society Con Ops all linked to operations with governance and society being key stakeholders in its operation
60
What makes the transport system cyber? (*)
Planning: modelling for traffic flows Data gathering and management Delivery: assessment of work Operations: payments traffic review autonomy for vehicles traffic management engine management systems
61
What makes transport physical?
human pilots pedestrians roads, ports and other infrastructure to carry/manage vehicles repair and maintenance requirements
62
What is cyber physical about transport?
Autonomous vehicles| sensors feeding back data
63
What is cyber physical?
A system where an action by software can impact on the physical world or where an impact on the physical world can have an impact on the cyber world. or where a threat exists in the cyber domain and the impact exists in the physical domain, or vice versa. e.g. a blocked sensor (e.g. a parked car in front of it) could keep a data collection feed open until a database fills and the software crashes or an error in the system logic means a command to a gate to close gets sent when it should not
64
Limitations Of Conventional Risk Management Approaches
* Sample size is too small for a very high dimensional risk space * Users may misunderstand that a risk register is a complete representation of risk * Difficult to apply risks with very high uncertainty regarding probability and impact * The possibility of unknown risks not addressed * Reactive rather than proactive: The focus is in mitigating risks after they have occurred, rather than preventing them from happening in the first place
65
Resilience Dimensions
Robustness - Ability to withstand stress without suffering degradation or loss of function Redundancy - Extent to which system functions can be provided by different components Resourcefulness - Capacity to Identify problems, establish priorities and mobilize resources when facing disruption Rapidity - Capacity to return to the normal operational state in a timely manner
66
Measures for improving infrastructure resilience
* Strengthen Robustness * Add redundancy * Preparedness for incident response * Improve recovery capability
67
Development of stress testing scenarios
Prior Knowledge - Historical Events, previous risk assessments, SME Base Set Of Scenarios - Main classes of potential threats and failure modes Combinatorial Complexity - Combinations of different hazardous (pre-)conditions Parameter Selection - Identify which parameters need to be varied Parameter sampling - Create scenarios by sampling different combinations of parameter values
68
Types of interdependency
Physical - Dependency on the material output(s) of another system e.g. Rail Network depends on electricity supply Cyber - Dependency on information transmitted through another system e.g. Elec. network depends on SCADA system Geographic - A local environmental event can affect several systems e.g. Power and communication lines running in parallel Logic - Mechanisms that are not physial, cyber or geographic e.g. Financial dependencies
69
Betweenness Centrality
Quantifies the importance of a node based on how frequently it acts as a bridge along the shortest path between two nodes
70
Sustainability Index
A composite measure that aggregates different aspects of sustainability performance Characteristics: completeness, traceability, accuracy
71
KPA
Key Performance Area A specific aspect of sustainability performance A hierarchy of top-level KPA's and sub-KPA's
72
Key Performance Indicator
An individually measurable variable Characteristics: precision, relevance, observability, controllability
73
Key Performance Target
A desirable measure for a KPA measured by a KPI
74
Indicators for city services
Economy Education Energy Environment Finance Fire & Emergency Response Governance Health Recreation Safety Shelter Solid Waste Telecommunication and innovation Transportation Urban Planning Wastewater Water & Sanitation Security
75
Main Limitations of performance measures
* Arbitrary assignment of importance weights for KPA's and KPI's * No consideration of interdependencies between different KPI's * Use of KPI's that are difficult to predict with parametric models
76
Performance measures for parametric planning
Sustainability Index Economic Performance * Housing Provided * Employment Created * Average duration of daily commutes Environmental Performance * Area Classified as green space * Total C02 emissions * Average Air Quality Index Social Performance * Affordability of Housing * Access to social services * Road accidents reported