Roadway Transportation System Cybersecurity Reporting Tools

General Information


You can report a cybersecurity threat and  view public content without logging in. Please register to request access to shared information regarding cybersecurity vulnerabilities and exploitation and suggested guidance to address cybersecurity challenges. The administrator will send you an email notifying of the approval result. The contents of this portal is visible to users who register and are approved by administrators. Each user will have access to various parts of the system.

Cyber Security Risk Assessment Tools

As the transportation infrastructure is operated with more connectivity between systems, it becomes important that the intelligent transportation system components and processes are dependable, resilient, authenticated and used appropriately. To this end, a more formal process of monitoring, alerting, and advising owners/operators of these systems must be established. Although there are other organizations and processes that cover some aspects of roadway ICS/ITS deployments, a focused effort would better serve the highway transportation community with those existing avenues if put into a collaborative and supporting role. As such, the project team (ITE, AASHTO, ITS America, NEMA, and NACTO) are proposing a Transportation Systems Cyber-Security Framework (TSCF) to meet this need.

Objectives

  1. Providing a means of rapid, secure communication of relevant cybersecurity challenges among trusted stakeholders.
  2. Provide a common means whereby all stakeholder classes (including USDOT FHWA; regional, state, and municipal traffic system operators; equipment manufacturers and integrators; academia; the cybersecurity community; and law enforcement may communicate as equals to discuss and develop guidance to address cybersecurity challenges.
  3. Develop guidance that may be implemented on a responsive basis as cybersecurity threats materialize.

Cyber Transportation Systems Framework

The landscape in which transportation systems reside and how it operates is changing as computers and communication systems become essential features to sustain highway and street-level operations in metropolitan areas. With this changing environment, the threat environment has also changed. Information sharing regarding threats to the transportation infrastructure is now critically important. This restricted portal endeavors to share information regarding cyber security vulnerabilities and exploitation quickly and efficiently among subscribers.